Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
1.Introduction.mp4 |
36.49Мб |
10.AIC Triad.mp4 |
25.73Мб |
100.Security Awareness and Training.mp4 |
9.61Мб |
101.Training Characteristics.mp4 |
10.27Мб |
102.Security Enforcement Issues.mp4 |
8.92Мб |
103.Answer This Question.mp4 |
11.32Мб |
104.Domain 1 Review.mp4 |
31.44Мб |
105.Access Control.mp4 |
3.15Мб |
106.Agenda 1.mp4 |
13.14Мб |
107.Access Control Mechanism Examples.mp4 |
10.78Мб |
108.Technical Controls.mp4 |
4.34Мб |
109.Access Control Characteristics.mp4 |
19.58Мб |
110.Preventive Controls.mp4 |
18.47Мб |
111.Control Combinations.mp4 |
2.47Мб |
112.Detective GÇö Administrative Control.mp4 |
21.94Мб |
113.Detective Examples.mp4 |
3.73Мб |
114.Administrating Access Control.mp4 |
22.05Мб |
115.Authorization Creep.mp4 |
9.90Мб |
116.Accountability and Access Control.mp4 |
14.62Мб |
117.Trusted Path.mp4 |
29.76Мб |
118.Fake Login Pages Look Convincing.mp4 |
9.22Мб |
12.Social Engineering.mp4 |
23.05Мб |
120.Identification Issues.mp4 |
8.19Мб |
121.Authentication Mechanisms Characteristics.mp4 |
7.49Мб |
122.Strong Authentication.mp4 |
9.16Мб |
123.Fraud Controls.mp4 |
11.53Мб |
124.Internal Control Tool Separation of Duties.mp4 |
10.00Мб |
125.Authentication Mechanisms in Use Today.mp4 |
17.72Мб |
126.Verification Steps.mp4 |
8.11Мб |
127.What a Person Is.mp4 |
3.61Мб |
13.What Security People Are Really Thinking.mp4 |
12.56Мб |
130.Iris Sampling.mp4 |
4.63Мб |
131.Finger Scan.mp4 |
3.64Мб |
132.Hand Geometry.mp4 |
17.95Мб |
133.Downfalls to Biometric Use.mp4 |
9.04Мб |
134.Biometrics Error Types.mp4 |
11.39Мб |
135.Crossover Error Rate.mp4 |
17.52Мб |
136.Biometric System Types.mp4 |
22.95Мб |
137.Passwords.mp4 |
49.79Мб |
138.Password Attacks.mp4 |
11.17Мб |
139.Attack Steps.mp4 |
11.32Мб |
14.Security Concepts.mp4 |
9.68Мб |
140.Many Tools to Break Your Password.mp4 |
5.00Мб |
141.Rainbow Table.mp4 |
7.07Мб |
142.Passwords Should NOT ContainGǪ.mp4 |
8.95Мб |
143.Countermeasures for Password Cracking.mp4 |
11.34Мб |
144.Cognitive Passwords.mp4 |
4.40Мб |
145.One-Time Password Authentication.mp4 |
16.05Мб |
146.Synchronous Token.mp4 |
10.76Мб |
147.One Type of Solution.mp4 |
13.44Мб |
148.Administrator Configures.mp4 |
885.81Кб |
149.Challenge Response Authentication.mp4 |
15.74Мб |
150.Asynchronous Token Device.mp4 |
22.48Мб |
151.Challenge Response Authentication.mp4 |
1.39Мб |
152.Cryptographic Keys.mp4 |
7.40Мб |
153.Passphrase Authentication.mp4 |
7.21Мб |
154.Key Protection.mp4 |
2.21Мб |
155.Memory Cards.mp4 |
14.00Мб |
156.Memory Card Characteristics.mp4 |
4.18Мб |
157.Smart Card.mp4 |
4.46Мб |
158.Characteristics.mp4 |
11.59Мб |
159.Card Types.mp4 |
3.89Мб |
16.The Bad Guys Are Motivated.mp4 |
15.28Мб |
160.Smart Card Attacks.mp4 |
15.79Мб |
161.Software Attack.mp4 |
5.76Мб |
162.Side Channel Attack.mp4 |
9.09Мб |
163.Side Channel Data Collection.mp4 |
4.66Мб |
164.Microprobing.mp4 |
9.04Мб |
165.Identity Management.mp4 |
23.95Мб |
167.Some Current Issues.mp4 |
13.66Мб |
168.Management.mp4 |
30.36Мб |
169.Typical Chaos.mp4 |
3.57Мб |
17.Open Standards.mp4 |
11.23Мб |
170.Different Identities.mp4 |
10.00Мб |
171.Identity Management Technologies.mp4 |
8.26Мб |
172.Directory Component.mp4 |
13.26Мб |
173.Enterprise Directory.mp4 |
3.82Мб |
174.Directory Responsibilities.mp4 |
10.47Мб |
175.Authoritative Sources.mp4 |
17.97Мб |
176.Meta Directory.mp4 |
13.43Мб |
177.Directory Interactions.mp4 |
8.30Мб |
178.Web Access Management.mp4 |
14.60Мб |
179.Web Access.mp4 |
22.57Мб |
18.Without Standards.mp4 |
7.67Мб |
180.Password Management.mp4 |
23.57Мб |
181.Legacy Single Sign-On.mp4 |
27.47Мб |
182.Account Management Systems.mp4 |
24.18Мб |
183.Provisioning Component.mp4 |
31.26Мб |
184.Profile Update.mp4 |
15.25Мб |
185.Working Together.mp4 |
16.24Мб |
186.Enterprise Directory.mp4 |
4.19Мб |
187.Identity Management Solution Components.mp4 |
29.68Мб |
188.Federated Identity.mp4 |
24.22Мб |
189.Identity Theft.mp4 |
13.19Мб |
19.Controls.mp4 |
29.91Мб |
190.Fake Login Tools.mp4 |
14.89Мб |
191.Instructional Emails.mp4 |
14.23Мб |
192.Knowing What You Are Disposing of Is Important.mp4 |
6.48Мб |
193.Other Examples.mp4 |
4.75Мб |
194.Another Danger to Be Aware ofGǪ Spyware.mp4 |
21.08Мб |
197.New Spyware Is Being Identified Every Week.mp4 |
11.77Мб |
198.How to Prevent Spyware.mp4 |
13.25Мб |
199.Different Technologies.mp4 |
4.03Мб |
2.Information Security and Risk Management.mp4 |
8.44Мб |
20.Holistic Security.mp4 |
28.01Мб |
200.Single Sign-on Technology.mp4 |
32.76Мб |
201.Security Domain.mp4 |
14.69Мб |
202.Domains of Trust.mp4 |
5.38Мб |
203.Thin Clients.mp4 |
9.89Мб |
204.Example.mp4 |
5.94Мб |
205.Kerberos as a Single Sign-on Technology.mp4 |
62.20Мб |
206.Tickets.mp4 |
33.91Мб |
208.Issues Pertaining to Kerberos.mp4 |
8.07Мб |
209.Kerberos Issues.mp4 |
8.51Мб |
21.Different Types of Law.mp4 |
33.59Мб |
210.SESAME as a Single Sign-on Technology.mp4 |
6.48Мб |
211.SESAME Steps for Authentication.mp4 |
10.01Мб |
212.Combo.mp4 |
5.95Мб |
213.Models for Access.mp4 |
9.15Мб |
214.Access Control Models.mp4 |
10.31Мб |
215.ACL Access.mp4 |
5.35Мб |
216.File Permissions.mp4 |
11.91Мб |
217.Security Issues.mp4 |
13.49Мб |
218.Mandatory Access Control Model.mp4 |
12.11Мб |
219.MAC Enforcement Mechanism GÇö Labels.mp4 |
20.81Мб |
220.Formal Model.mp4 |
3.69Мб |
221.Software and Hardware.mp4 |
9.75Мб |
222.Software and Hardware Guards.mp4 |
17.31Мб |
223.MAC versus DAC.mp4 |
4.43Мб |
224.Role-Based Access Control.mp4 |
12.23Мб |
225.RBAC Hierarchy.mp4 |
18.21Мб |
226.Rule-Based Access Control.mp4 |
22.61Мб |
227.Firewall Example.mp4 |
1.35Мб |
228.Access Control Matrix.mp4 |
10.63Мб |
229.Temporal Access Control.mp4 |
9.16Мб |
23.Due Diligence and Due Care.mp4 |
11.99Мб |
230.Access Control Administration.mp4 |
20.53Мб |
231.Remote Centralized Administration.mp4 |
16.24Мб |
232.RADIUS.mp4 |
10.07Мб |
233.RADIUS Characteristics.mp4 |
6.99Мб |
234.TACACS+ Characteristics.mp4 |
15.94Мб |
235.Diameter Characteristics.mp4 |
24.08Мб |
236.Diameter Protocol.mp4 |
5.25Мб |
237.Mobile IP.mp4 |
16.17Мб |
238.Diameter Architecture.mp4 |
6.55Мб |
239.Two Pieces.mp4 |
5.19Мб |
24.Prudent Person Rule.mp4 |
36.29Мб |
240.AVP.mp4 |
17.60Мб |
241.Decentralized Access Control Administration.mp4 |
17.97Мб |
242.Controlling Access to Sensitive Data.mp4 |
37.70Мб |
243.IDS.mp4 |
14.20Мб |
244.IDS Steps.mp4 |
6.56Мб |
245.Network IDS Sensors.mp4 |
12.38Мб |
246.Host IDS.mp4 |
10.59Мб |
247.Combination.mp4 |
6.92Мб |
248.Types of IDSs.mp4 |
25.35Мб |
249.Signature-Based Example.mp4 |
9.11Мб |
25.Risk Management.mp4 |
52.86Мб |
250.Behavior-Based IDS.mp4 |
35.38Мб |
251.Statistical Anomaly.mp4 |
10.98Мб |
252.Statistical IDS.mp4 |
7.75Мб |
253.Protocol Anomaly.mp4 |
12.85Мб |
255.Protocol Anomaly Issues.mp4 |
8.08Мб |
256.Traffic Anomaly.mp4 |
38.43Мб |
257.IDS Response Mechanisms.mp4 |
11.80Мб |
258.Responses to Attacks.mp4 |
8.17Мб |
259.IDS Issues.mp4 |
33.38Мб |
26.Planning Stage GÇö Scope.mp4 |
10.95Мб |
260.Vulnerable IDS.mp4 |
25.13Мб |
261.Domain 2 Review.mp4 |
24.66Мб |
262.Cryptography.mp4 |
10.51Мб |
263.Services Provided by Cryptography.mp4 |
12.38Мб |
264.Cryptographic Definitions.mp4 |
13.05Мб |
265.Cipher.mp4 |
10.32Мб |
266.A Few More Definitions.mp4 |
21.98Мб |
267.Symmetric Cryptography GÇö Use of Secret Keys.mp4 |
14.23Мб |
268.Scytale Cipher.mp4 |
6.27Мб |
269.Substitution Ciphers.mp4 |
19.42Мб |
27.Planning Stage GÇö Analysis Method.mp4 |
6.83Мб |
270.Simple Substitution Cipher Atbash.mp4 |
10.86Мб |
271.Caesar Cipher Example.mp4 |
7.91Мб |
272.Simple Substitution Cipher ROT13.mp4 |
8.42Мб |
273.Historical Uses.mp4 |
19.49Мб |
274.Vigenere Algorithm.mp4 |
11.49Мб |
275.Enigma Machine.mp4 |
51.03Мб |
276.Historical Uses of Symmetric Cryptography GÇö Running Key and Concealment.mp4 |
18.55Мб |
277.Agenda 1.mp4 |
2.42Мб |
278.Transposition Ciphers.mp4 |
6.96Мб |
279.Key and Algorithm Relationship.mp4 |
24.19Мб |
28.Risk Management Tools.mp4 |
8.98Мб |
280.Ways of Breaking Cryptosystems GÇö Brute Force.mp4 |
18.70Мб |
281.Brute Force Components.mp4 |
7.47Мб |
282.Ways of Breaking Cryptosystems GÇö Frequency Analysis.mp4 |
11.13Мб |
283.Strength of a Cryptosystem.mp4 |
23.01Мб |
284.Developing Cryptographic Solutions In-House.mp4 |
12.67Мб |
285.Characteristics of Strong Algorithms.mp4 |
20.56Мб |
287.Types of Ciphers Used Today.mp4 |
13.08Мб |
288.S-Boxes Used in Block Ciphers.mp4 |
7.71Мб |
289.Binary Mathematical Function 1.mp4 |
8.27Мб |
29.Defining Acceptable Levels.mp4 |
17.31Мб |
290.Type of Symmetric Cipher GÇö Stream Cipher.mp4 |
8.05Мб |
291.Symmetric Characteristics.mp4 |
4.19Мб |
292.Initialization Vectors.mp4 |
17.23Мб |
293.Security Holes.mp4 |
50.89Мб |
294.Strength of a Stream Cipher.mp4 |
21.72Мб |
295.Out-of-Band Transmission.mp4 |
6.03Мб |
296.Symmetric Key Management Issue.mp4 |
24.39Мб |
297.Asymmetric Cryptography.mp4 |
9.52Мб |
298.Key Functions.mp4 |
9.43Мб |
299.Public Key Cryptography Advantages.mp4 |
17.43Мб |
3.Mainframe Days.mp4 |
27.24Мб |
30.Acceptable Risk Level.mp4 |
6.28Мб |
300.Asymmetric Algorithm Disadvantages.mp4 |
12.50Мб |
301.Confusing Names.mp4 |
16.40Мб |
302.Symmetric versus Asymmetric.mp4 |
5.53Мб |
303.Questions 1.mp4 |
45.88Мб |
304.When to Use Which Key.mp4 |
17.32Мб |
305.Encryption Steps.mp4 |
9.36Мб |
306.ReceiverGÇÖs Public Key Is Used to Encrypt the Symmetric Key.mp4 |
3.11Мб |
307.ReceiverGÇÖs Private Key Is Used to Decrypt the Symmetric Key.mp4 |
6.49Мб |
308.Digital Envelope.mp4 |
8.77Мб |
309.Secret versus Session Keys.mp4 |
10.15Мб |
31.Collecting and Analyzing Data Methods.mp4 |
10.71Мб |
310.Asymmetric Algorithms We Will Dive Into.mp4 |
14.21Мб |
311.Diffie-Hellman.mp4 |
36.65Мб |
312.Key Agreement Schemes.mp4 |
8.33Мб |
313.Asymmetric Algorithm GÇö RSA.mp4 |
11.40Мб |
314.Factoring Large Numbers.mp4 |
5.92Мб |
315.RSA Operations.mp4 |
5.55Мб |
316.RSA Key Size.mp4 |
4.25Мб |
317.El Gamal.mp4 |
14.73Мб |
318.Asymmetric Mathematics.mp4 |
35.43Мб |
319.Asymmetric Security.mp4 |
7.68Мб |
320.Mathematics.mp4 |
66.03Мб |
321.Block Cipher.mp4 |
5.70Мб |
322.Double DES.mp4 |
16.09Мб |
323.Evolution of DES.mp4 |
4.94Мб |
324.Modes of 3DES.mp4 |
6.82Мб |
325.Encryption Modes.mp4 |
17.34Мб |
326.Block Cipher Modes GÇö CBC.mp4 |
14.67Мб |
327.Different Modes of Block Ciphers GÇö ECB.mp4 |
7.59Мб |
328.ECB versus CBC.mp4 |
5.27Мб |
329.Block Cipher Modes GÇö CFB and OFB.mp4 |
40.99Мб |
33.Data Collection GÇö Identify Assets.mp4 |
5.26Мб |
330.CFB and OFB Modes.mp4 |
9.25Мб |
331.Counter Mode.mp4 |
20.79Мб |
332.Modes Summary.mp4 |
17.85Мб |
333.Symmetric Ciphers.mp4 |
24.75Мб |
334.Data Integrity.mp4 |
8.67Мб |
335.Hashing Steps.mp4 |
3.54Мб |
336.Protecting the Integrity of Data.mp4 |
10.31Мб |
337.Hashing Algorithms.mp4 |
11.94Мб |
338.Data Integrity Mechanisms.mp4 |
7.05Мб |
339.Hashing Strength.mp4 |
5.92Мб |
34.Data Collection GÇö Assigning Values.mp4 |
10.06Мб |
340.Question 1.mp4 |
3.63Мб |
341.Weakness In Using Only Hash Algorithms.mp4 |
4.75Мб |
342.More Protection In Data Integrity.mp4 |
6.86Мб |
343.MAC.mp4 |
7.24Мб |
344.HMAC GÇö Sender.mp4 |
10.62Мб |
345.Another Look.mp4 |
4.80Мб |
346.What Services.mp4 |
10.80Мб |
347.CBC-MAC.mp4 |
4.72Мб |
348.MAC Using Block Ciphers.mp4 |
9.97Мб |
35.Asset Value.mp4 |
6.07Мб |
351.Question 2.mp4 |
14.57Мб |
352.Digital Signatures.mp4 |
15.31Мб |
353.U.S. Government Standard.mp4 |
5.97Мб |
354.What IsGǪ.mp4 |
3.31Мб |
355.Not Giving Up the Farm.mp4 |
8.59Мб |
356.Zero Knowledge Proof.mp4 |
11.24Мб |
357.Message Integrity Controls.mp4 |
4.75Мб |
358.Security Issues In Hashing.mp4 |
7.94Мб |
359.Example of a Birthday Attack.mp4 |
29.74Мб |
36.Data Collection GÇö Identify Threats.mp4 |
13.06Мб |
360.Birthday Attack Issues.mp4 |
8.75Мб |
361.Key Management.mp4 |
20.16Мб |
362.Key Usage.mp4 |
18.40Мб |
363.M-of-N.mp4 |
18.02Мб |
364.Key Types.mp4 |
6.54Мб |
366.PKI and Its Components.mp4 |
16.88Мб |
367.RA Roles.mp4 |
25.09Мб |
368.CA.mp4 |
12.19Мб |
369.Digital Certificates.mp4 |
11.57Мб |
37.Data Collection GÇö Calculate Risks.mp4 |
16.27Мб |
370.Certificate.mp4 |
3.78Мб |
371.Signing the Certificate.mp4 |
3.76Мб |
372.Verifying the Certificate.mp4 |
17.99Мб |
373.Trusted CAGÇÖs.mp4 |
15.07Мб |
374.Non-Trusted CA.mp4 |
14.46Мб |
376.Components of PKI Repository and CRLs.mp4 |
23.63Мб |
378.CRL Process.mp4 |
11.93Мб |
379.Different Uses for Certificates.mp4 |
12.06Мб |
38.Scenario Based GÇö Qualitative.mp4 |
3.49Мб |
380.Cross Certification.mp4 |
17.83Мб |
381.PKI and Trust.mp4 |
17.25Мб |
382.Historical Uses of Symmetric Cryptography.mp4 |
15.77Мб |
383.Binary Mathematical Function 2.mp4 |
13.12Мб |
384.One-Time Pad in Action.mp4 |
4.08Мб |
385.One-Time Pad Characteristics.mp4 |
26.74Мб |
386.Steganography.mp4 |
19.47Мб |
387.Digital Watermarking.mp4 |
6.88Мб |
388.Link versus End-to-End Encryption.mp4 |
21.24Мб |
389.End-to-End Encryption.mp4 |
15.03Мб |
39.Risk Approach.mp4 |
2.35Мб |
390.Encryption Location.mp4 |
4.99Мб |
391.Email Standards.mp4 |
15.03Мб |
392.You Decide.mp4 |
10.18Мб |
393.Non-Hierarchical.mp4 |
6.46Мб |
394.Secure Protocols.mp4 |
10.94Мб |
395.SSL Connection Setup.mp4 |
31.63Мб |
396.Example GÇö SSL.mp4 |
3.52Мб |
397.Validating Certificate.mp4 |
3.91Мб |
398.Secure Protocols (Cont.).mp4 |
22.76Мб |
399.SSL and the OSI Model.mp4 |
8.54Мб |
4.TodayGÇÖs Environment.mp4 |
8.69Мб |
40.Qualitative Analysis Steps.mp4 |
6.54Мб |
400.E-Commerce.mp4 |
23.70Мб |
402.Secure Email Standard.mp4 |
13.73Мб |
403.Network Layer Protection.mp4 |
30.26Мб |
404.IPSec Key Management.mp4 |
12.01Мб |
405.IPSec Handshaking Process.mp4 |
9.83Мб |
406.VPN Establishment.mp4 |
6.98Мб |
407.SAs In Use.mp4 |
16.21Мб |
408.Key Issues within IPSec.mp4 |
19.14Мб |
409.Configuration of SA Parameters.mp4 |
5.62Мб |
410.IPSec Configuration Options.mp4 |
4.05Мб |
411.IPSec Is a Suite of Protocols.mp4 |
33.00Мб |
412.AH and ESP Modes.mp4 |
9.93Мб |
413.IPSec Modes of Operation.mp4 |
7.18Мб |
414.VPN Establishment (Cont.).mp4 |
10.40Мб |
415.Review.mp4 |
8.70Мб |
416.Questions 2.mp4 |
23.67Мб |
417.Attack Types.mp4 |
7.00Мб |
418.Attacks on Cryptosystems.mp4 |
7.44Мб |
419.Known-Plaintext Attack.mp4 |
19.11Мб |
42.Qualitative Risk Analysis.mp4 |
25.44Мб |
420.Chosen-Plaintext Attack.mp4 |
11.87Мб |
421.Chosen-Ciphertext Attack.mp4 |
11.05Мб |
422.Adaptive Attacks.mp4 |
4.60Мб |
423.Side Channel Attacks.mp4 |
13.04Мб |
424.Domain 3 Review.mp4 |
31.80Мб |
425.Physical Security.mp4 |
1.80Мб |
426.Different Types of Threats.mp4 |
4.83Мб |
427.Wake Up Call.mp4 |
12.13Мб |
428.Legal Issues.mp4 |
8.27Мб |
429.Physical Security Program Goals.mp4 |
13.49Мб |
43.ARO Values.mp4 |
59.79Мб |
430.Planning Process.mp4 |
14.00Мб |
431.Deterrence.mp4 |
9.71Мб |
432.Delay.mp4 |
2.46Мб |
433.Layered Defense Model.mp4 |
16.62Мб |
434.Weak Link In the Chain.mp4 |
3.31Мб |
435.Threat Categories.mp4 |
9.43Мб |
436.Crime Prevention Through Environmental Design.mp4 |
28.00Мб |
437.Construction Materials.mp4 |
19.82Мб |
438.Security Zones.mp4 |
55.82Мб |
439.Entrance Protection.mp4 |
71.13Мб |
440.Perimeter Security GÇö Security Guards.mp4 |
50.18Мб |
441.Types of Physical Intrusion Detection Systems.mp4 |
40.07Мб |
442.Alarm Systems.mp4 |
61.19Мб |
443.Electrical Power.mp4 |
58.38Мб |
444.Fire Prevention.mp4 |
110.94Мб |
445.Domain 4 Review.mp4 |
80.44Мб |
446.Security Architecture and Design.mp4 |
13.44Мб |
447.Central Processing Unit (CPU).mp4 |
11.38Мб |
448.Registers.mp4 |
25.76Мб |
449.Trust Levels and Processes.mp4 |
23.99Мб |
45.Risk Types.mp4 |
6.65Мб |
450.Interrupts.mp4 |
29.24Мб |
451.Bussses.mp4 |
14.01Мб |
452.Multiprocessing and Multitasking.mp4 |
58.55Мб |
453.Memory Types.mp4 |
116.52Мб |
454.CPU and OS.mp4 |
186.37Мб |
455.Trusted Computing Base.mp4 |
118.21Мб |
456.Security Levels.mp4 |
38.81Мб |
457.Enterprise Architecture.mp4 |
157.21Мб |
458.Access Control Models.mp4 |
50.08Мб |
459.Bell-LaPadula.mp4 |
120.35Мб |
46.Losses.mp4 |
14.55Мб |
460.Clark-Wilson Model.mp4 |
36.82Мб |
461.Non-Interference Model.mp4 |
30.67Мб |
462.Access Control Matrix Model.mp4 |
45.26Мб |
463.Trusted Computer System Evaluation Criteria (TCSEC).mp4 |
121.28Мб |
464.Domain 5 Review.mp4 |
202.80Мб |
465.Law Investigation and Ethics.mp4 |
8.35Мб |
466.Examples of Computer Crimes.mp4 |
7.33Мб |
468.A Few Attack Types.mp4 |
38.53Мб |
469.Privacy of Sensitive Data.mp4 |
54.80Мб |
47.CostBenefit Analysis.mp4 |
6.29Мб |
470.Different Types of Laws.mp4 |
43.84Мб |
471.Computer Crime and Its Barriers.mp4 |
112.97Мб |
472.Preparing for a Crime Before It Happens.mp4 |
189.22Мб |
473.Domain 6 Review.mp4 |
97.19Мб |
474.Telecommunications and Networking.mp4 |
3.33Мб |
475.OSI Model.mp4 |
25.17Мб |
476.Networking Communications.mp4 |
19.15Мб |
477.Application Layer.mp4 |
16.53Мб |
478.Presentation Layer.mp4 |
20.47Мб |
479.OSI GÇö Session Layer.mp4 |
18.67Мб |
48.Cost of a Countermeasure.mp4 |
14.00Мб |
480.Transport Layer.mp4 |
26.22Мб |
481.Network Layer.mp4 |
19.13Мб |
482.Data Link Layer.mp4 |
42.82Мб |
483.Physical Layer.mp4 |
16.13Мб |
484.Layers Working Together.mp4 |
55.96Мб |
485.Network Topologies.mp4 |
59.01Мб |
486.LAN Media Access Technologies.mp4 |
23.82Мб |
487.Media Access Technologies.mp4 |
111.61Мб |
488.Cabling Types-Coaxial.mp4 |
11.02Мб |
489.Cabling Types GÇö Twisted Pair.mp4 |
11.24Мб |
49.CostBenefit Analysis Countermeasure Criteria.mp4 |
29.16Мб |
490.Types of Cabling GÇö Fiber.mp4 |
8.93Мб |
491.Signal and Cable Issues.mp4 |
20.12Мб |
492.Transmission Types.mp4 |
90.13Мб |
493.Network Technologies.mp4 |
25.61Мб |
494.Networking Devices.mp4 |
49.58Мб |
495.Virtual LANs.mp4 |
19.91Мб |
496.Sniffers.mp4 |
24.76Мб |
497.Networking Devices GÇö Router.mp4 |
11.43Мб |
498.Hops.mp4 |
3.47Мб |
499.Routers.mp4 |
8.30Мб |
5.Security Definitions.mp4 |
14.69Мб |
50.Calculating CostBenefit.mp4 |
5.93Мб |
500.Bridges Compared to Routers.mp4 |
10.48Мб |
501.Port and Protocol Relationship.mp4 |
32.73Мб |
502.TCPIP Suite.mp4 |
7.10Мб |
503.UDP versus TCP.mp4 |
25.42Мб |
504.TCP Segment.mp4 |
4.64Мб |
505.SYN Flood.mp4 |
27.91Мб |
506.Teardrop Attack.mp4 |
21.47Мб |
507.Source Routing.mp4 |
10.99Мб |
508.Source Routing Types.mp4 |
8.60Мб |
509.IP Address Ranges.mp4 |
18.49Мб |
51.Controls II.mp4 |
20.47Мб |
510.IPv6.mp4 |
22.77Мб |
511.Protocols.mp4 |
624.40Кб |
512.Protocols GÇö ARP.mp4 |
4.84Мб |
513.IP to MAC Mapping.mp4 |
3.60Мб |
514.How ARP Works.mp4 |
6.46Мб |
515.ARP Poisoning.mp4 |
5.83Мб |
516.ICMP Packets.mp4 |
6.30Мб |
517.A Way Hackers Use ICMP.mp4 |
6.73Мб |
518.Ping Steps.mp4 |
5.48Мб |
519.Protocols GÇö SNMP.mp4 |
7.73Мб |
52.Quantitative Analysis.mp4 |
23.16Мб |
520.SNMP In Action.mp4 |
10.23Мб |
521.SNMP.mp4 |
10.62Мб |
522.SNMP Output.mp4 |
5.30Мб |
523.POP3 and SMTP.mp4 |
6.54Мб |
524.Mail Relay.mp4 |
20.49Мб |
525.Protocols GÇö FTP TFTP Telnet.mp4 |
14.58Мб |
526.Protocols GÇö RARP and BootP.mp4 |
6.24Мб |
527.DHCP GÇö Dynamic Host Configuration Protocol.mp4 |
10.31Мб |
528.Networking Device GÇö Bastion Host.mp4 |
25.46Мб |
529.Network Devices GÇö Firewalls.mp4 |
57.14Мб |
530.Rule Set Example.mp4 |
6.95Мб |
531.Firewall Types GÇö Proxy Firewalls.mp4 |
18.00Мб |
532.Firewall Types GÇö Circuit-Level Proxy Firewall.mp4 |
17.90Мб |
533.Circuit-Level Proxy.mp4 |
55.65Мб |
534.Dedicated Proxy Servers.mp4 |
174.54Мб |
535.Dial-Up Protocols and Authentication Protocols.mp4 |
43.79Мб |
536.Authentication Protocols.mp4 |
75.58Мб |
537.Virtual Private Network Technologies.mp4 |
138.81Мб |
538.SDLC and HDLC.mp4 |
44.75Мб |
539.Quality of Service (QoS).mp4 |
19.52Мб |
54.Uncertainty Analysis.mp4 |
12.16Мб |
540.Autonomous Systems.mp4 |
15.57Мб |
541.Routing Protocols.mp4 |
86.23Мб |
542.Routing Protocol Attacks.mp4 |
124.51Мб |
543.Network Service GÇö NAT.mp4 |
51.44Мб |
544.WAN Technologies Are Circuit or Packet Switched.mp4 |
11.88Мб |
545.PSTN.mp4 |
17.01Мб |
546.Multiplexing.mp4 |
11.02Мб |
547.Types of Multiplexing.mp4 |
29.14Мб |
548.Packet Switching.mp4 |
35.32Мб |
549.WAN Technologies GÇö Packet Switched.mp4 |
1.59Мб |
55.Dealing with Risk.mp4 |
13.84Мб |
550.WAN Technologies GÇö X.25.mp4 |
4.40Мб |
551.X.25.mp4 |
11.70Мб |
552.WAN Technologies GÇö Frame Relay.mp4 |
17.50Мб |
553.WAN Example.mp4 |
3.70Мб |
554.Frame Relay.mp4 |
22.31Мб |
555.WAN Technologies GÇö ATM.mp4 |
8.48Мб |
556.Cell Switching.mp4 |
3.86Мб |
557.Wide Area Network Technologies.mp4 |
44.46Мб |
558.WAN Technologies GÇö Cable Modem.mp4 |
11.84Мб |
559.Cable Modems and Satellites.mp4 |
25.27Мб |
56.ManagementGÇÖs Response to Identified Risks.mp4 |
8.19Мб |
560.Network Perimeter Security.mp4 |
10.43Мб |
561.Complexity Only Increases.mp4 |
5.49Мб |
562.Agenda 9.mp4 |
12.39Мб |
563.PSTN (Cont.).mp4 |
10.54Мб |
564.Private Branch Exchange.mp4 |
9.27Мб |
565.PBX Vulnerabilities.mp4 |
15.26Мб |
566.PBX Best Practices.mp4 |
15.89Мб |
567.IP Telephony.mp4 |
115.54Мб |
568.Mobile Phone Security.mp4 |
12.84Мб |
569.Mobile Device Security.mp4 |
11.39Мб |
57.Risk Acceptance.mp4 |
7.16Мб |
570.Cell Phone.mp4 |
26.58Мб |
571.Wireless Technologies.mp4 |
121.42Мб |
572.OFDM.mp4 |
15.49Мб |
573.802.11n.mp4 |
12.13Мб |
574.Wireless Technologies GÇö Access Point (Cont.).mp4 |
6.37Мб |
575.Architectures.mp4 |
3.87Мб |
576.Wireless Technologies GÇö Service Set ID.mp4 |
11.45Мб |
577.Authenticating to an AP.mp4 |
9.93Мб |
578.802.11 Authentication.mp4 |
11.34Мб |
579.Wireless Technologies GÇö WEP Woes.mp4 |
54.79Мб |
58.Risk Analysis Process Summary.mp4 |
6.14Мб |
580.802.11 Security Solutions.mp4 |
51.29Мб |
581.Types of 802.11 Security.mp4 |
15.71Мб |
582.Wireless EAP.mp4 |
144.96Мб |
583.Wireless Technologies GÇö WAP and WTLS.mp4 |
29.64Мб |
584.Instant Messaging.mp4 |
22.67Мб |
585.Domain 7 Review.mp4 |
16.78Мб |
586.Business Continuity.mp4 |
7.20Мб |
587.Needs for BCP.mp4 |
30.00Мб |
588.911 Changed Mentalities About BCP.mp4 |
25.47Мб |
59.Components of Security Program.mp4 |
7.85Мб |
591.More Reasons to Have Plans in Place.mp4 |
19.35Мб |
592.BCP Is a Core Component of Every Security Program.mp4 |
4.39Мб |
593.Steps of BCP Process.mp4 |
11.74Мб |
594.Different BCP Model.mp4 |
12.60Мб |
595.Documentation.mp4 |
8.31Мб |
596.BCP Policy Outlines.mp4 |
13.94Мб |
599.BCP Development Team.mp4 |
9.19Мб |
6.Examples of Some Vulnerabilities that Are Not Always Obvious.mp4 |
14.57Мб |
60.A Layered Approach.mp4 |
8.63Мб |
600.Project Sizing.mp4 |
17.41Мб |
601.Properly Determining Scope Is Important.mp4 |
8.51Мб |
602.BCP Risk Analysis Steps.mp4 |
17.37Мб |
603.BIA Steps.mp4 |
15.65Мб |
604.Information from Different Sources.mp4 |
6.79Мб |
605.Analysis.mp4 |
12.65Мб |
606.How to Identify the Most Critical Company Functions.mp4 |
27.74Мб |
607.Interdependencies.mp4 |
4.60Мб |
608.Well Of Course an Organization Knows How It Works!.mp4 |
9.08Мб |
609.Business Silos.mp4 |
48.38Мб |
61.In Security You Never Want Any Surprises.mp4 |
8.87Мб |
610.Maximum Tolerable Downtime.mp4 |
37.78Мб |
611.Range of Threats to Consider.mp4 |
26.69Мб |
612.Thinking Outside of the Box What IfGǪ.mp4 |
9.46Мб |
613.Biological Threats.mp4 |
7.76Мб |
614.BIA Steps (Cont.).mp4 |
9.71Мб |
615.Potential Disasters.mp4 |
13.19Мб |
616.Risk Approach.mp4 |
19.13Мб |
618.Recovery Strategies.mp4 |
12.80Мб |
619.Alternate Business Process Procedures.mp4 |
18.77Мб |
62.Building Foundation.mp4 |
4.11Мб |
620.Business Process Reconstruction.mp4 |
12.13Мб |
621.Recovery Strategies.mp4 |
9.30Мб |
622.Facility Backups.mp4 |
20.62Мб |
623.Compatibility Issues with Offsite Facility.mp4 |
20.29Мб |
624.Tertiary Sites.mp4 |
6.17Мб |
625.Subscription Costs.mp4 |
22.42Мб |
626.Multiple Processing Centers.mp4 |
7.70Мб |
627.Choosing Site Location.mp4 |
9.45Мб |
628.Other Offsite Approaches.mp4 |
18.43Мб |
629.Security Does Not Stop.mp4 |
12.34Мб |
63.Security Roadmap.mp4 |
15.87Мб |
630.More Options.mp4 |
10.41Мб |
631.Rolling Hot Site.mp4 |
5.15Мб |
632.Recovery Strategies (Cont.).mp4 |
6.99Мб |
633.Supply and Technology Recovery.mp4 |
17.42Мб |
634.VoIP.mp4 |
5.91Мб |
635.Equipment Replacement.mp4 |
26.01Мб |
637.Priorities.mp4 |
9.15Мб |
638.Executive Succession Planning.mp4 |
14.74Мб |
639.Recovery Strategies (Cont.).mp4 |
26.55Мб |
64.Functional and Assurance Requirements.mp4 |
9.53Мб |
640.Co-Location.mp4 |
4.77Мб |
641.Data Recovery.mp4 |
18.37Мб |
642.Backup Redundancy.mp4 |
6.41Мб |
643.Recovering Data.mp4 |
6.94Мб |
644.Automated Backup Technologies.mp4 |
12.50Мб |
645.Tape Vaulting.mp4 |
27.80Мб |
646.