Общая информация
Название Pearson IT Certification - CISSP Complete Video Course
Тип
Размер 25.69Гб
Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
1.10 Implementing Third-Party Security - CISSP_2.mp4 73.83Мб
1.10 Implementing Third-Party Security - CISSP.mp4 73.83Мб
1.11 Understanding and Applying Threat Modeling - CISSP.mp4 99.15Мб
1.12 Understanding & Implementing Risk Management Concepts - CISSP.mp4 151.23Мб
1.13 Exploring Risk Assessment Methodologies - CISSP.mp4 85.16Мб
1.14 Conducting a Quantitative Risk Assessment - CISSP.mp4 191.38Мб
1.15 Conducting a Qualitative Risk Assessment - CISSP.mp4 189.86Мб
1.16 Selecting Controls and Countermeasures - CISSP.mp4 147.27Мб
1.17 Managing Supply Chain Risk - CISSP.mp4 100.74Мб
1.18 Implementing Business Continuity Risk Management - CISSP.mp4 134.02Мб
1.1 Examining Information Security Fundamentals - CISSP.mp4 123.48Мб
1.2 Applying Security Governance Concepts--Part 1 - CISSP.mp4 105.75Мб
1.3 Applying Security Governance Concepts--Part 2 - CISSP.mp4 132.08Мб
1.4 Designing and Implementing Governance Documents - CISSP.mp4 172.77Мб
1.5 Understanding Legal Systems and Related Laws--Part 1 - CISSP.mp4 57.76Мб
1.6 Understanding Legal Systems and Related Laws--Part 2 - CISSP.mp4 114.72Мб
1.7 Understanding Regulatory and Contractual Requirements--Part 1 - CISSP.mp4 81.08Мб
1.8 Understanding Regulatory and Contractual Requirements--Part 2 - CISSP.mp4 124.29Мб
1.9 Implementing Personnel Security - CISSP.mp4 158.24Мб
2.1 Classifying Assets - CISSP.mp4 150.00Мб
2.2 Managing Assets - CISSP.mp4 114.38Мб
2.3 Protecting Data Privacy - CISSP.mp4 123.12Мб
2.4 Ensuring Appropriate Retention and Destruction - CISSP.mp4 165.19Мб
2.5 Determining Data Security Controls - CISSP.mp4 132.99Мб
3.10 Applying Cryptography--Encryption Part 1 - CISSP.mp4 558.43Мб
3.11 Applying Cryptography--Encryption Part 2 - CISSP.mp4 538.43Мб
3.12 Applying Cryptography--Public Key Infrastructure - CISSP.mp4 139.04Мб
3.13 Applying Cryptography--Hashing and Digital Signature - CISSP.mp4 177.85Мб
3.14 Applying Cryptography--Cryptographic Protocols - CISSP.mp4 263.79Мб
3.15 Applying Cryptography--Crypto Attacks - CISSP.mp4 69.97Мб
3.16 Applying Secure Principles to Site and Facility Design - CISSP.mp4 493.64Мб
3.17 Securing Information Processing Facilities and Equipment - CISSP.mp4 337.35Мб
3.1 Implementing Secure Design Principles - CISSP.mp4 174.26Мб
3.2 Understanding Security Models - CISSP.mp4 132.63Мб
3.3 Selecting Controls Based on Systems Security Evaluation Models - CISSP.mp4 112.72Мб
3.4 Recognizing Information Systems Security Capabilities - CISSP.mp4 132.36Мб
3.5 Assessing and Mitigating Security Architecture Vulnerabilities - CISSP.mp4 113.15Мб
3.6 Assessing and Mitigating Cloud Vulnerabilities - CISSP.mp4 83.59Мб
3.7 Assessing and Mitigating Web Vulnerabilities - CISSP.mp4 83.27Мб
3.8 Assessing and Mitigating Mobile and Remote Computing Vulnerabilities - CISSP.mp4 98.23Мб
3.9 Introducing Cryptography - CISSP_2.mp4 443.22Мб
3.9 Introducing Cryptography - CISSP.mp4 91.88Мб
4.10 Preventing and Mitigating Network Attacks - CISSP.mp4 858.04Мб
4.1 Reviewing OSI and TCP_IP Models - CISSP.mp4 749.48Мб
4.2 Understanding IP Convergence and Extensibility - CISSP.mp4 254.80Мб
4.3 Securing Wireless Networks - CISSP.mp4 322.78Мб
4.4 Using Cryptography to Maintain Communication Security - CISSP.mp4 236.29Мб
4.5 Securing Network Access - CISSP.mp4 622.45Мб
4.6 Securing Data Transmissions - CISSP.mp4 540.46Мб
4.7 Securing Multimedia Collaboration - CISSP.mp4 441.85Мб
4.8 Securing Virtual Private Networks - CISSP.mp4 550.21Мб
4.9 Securing Endpoints - CISSP.mp4 548.82Мб
5.1 Understanding Access Control Fundamentals - CISSP.mp4 425.46Мб
5.2 Examining Identification Schemas - CISSP.mp4 621.46Мб
5.3 Understanding Authentication Options - CISSP.mp4 886.90Мб
5.4 Understanding Authentication Systems - CISSP.mp4 315.78Мб
5.5 Implementing Access and Authorization Criteria - CISSP.mp4 417.58Мб
5.6 Implementing Access Control Models - CISSP.mp4 126.65Мб
5.7 Implementing Access Control Techniques and Technologies - CISSP.mp4 414.61Мб
5.8 Identity and Accessing Provisioning - CISSP.mp4 124.02Мб
6.1 Testing and Examination (T&E) Overview - CISSP.mp4 124.16Мб
6.2 Security Assessment Planning - CISSP.mp4 113.60Мб
6.3 Conducting Security Examinations - CISSP.mp4 107.87Мб
6.4 Conducting Security Testing--Target Identificaton - CISSP.mp4 457.19Мб
6.5 Conducting Security Testing--Password Cracking - CISSP.mp4 85.98Мб
6.6 Security Assessment Testing--Penetration Testing - CISSP.mp4 114.85Мб
6.7 Understanding Log Analysis - CISSP.mp4 125.45Мб
6.8 Implementing Information Security Continuous Monitoring (ISCM) - CISSP.mp4 116.57Мб
6.9 Understanding Third-Party Audits and Examinations - CISSP.mp4 114.27Мб
7.10 Managing DR Plan Maintenance - CISSP.mp4 453.36Мб
7.11 Understanding and Supporting Investigations - CISSP.mp4 525.01Мб
7.12 Understanding Digital Forensics - CISSP.mp4 452.84Мб
7.13 Supporting Incident Management - CISSP.mp4 739.62Мб
7.14 Securing People and Places - CISSP.mp4 368.16Мб
7.1 Managing Privileged Accounts - CISSP.mp4 434.94Мб
7.2 Operating and Maintaining Firewalls and IDS_IPS - CISSP.mp4 610.40Мб
7.3 Conducting Logging and Monitoring Activities - CISSP.mp4 414.38Мб
7.4 Implementing and Supporting Vulnerability and Patch Management - CISSP.mp4 738.77Мб
7.5 Implementing and Supporting Malware Management - CISSP.mp4 592.75Мб
8.1 Managing the Software Development Lifecycle - CISSP.mp4 132.18Мб
8.2 Understanding Software Development Approaches, Models, and Tools - CISSP.mp4 123.68Мб
8.3 Understanding Source Code Security Issues - CISSP.mp4 479.34Мб
8.4 Managing Database Security - CISSP.mp4 479.19Мб
8.5 Assessing the Security Impact of Acquired Software - CISSP.mp4 315.72Мб
9.1 Security and Risk Management Domain- Review and Study Roadmap - CISSP.mp4 73.14Мб
9.2 Asset Security Domain- Review and Study Roadmap - CISSP.mp4 95.89Мб
9.3 Security Engineering Domain- Review and Study Roadmap - CISSP.mp4 59.29Мб
9.4 Communications and Network Security Domain- Review and Study Roadmap - CISSP.mp4 41.94Мб
9.5 Identity and Access Domain- Review and Study Roadmap - CISSP.mp4 30.77Мб
9.6 Security Assessment and Testing Domain- Review and Study Roadmap - CISSP.mp4 33.06Мб
9.7 Security Operations Domain- Review and Study Roadmap - CISSP.mp4 48.94Мб
9.8 Software Development Security Domain- Review and Study Roadmap - CISSP.mp4 29.60Мб
9.9 Taking the CISSP Examination - CISSP.mp4 29.88Мб
End of Lesson Review - CISSP_2.mp4 335.11Мб
End of Lesson Review - CISSP_3.mp4 393.37Мб
End of Lesson Review - CISSP_4.mp4 508.69Мб
End of Lesson Review - CISSP_5.mp4 103.29Мб
End of Lesson Review - CISSP_6.mp4 91.85Мб
End of Lesson Review - CISSP_8.mp4 452.70Мб
End of Lesson Review - CISSP.mp4 171.42Мб
Lesson 1- Security and Risk Management - CISSP.mp4 11.77Мб
Lesson 2 - Asset Security - CISSP.mp4 9.47Мб
Lesson 3- Security Engineering - CISSP.mp4 10.37Мб
Lesson 4- Communications and Network Security - CISSP.mp4 15.80Мб
Lesson 5- Identity and Access Management - CISSP.mp4 10.83Мб
Lesson 6- Security Assessment and Testing - CISSP.mp4 11.30Мб
Lesson 8- Software Development Security - CISSP.mp4 11.61Мб
Lesson 9- Preparing for the Exam - CISSP.mp4 5.40Мб
Статистика распространения по странам
Южная Корея (KR) 1
Всего 1
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент