Общая информация
Название Pearson Certification - CISSP Video Course
Тип
Размер 12.65Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
1.Introduction.mp4 36.49Мб
10.AIC Triad.mp4 25.73Мб
100.Security Awareness and Training.mp4 9.61Мб
101.Training Characteristics.mp4 10.27Мб
102.Security Enforcement Issues.mp4 8.92Мб
103.Answer This Question.mp4 11.32Мб
104.Domain 1 Review.mp4 31.44Мб
105.Access Control.mp4 3.15Мб
106.Agenda 1.mp4 13.14Мб
107.Access Control Mechanism Examples.mp4 10.78Мб
108.Technical Controls.mp4 4.34Мб
109.Access Control Characteristics.mp4 19.58Мб
110.Preventive Controls.mp4 18.47Мб
111.Control Combinations.mp4 2.47Мб
112.Detective GÇö Administrative Control.mp4 21.94Мб
113.Detective Examples.mp4 3.73Мб
114.Administrating Access Control.mp4 22.05Мб
115.Authorization Creep.mp4 9.90Мб
116.Accountability and Access Control.mp4 14.62Мб
117.Trusted Path.mp4 29.76Мб
118.Fake Login Pages Look Convincing.mp4 9.22Мб
12.Social Engineering.mp4 23.05Мб
120.Identification Issues.mp4 8.19Мб
121.Authentication Mechanisms Characteristics.mp4 7.49Мб
122.Strong Authentication.mp4 9.16Мб
123.Fraud Controls.mp4 11.53Мб
124.Internal Control Tool Separation of Duties.mp4 10.00Мб
125.Authentication Mechanisms in Use Today.mp4 17.72Мб
126.Verification Steps.mp4 8.11Мб
127.What a Person Is.mp4 3.61Мб
13.What Security People Are Really Thinking.mp4 12.56Мб
130.Iris Sampling.mp4 4.63Мб
131.Finger Scan.mp4 3.64Мб
132.Hand Geometry.mp4 17.95Мб
133.Downfalls to Biometric Use.mp4 9.04Мб
134.Biometrics Error Types.mp4 11.39Мб
135.Crossover Error Rate.mp4 17.52Мб
136.Biometric System Types.mp4 22.95Мб
137.Passwords.mp4 49.79Мб
138.Password Attacks.mp4 11.17Мб
139.Attack Steps.mp4 11.32Мб
14.Security Concepts.mp4 9.68Мб
140.Many Tools to Break Your Password.mp4 5.00Мб
141.Rainbow Table.mp4 7.07Мб
142.Passwords Should NOT ContainGǪ.mp4 8.95Мб
143.Countermeasures for Password Cracking.mp4 11.34Мб
144.Cognitive Passwords.mp4 4.40Мб
145.One-Time Password Authentication.mp4 16.05Мб
146.Synchronous Token.mp4 10.76Мб
147.One Type of Solution.mp4 13.44Мб
148.Administrator Configures.mp4 885.81Кб
149.Challenge Response Authentication.mp4 15.74Мб
150.Asynchronous Token Device.mp4 22.48Мб
151.Challenge Response Authentication.mp4 1.39Мб
152.Cryptographic Keys.mp4 7.40Мб
153.Passphrase Authentication.mp4 7.21Мб
154.Key Protection.mp4 2.21Мб
155.Memory Cards.mp4 14.00Мб
156.Memory Card Characteristics.mp4 4.18Мб
157.Smart Card.mp4 4.46Мб
158.Characteristics.mp4 11.59Мб
159.Card Types.mp4 3.89Мб
16.The Bad Guys Are Motivated.mp4 15.28Мб
160.Smart Card Attacks.mp4 15.79Мб
161.Software Attack.mp4 5.76Мб
162.Side Channel Attack.mp4 9.09Мб
163.Side Channel Data Collection.mp4 4.66Мб
164.Microprobing.mp4 9.04Мб
165.Identity Management.mp4 23.95Мб
167.Some Current Issues.mp4 13.66Мб
168.Management.mp4 30.36Мб
169.Typical Chaos.mp4 3.57Мб
17.Open Standards.mp4 11.23Мб
170.Different Identities.mp4 10.00Мб
171.Identity Management Technologies.mp4 8.26Мб
172.Directory Component.mp4 13.26Мб
173.Enterprise Directory.mp4 3.82Мб
174.Directory Responsibilities.mp4 10.47Мб
175.Authoritative Sources.mp4 17.97Мб
176.Meta Directory.mp4 13.43Мб
177.Directory Interactions.mp4 8.30Мб
178.Web Access Management.mp4 14.60Мб
179.Web Access.mp4 22.57Мб
18.Without Standards.mp4 7.67Мб
180.Password Management.mp4 23.57Мб
181.Legacy Single Sign-On.mp4 27.47Мб
182.Account Management Systems.mp4 24.18Мб
183.Provisioning Component.mp4 31.26Мб
184.Profile Update.mp4 15.25Мб
185.Working Together.mp4 16.24Мб
186.Enterprise Directory.mp4 4.19Мб
187.Identity Management Solution Components.mp4 29.68Мб
188.Federated Identity.mp4 24.22Мб
189.Identity Theft.mp4 13.19Мб
19.Controls.mp4 29.91Мб
190.Fake Login Tools.mp4 14.89Мб
191.Instructional Emails.mp4 14.23Мб
192.Knowing What You Are Disposing of Is Important.mp4 6.48Мб
193.Other Examples.mp4 4.75Мб
194.Another Danger to Be Aware ofGǪ Spyware.mp4 21.08Мб
197.New Spyware Is Being Identified Every Week.mp4 11.77Мб
198.How to Prevent Spyware.mp4 13.25Мб
199.Different Technologies.mp4 4.03Мб
2.Information Security and Risk Management.mp4 8.44Мб
20.Holistic Security.mp4 28.01Мб
200.Single Sign-on Technology.mp4 32.76Мб
201.Security Domain.mp4 14.69Мб
202.Domains of Trust.mp4 5.38Мб
203.Thin Clients.mp4 9.89Мб
204.Example.mp4 5.94Мб
205.Kerberos as a Single Sign-on Technology.mp4 62.20Мб
206.Tickets.mp4 33.91Мб
208.Issues Pertaining to Kerberos.mp4 8.07Мб
209.Kerberos Issues.mp4 8.51Мб
21.Different Types of Law.mp4 33.59Мб
210.SESAME as a Single Sign-on Technology.mp4 6.48Мб
211.SESAME Steps for Authentication.mp4 10.01Мб
212.Combo.mp4 5.95Мб
213.Models for Access.mp4 9.15Мб
214.Access Control Models.mp4 10.31Мб
215.ACL Access.mp4 5.35Мб
216.File Permissions.mp4 11.91Мб
217.Security Issues.mp4 13.49Мб
218.Mandatory Access Control Model.mp4 12.11Мб
219.MAC Enforcement Mechanism GÇö Labels.mp4 20.81Мб
220.Formal Model.mp4 3.69Мб
221.Software and Hardware.mp4 9.75Мб
222.Software and Hardware Guards.mp4 17.31Мб
223.MAC versus DAC.mp4 4.43Мб
224.Role-Based Access Control.mp4 12.23Мб
225.RBAC Hierarchy.mp4 18.21Мб
226.Rule-Based Access Control.mp4 22.61Мб
227.Firewall Example.mp4 1.35Мб
228.Access Control Matrix.mp4 10.63Мб
229.Temporal Access Control.mp4 9.16Мб
23.Due Diligence and Due Care.mp4 11.99Мб
230.Access Control Administration.mp4 20.53Мб
231.Remote Centralized Administration.mp4 16.24Мб
232.RADIUS.mp4 10.07Мб
233.RADIUS Characteristics.mp4 6.99Мб
234.TACACS+ Characteristics.mp4 15.94Мб
235.Diameter Characteristics.mp4 24.08Мб
236.Diameter Protocol.mp4 5.25Мб
237.Mobile IP.mp4 16.17Мб
238.Diameter Architecture.mp4 6.55Мб
239.Two Pieces.mp4 5.19Мб
24.Prudent Person Rule.mp4 36.29Мб
240.AVP.mp4 17.60Мб
241.Decentralized Access Control Administration.mp4 17.97Мб
242.Controlling Access to Sensitive Data.mp4 37.70Мб
243.IDS.mp4 14.20Мб
244.IDS Steps.mp4 6.56Мб
245.Network IDS Sensors.mp4 12.38Мб
246.Host IDS.mp4 10.59Мб
247.Combination.mp4 6.92Мб
248.Types of IDSs.mp4 25.35Мб
249.Signature-Based Example.mp4 9.11Мб
25.Risk Management.mp4 52.86Мб
250.Behavior-Based IDS.mp4 35.38Мб
251.Statistical Anomaly.mp4 10.98Мб
252.Statistical IDS.mp4 7.75Мб
253.Protocol Anomaly.mp4 12.85Мб
255.Protocol Anomaly Issues.mp4 8.08Мб
256.Traffic Anomaly.mp4 38.43Мб
257.IDS Response Mechanisms.mp4 11.80Мб
258.Responses to Attacks.mp4 8.17Мб
259.IDS Issues.mp4 33.38Мб
26.Planning Stage GÇö Scope.mp4 10.95Мб
260.Vulnerable IDS.mp4 25.13Мб
261.Domain 2 Review.mp4 24.66Мб
262.Cryptography.mp4 10.51Мб
263.Services Provided by Cryptography.mp4 12.38Мб
264.Cryptographic Definitions.mp4 13.05Мб
265.Cipher.mp4 10.32Мб
266.A Few More Definitions.mp4 21.98Мб
267.Symmetric Cryptography GÇö Use of Secret Keys.mp4 14.23Мб
268.Scytale Cipher.mp4 6.27Мб
269.Substitution Ciphers.mp4 19.42Мб
27.Planning Stage GÇö Analysis Method.mp4 6.83Мб
270.Simple Substitution Cipher Atbash.mp4 10.86Мб
271.Caesar Cipher Example.mp4 7.91Мб
272.Simple Substitution Cipher ROT13.mp4 8.42Мб
273.Historical Uses.mp4 19.49Мб
274.Vigenere Algorithm.mp4 11.49Мб
275.Enigma Machine.mp4 51.03Мб
276.Historical Uses of Symmetric Cryptography GÇö Running Key and Concealment.mp4 18.55Мб
277.Agenda 1.mp4 2.42Мб
278.Transposition Ciphers.mp4 6.96Мб
279.Key and Algorithm Relationship.mp4 24.19Мб
28.Risk Management Tools.mp4 8.98Мб
280.Ways of Breaking Cryptosystems GÇö Brute Force.mp4 18.70Мб
281.Brute Force Components.mp4 7.47Мб
282.Ways of Breaking Cryptosystems GÇö Frequency Analysis.mp4 11.13Мб
283.Strength of a Cryptosystem.mp4 23.01Мб
284.Developing Cryptographic Solutions In-House.mp4 12.67Мб
285.Characteristics of Strong Algorithms.mp4 20.56Мб
287.Types of Ciphers Used Today.mp4 13.08Мб
288.S-Boxes Used in Block Ciphers.mp4 7.71Мб
289.Binary Mathematical Function 1.mp4 8.27Мб
29.Defining Acceptable Levels.mp4 17.31Мб
290.Type of Symmetric Cipher GÇö Stream Cipher.mp4 8.05Мб
291.Symmetric Characteristics.mp4 4.19Мб
292.Initialization Vectors.mp4 17.23Мб
293.Security Holes.mp4 50.89Мб
294.Strength of a Stream Cipher.mp4 21.72Мб
295.Out-of-Band Transmission.mp4 6.03Мб
296.Symmetric Key Management Issue.mp4 24.39Мб
297.Asymmetric Cryptography.mp4 9.52Мб
298.Key Functions.mp4 9.43Мб
299.Public Key Cryptography Advantages.mp4 17.43Мб
3.Mainframe Days.mp4 27.24Мб
30.Acceptable Risk Level.mp4 6.28Мб
300.Asymmetric Algorithm Disadvantages.mp4 12.50Мб
301.Confusing Names.mp4 16.40Мб
302.Symmetric versus Asymmetric.mp4 5.53Мб
303.Questions 1.mp4 45.88Мб
304.When to Use Which Key.mp4 17.32Мб
305.Encryption Steps.mp4 9.36Мб
306.ReceiverGÇÖs Public Key Is Used to Encrypt the Symmetric Key.mp4 3.11Мб
307.ReceiverGÇÖs Private Key Is Used to Decrypt the Symmetric Key.mp4 6.49Мб
308.Digital Envelope.mp4 8.77Мб
309.Secret versus Session Keys.mp4 10.15Мб
31.Collecting and Analyzing Data Methods.mp4 10.71Мб
310.Asymmetric Algorithms We Will Dive Into.mp4 14.21Мб
311.Diffie-Hellman.mp4 36.65Мб
312.Key Agreement Schemes.mp4 8.33Мб
313.Asymmetric Algorithm GÇö RSA.mp4 11.40Мб
314.Factoring Large Numbers.mp4 5.92Мб
315.RSA Operations.mp4 5.55Мб
316.RSA Key Size.mp4 4.25Мб
317.El Gamal.mp4 14.73Мб
318.Asymmetric Mathematics.mp4 35.43Мб
319.Asymmetric Security.mp4 7.68Мб
320.Mathematics.mp4 66.03Мб
321.Block Cipher.mp4 5.70Мб
322.Double DES.mp4 16.09Мб
323.Evolution of DES.mp4 4.94Мб
324.Modes of 3DES.mp4 6.82Мб
325.Encryption Modes.mp4 17.34Мб
326.Block Cipher Modes GÇö CBC.mp4 14.67Мб
327.Different Modes of Block Ciphers GÇö ECB.mp4 7.59Мб
328.ECB versus CBC.mp4 5.27Мб
329.Block Cipher Modes GÇö CFB and OFB.mp4 40.99Мб
33.Data Collection GÇö Identify Assets.mp4 5.26Мб
330.CFB and OFB Modes.mp4 9.25Мб
331.Counter Mode.mp4 20.79Мб
332.Modes Summary.mp4 17.85Мб
333.Symmetric Ciphers.mp4 24.75Мб
334.Data Integrity.mp4 8.67Мб
335.Hashing Steps.mp4 3.54Мб
336.Protecting the Integrity of Data.mp4 10.31Мб
337.Hashing Algorithms.mp4 11.94Мб
338.Data Integrity Mechanisms.mp4 7.05Мб
339.Hashing Strength.mp4 5.92Мб
34.Data Collection GÇö Assigning Values.mp4 10.06Мб
340.Question 1.mp4 3.63Мб
341.Weakness In Using Only Hash Algorithms.mp4 4.75Мб
342.More Protection In Data Integrity.mp4 6.86Мб
343.MAC.mp4 7.24Мб
344.HMAC GÇö Sender.mp4 10.62Мб
345.Another Look.mp4 4.80Мб
346.What Services.mp4 10.80Мб
347.CBC-MAC.mp4 4.72Мб
348.MAC Using Block Ciphers.mp4 9.97Мб
35.Asset Value.mp4 6.07Мб
351.Question 2.mp4 14.57Мб
352.Digital Signatures.mp4 15.31Мб
353.U.S. Government Standard.mp4 5.97Мб
354.What IsGǪ.mp4 3.31Мб
355.Not Giving Up the Farm.mp4 8.59Мб
356.Zero Knowledge Proof.mp4 11.24Мб
357.Message Integrity Controls.mp4 4.75Мб
358.Security Issues In Hashing.mp4 7.94Мб
359.Example of a Birthday Attack.mp4 29.74Мб
36.Data Collection GÇö Identify Threats.mp4 13.06Мб
360.Birthday Attack Issues.mp4 8.75Мб
361.Key Management.mp4 20.16Мб
362.Key Usage.mp4 18.40Мб
363.M-of-N.mp4 18.02Мб
364.Key Types.mp4 6.54Мб
366.PKI and Its Components.mp4 16.88Мб
367.RA Roles.mp4 25.09Мб
368.CA.mp4 12.19Мб
369.Digital Certificates.mp4 11.57Мб
37.Data Collection GÇö Calculate Risks.mp4 16.27Мб
370.Certificate.mp4 3.78Мб
371.Signing the Certificate.mp4 3.76Мб
372.Verifying the Certificate.mp4 17.99Мб
373.Trusted CAGÇÖs.mp4 15.07Мб
374.Non-Trusted CA.mp4 14.46Мб
376.Components of PKI Repository and CRLs.mp4 23.63Мб
378.CRL Process.mp4 11.93Мб
379.Different Uses for Certificates.mp4 12.06Мб
38.Scenario Based GÇö Qualitative.mp4 3.49Мб
380.Cross Certification.mp4 17.83Мб
381.PKI and Trust.mp4 17.25Мб
382.Historical Uses of Symmetric Cryptography.mp4 15.77Мб
383.Binary Mathematical Function 2.mp4 13.12Мб
384.One-Time Pad in Action.mp4 4.08Мб
385.One-Time Pad Characteristics.mp4 26.74Мб
386.Steganography.mp4 19.47Мб
387.Digital Watermarking.mp4 6.88Мб
388.Link versus End-to-End Encryption.mp4 21.24Мб
389.End-to-End Encryption.mp4 15.03Мб
39.Risk Approach.mp4 2.35Мб
390.Encryption Location.mp4 4.99Мб
391.Email Standards.mp4 15.03Мб
392.You Decide.mp4 10.18Мб
393.Non-Hierarchical.mp4 6.46Мб
394.Secure Protocols.mp4 10.94Мб
395.SSL Connection Setup.mp4 31.63Мб
396.Example GÇö SSL.mp4 3.52Мб
397.Validating Certificate.mp4 3.91Мб
398.Secure Protocols (Cont.).mp4 22.76Мб
399.SSL and the OSI Model.mp4 8.54Мб
4.TodayGÇÖs Environment.mp4 8.69Мб
40.Qualitative Analysis Steps.mp4 6.54Мб
400.E-Commerce.mp4 23.70Мб
402.Secure Email Standard.mp4 13.73Мб
403.Network Layer Protection.mp4 30.26Мб
404.IPSec Key Management.mp4 12.01Мб
405.IPSec Handshaking Process.mp4 9.83Мб
406.VPN Establishment.mp4 6.98Мб
407.SAs In Use.mp4 16.21Мб
408.Key Issues within IPSec.mp4 19.14Мб
409.Configuration of SA Parameters.mp4 5.62Мб
410.IPSec Configuration Options.mp4 4.05Мб
411.IPSec Is a Suite of Protocols.mp4 33.00Мб
412.AH and ESP Modes.mp4 9.93Мб
413.IPSec Modes of Operation.mp4 7.18Мб
414.VPN Establishment (Cont.).mp4 10.40Мб
415.Review.mp4 8.70Мб
416.Questions 2.mp4 23.67Мб
417.Attack Types.mp4 7.00Мб
418.Attacks on Cryptosystems.mp4 7.44Мб
419.Known-Plaintext Attack.mp4 19.11Мб
42.Qualitative Risk Analysis.mp4 25.44Мб
420.Chosen-Plaintext Attack.mp4 11.87Мб
421.Chosen-Ciphertext Attack.mp4 11.05Мб
422.Adaptive Attacks.mp4 4.60Мб
423.Side Channel Attacks.mp4 13.04Мб
424.Domain 3 Review.mp4 31.80Мб
425.Physical Security.mp4 1.80Мб
426.Different Types of Threats.mp4 4.83Мб
427.Wake Up Call.mp4 12.13Мб
428.Legal Issues.mp4 8.27Мб
429.Physical Security Program Goals.mp4 13.49Мб
43.ARO Values.mp4 59.79Мб
430.Planning Process.mp4 14.00Мб
431.Deterrence.mp4 9.71Мб
432.Delay.mp4 2.46Мб
433.Layered Defense Model.mp4 16.62Мб
434.Weak Link In the Chain.mp4 3.31Мб
435.Threat Categories.mp4 9.43Мб
436.Crime Prevention Through Environmental Design.mp4 28.00Мб
437.Construction Materials.mp4 19.82Мб
438.Security Zones.mp4 55.82Мб
439.Entrance Protection.mp4 71.13Мб
440.Perimeter Security GÇö Security Guards.mp4 50.18Мб
441.Types of Physical Intrusion Detection Systems.mp4 40.07Мб
442.Alarm Systems.mp4 61.19Мб
443.Electrical Power.mp4 58.38Мб
444.Fire Prevention.mp4 110.94Мб
445.Domain 4 Review.mp4 80.44Мб
446.Security Architecture and Design.mp4 13.44Мб
447.Central Processing Unit (CPU).mp4 11.38Мб
448.Registers.mp4 25.76Мб
449.Trust Levels and Processes.mp4 23.99Мб
45.Risk Types.mp4 6.65Мб
450.Interrupts.mp4 29.24Мб
451.Bussses.mp4 14.01Мб
452.Multiprocessing and Multitasking.mp4 58.55Мб
453.Memory Types.mp4 116.52Мб
454.CPU and OS.mp4 186.37Мб
455.Trusted Computing Base.mp4 118.21Мб
456.Security Levels.mp4 38.81Мб
457.Enterprise Architecture.mp4 157.21Мб
458.Access Control Models.mp4 50.08Мб
459.Bell-LaPadula.mp4 120.35Мб
46.Losses.mp4 14.55Мб
460.Clark-Wilson Model.mp4 36.82Мб
461.Non-Interference Model.mp4 30.67Мб
462.Access Control Matrix Model.mp4 45.26Мб
463.Trusted Computer System Evaluation Criteria (TCSEC).mp4 121.28Мб
464.Domain 5 Review.mp4 202.80Мб
465.Law Investigation and Ethics.mp4 8.35Мб
466.Examples of Computer Crimes.mp4 7.33Мб
468.A Few Attack Types.mp4 38.53Мб
469.Privacy of Sensitive Data.mp4 54.80Мб
47.CostBenefit Analysis.mp4 6.29Мб
470.Different Types of Laws.mp4 43.84Мб
471.Computer Crime and Its Barriers.mp4 112.97Мб
472.Preparing for a Crime Before It Happens.mp4 189.22Мб
473.Domain 6 Review.mp4 97.19Мб
474.Telecommunications and Networking.mp4 3.33Мб
475.OSI Model.mp4 25.17Мб
476.Networking Communications.mp4 19.15Мб
477.Application Layer.mp4 16.53Мб
478.Presentation Layer.mp4 20.47Мб
479.OSI GÇö Session Layer.mp4 18.67Мб
48.Cost of a Countermeasure.mp4 14.00Мб
480.Transport Layer.mp4 26.22Мб
481.Network Layer.mp4 19.13Мб
482.Data Link Layer.mp4 42.82Мб
483.Physical Layer.mp4 16.13Мб
484.Layers Working Together.mp4 55.96Мб
485.Network Topologies.mp4 59.01Мб
486.LAN Media Access Technologies.mp4 23.82Мб
487.Media Access Technologies.mp4 111.61Мб
488.Cabling Types-Coaxial.mp4 11.02Мб
489.Cabling Types GÇö Twisted Pair.mp4 11.24Мб
49.CostBenefit Analysis Countermeasure Criteria.mp4 29.16Мб
490.Types of Cabling GÇö Fiber.mp4 8.93Мб
491.Signal and Cable Issues.mp4 20.12Мб
492.Transmission Types.mp4 90.13Мб
493.Network Technologies.mp4 25.61Мб
494.Networking Devices.mp4 49.58Мб
495.Virtual LANs.mp4 19.91Мб
496.Sniffers.mp4 24.76Мб
497.Networking Devices GÇö Router.mp4 11.43Мб
498.Hops.mp4 3.47Мб
499.Routers.mp4 8.30Мб
5.Security Definitions.mp4 14.69Мб
50.Calculating CostBenefit.mp4 5.93Мб
500.Bridges Compared to Routers.mp4 10.48Мб
501.Port and Protocol Relationship.mp4 32.73Мб
502.TCPIP Suite.mp4 7.10Мб
503.UDP versus TCP.mp4 25.42Мб
504.TCP Segment.mp4 4.64Мб
505.SYN Flood.mp4 27.91Мб
506.Teardrop Attack.mp4 21.47Мб
507.Source Routing.mp4 10.99Мб
508.Source Routing Types.mp4 8.60Мб
509.IP Address Ranges.mp4 18.49Мб
51.Controls II.mp4 20.47Мб
510.IPv6.mp4 22.77Мб
511.Protocols.mp4 624.40Кб
512.Protocols GÇö ARP.mp4 4.84Мб
513.IP to MAC Mapping.mp4 3.60Мб
514.How ARP Works.mp4 6.46Мб
515.ARP Poisoning.mp4 5.83Мб
516.ICMP Packets.mp4 6.30Мб
517.A Way Hackers Use ICMP.mp4 6.73Мб
518.Ping Steps.mp4 5.48Мб
519.Protocols GÇö SNMP.mp4 7.73Мб
52.Quantitative Analysis.mp4 23.16Мб
520.SNMP In Action.mp4 10.23Мб
521.SNMP.mp4 10.62Мб
522.SNMP Output.mp4 5.30Мб
523.POP3 and SMTP.mp4 6.54Мб
524.Mail Relay.mp4 20.49Мб
525.Protocols GÇö FTP TFTP Telnet.mp4 14.58Мб
526.Protocols GÇö RARP and BootP.mp4 6.24Мб
527.DHCP GÇö Dynamic Host Configuration Protocol.mp4 10.31Мб
528.Networking Device GÇö Bastion Host.mp4 25.46Мб
529.Network Devices GÇö Firewalls.mp4 57.14Мб
530.Rule Set Example.mp4 6.95Мб
531.Firewall Types GÇö Proxy Firewalls.mp4 18.00Мб
532.Firewall Types GÇö Circuit-Level Proxy Firewall.mp4 17.90Мб
533.Circuit-Level Proxy.mp4 55.65Мб
534.Dedicated Proxy Servers.mp4 174.54Мб
535.Dial-Up Protocols and Authentication Protocols.mp4 43.79Мб
536.Authentication Protocols.mp4 75.58Мб
537.Virtual Private Network Technologies.mp4 138.81Мб
538.SDLC and HDLC.mp4 44.75Мб
539.Quality of Service (QoS).mp4 19.52Мб
54.Uncertainty Analysis.mp4 12.16Мб
540.Autonomous Systems.mp4 15.57Мб
541.Routing Protocols.mp4 86.23Мб
542.Routing Protocol Attacks.mp4 124.51Мб
543.Network Service GÇö NAT.mp4 51.44Мб
544.WAN Technologies Are Circuit or Packet Switched.mp4 11.88Мб
545.PSTN.mp4 17.01Мб
546.Multiplexing.mp4 11.02Мб
547.Types of Multiplexing.mp4 29.14Мб
548.Packet Switching.mp4 35.32Мб
549.WAN Technologies GÇö Packet Switched.mp4 1.59Мб
55.Dealing with Risk.mp4 13.84Мб
550.WAN Technologies GÇö X.25.mp4 4.40Мб
551.X.25.mp4 11.70Мб
552.WAN Technologies GÇö Frame Relay.mp4 17.50Мб
553.WAN Example.mp4 3.70Мб
554.Frame Relay.mp4 22.31Мб
555.WAN Technologies GÇö ATM.mp4 8.48Мб
556.Cell Switching.mp4 3.86Мб
557.Wide Area Network Technologies.mp4 44.46Мб
558.WAN Technologies GÇö Cable Modem.mp4 11.84Мб
559.Cable Modems and Satellites.mp4 25.27Мб
56.ManagementGÇÖs Response to Identified Risks.mp4 8.19Мб
560.Network Perimeter Security.mp4 10.43Мб
561.Complexity Only Increases.mp4 5.49Мб
562.Agenda 9.mp4 12.39Мб
563.PSTN (Cont.).mp4 10.54Мб
564.Private Branch Exchange.mp4 9.27Мб
565.PBX Vulnerabilities.mp4 15.26Мб
566.PBX Best Practices.mp4 15.89Мб
567.IP Telephony.mp4 115.54Мб
568.Mobile Phone Security.mp4 12.84Мб
569.Mobile Device Security.mp4 11.39Мб
57.Risk Acceptance.mp4 7.16Мб
570.Cell Phone.mp4 26.58Мб
571.Wireless Technologies.mp4 121.42Мб
572.OFDM.mp4 15.49Мб
573.802.11n.mp4 12.13Мб
574.Wireless Technologies GÇö Access Point (Cont.).mp4 6.37Мб
575.Architectures.mp4 3.87Мб
576.Wireless Technologies GÇö Service Set ID.mp4 11.45Мб
577.Authenticating to an AP.mp4 9.93Мб
578.802.11 Authentication.mp4 11.34Мб
579.Wireless Technologies GÇö WEP Woes.mp4 54.79Мб
58.Risk Analysis Process Summary.mp4 6.14Мб
580.802.11 Security Solutions.mp4 51.29Мб
581.Types of 802.11 Security.mp4 15.71Мб
582.Wireless EAP.mp4 144.96Мб
583.Wireless Technologies GÇö WAP and WTLS.mp4 29.64Мб
584.Instant Messaging.mp4 22.67Мб
585.Domain 7 Review.mp4 16.78Мб
586.Business Continuity.mp4 7.20Мб
587.Needs for BCP.mp4 30.00Мб
588.911 Changed Mentalities About BCP.mp4 25.47Мб
59.Components of Security Program.mp4 7.85Мб
591.More Reasons to Have Plans in Place.mp4 19.35Мб
592.BCP Is a Core Component of Every Security Program.mp4 4.39Мб
593.Steps of BCP Process.mp4 11.74Мб
594.Different BCP Model.mp4 12.60Мб
595.Documentation.mp4 8.31Мб
596.BCP Policy Outlines.mp4 13.94Мб
599.BCP Development Team.mp4 9.19Мб
6.Examples of Some Vulnerabilities that Are Not Always Obvious.mp4 14.57Мб
60.A Layered Approach.mp4 8.63Мб
600.Project Sizing.mp4 17.41Мб
601.Properly Determining Scope Is Important.mp4 8.51Мб
602.BCP Risk Analysis Steps.mp4 17.37Мб
603.BIA Steps.mp4 15.65Мб
604.Information from Different Sources.mp4 6.79Мб
605.Analysis.mp4 12.65Мб
606.How to Identify the Most Critical Company Functions.mp4 27.74Мб
607.Interdependencies.mp4 4.60Мб
608.Well Of Course an Organization Knows How It Works!.mp4 9.08Мб
609.Business Silos.mp4 48.38Мб
61.In Security You Never Want Any Surprises.mp4 8.87Мб
610.Maximum Tolerable Downtime.mp4 37.78Мб
611.Range of Threats to Consider.mp4 26.69Мб
612.Thinking Outside of the Box What IfGǪ.mp4 9.46Мб
613.Biological Threats.mp4 7.76Мб
614.BIA Steps (Cont.).mp4 9.71Мб
615.Potential Disasters.mp4 13.19Мб
616.Risk Approach.mp4 19.13Мб
618.Recovery Strategies.mp4 12.80Мб
619.Alternate Business Process Procedures.mp4 18.77Мб
62.Building Foundation.mp4 4.11Мб
620.Business Process Reconstruction.mp4 12.13Мб
621.Recovery Strategies.mp4 9.30Мб
622.Facility Backups.mp4 20.62Мб
623.Compatibility Issues with Offsite Facility.mp4 20.29Мб
624.Tertiary Sites.mp4 6.17Мб
625.Subscription Costs.mp4 22.42Мб
626.Multiple Processing Centers.mp4 7.70Мб
627.Choosing Site Location.mp4 9.45Мб
628.Other Offsite Approaches.mp4 18.43Мб
629.Security Does Not Stop.mp4 12.34Мб
63.Security Roadmap.mp4 15.87Мб
630.More Options.mp4 10.41Мб
631.Rolling Hot Site.mp4 5.15Мб
632.Recovery Strategies (Cont.).mp4 6.99Мб
633.Supply and Technology Recovery.mp4 17.42Мб
634.VoIP.mp4 5.91Мб
635.Equipment Replacement.mp4 26.01Мб
637.Priorities.mp4 9.15Мб
638.Executive Succession Planning.mp4 14.74Мб
639.Recovery Strategies (Cont.).mp4 26.55Мб
64.Functional and Assurance Requirements.mp4 9.53Мб
640.Co-Location.mp4 4.77Мб
641.Data Recovery.mp4 18.37Мб
642.Backup Redundancy.mp4 6.41Мб
643.Recovering Data.mp4 6.94Мб
644.Automated Backup Technologies.mp4 12.50Мб
645.Tape Vaulting.mp4 27.80Мб
646.Clustering for Fault Tolerance.mp4 15.94Мб
647.Disk or Database Shadowing.mp4 41.84Мб
648.Cost and Recovery Times.mp4 18.12Мб
649.Recovery Solutions.mp4 5.49Мб
65.Most Organizations.mp4 28.45Мб
650.Preventative Measures.mp4 12.97Мб
651.Reviewing Insurance.mp4 8.59Мб
652.Results from the BIA.mp4 13.77Мб
653.Basic Structure of BCP.mp4 31.47Мб
654.External Groups.mp4 14.85Мб
655.Activation Phase.mp4 60.88Мб
656.Reconstitution Phase.mp4 21.16Мб
659.Termination of BCP.mp4 5.55Мб
66.Silo Security Structure.mp4 14.15Мб
660.Life Cycle.mp4 20.49Мб
661.Types of Tests to Choose From.mp4 25.66Мб
662.Test Objectives.mp4 10.58Мб
663.Training Requirements.mp4 19.41Мб
666.Keeping It Current.mp4 8.71Мб
667.Change Control.mp4 4.99Мб
668.Resulting Plan Should ContainGǪ.mp4 14.23Мб
669.Phases of the BCP.mp4 4.91Мб
67.Security Is a Process.mp4 11.28Мб
670.Domain 8 Review.mp4 32.19Мб
671.Application Security.mp4 5.87Мб
674.Usual Trend of Dealing with Security.mp4 14.54Мб
675.Software Development Tools.mp4 17.58Мб
676.Security Issues.mp4 12.38Мб
677.Language Types.mp4 28.24Мб
678.Turn Into Machine Code.mp4 5.84Мб
679.New and Old.mp4 4.03Мб
68.Approach to Security Management.mp4 5.01Мб
680.Object-Oriented Programming.mp4 11.23Мб
681.Classes and Objects.mp4 22.33Мб
682.Functions and Messages.mp4 11.04Мб
683.Object-Oriented Programming Characteristic.mp4 9.25Мб
684.Polymorphism.mp4 18.04Мб
685.Module Characteristics.mp4 9.56Мб
686.Low Cohesion.mp4 8.22Мб
687.Coupling.mp4 4.63Мб
688.Agenda 2.mp4 13.59Мб
689.Distributed Computing.mp4 9.14Мб
69.Result of Battling Management.mp4 4.50Мб
690.Distributed Computing GÇö ORBs.mp4 6.15Мб
691.Common Object Request Broker Architecture.mp4 5.16Мб
692.COM Architecture.mp4 16.57Мб
693.Enterprise Java Beans.mp4 8.96Мб
694.J2EE Platform Example.mp4 7.55Мб
695.Linking Through COM.mp4 9.32Мб
696.Mobile Code with Active Content.mp4 21.22Мб
697.Java and Applets.mp4 23.29Мб
698.Database Systems.mp4 17.39Мб
699.Database Model.mp4 18.83Мб
70.Industry Best Practices Standards.mp4 14.83Мб
700.Object-Oriented Database.mp4 7.38Мб
701.Benefits of OO Database Model.mp4 14.26Мб
702.Database Models GÇö Relational Components.mp4 29.26Мб
703.Database Integrity.mp4 10.01Мб
704.Different Modeling Approaches.mp4 4.48Мб
705.Database Access Methods.mp4 50.99Мб
71.Pieces and Parts.mp4 6.68Мб
72.Numbering.mp4 11.86Мб
73.New ISO Standards.mp4 14.77Мб
74.COBIT.mp4 16.79Мб
75.Measurements.mp4 3.33Мб
76.Information Technology Infrastructure Library.mp4 19.18Мб
77.Security Governance.mp4 38.33Мб
78.Security Program Components.mp4 4.48Мб
79.Policy Framework.mp4 45.27Мб
8.Relationships.mp4 8.52Мб
80.Standards.mp4 33.15Мб
81.Data Collection for Metrics.mp4 19.65Мб
82.Tying Them Together.mp4 10.10Мб
83.Entity Relationships.mp4 691.74Кб
84.Senior ManagementGÇÖs Role.mp4 10.94Мб
85.Security Roles.mp4 40.84Мб
86.Information Classification.mp4 6.61Мб
87.Data Leakage.mp4 7.70Мб
89.Types of Classification Levels.mp4 8.05Мб
90.Data Protection Levels.mp4 4.21Мб
91.Classification Program Steps.mp4 30.80Мб
92.Classification Levels.mp4 24.15Мб
93.Information Owner Requirements.mp4 8.42Мб
94.Clearly Labeled.mp4 10.47Мб
95.Testing Classification Program.mp4 6.61Мб
96.Employee Management.mp4 2.90Мб
97.Employee Position and Management.mp4 7.88Мб
98.Hiring and Firing Issues.mp4 14.86Мб
99.Unfriendly Termination.mp4 22.38Мб
Downloaded From PirateBB.org - Business Materials & E-Learning Video Tutorials Download.txt 384б
Статистика распространения по странам
Нидерланды (NL) 2
США (US) 2
Венгрия (HU) 1
Бахрейн (BH) 1
Болгария (BG) 1
Россия (RU) 1
Южная Корея (KR) 1
Испания (ES) 1
ЮАР (ZA) 1
Австралия (AU) 1
Германия (DE) 1
Всего 13
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент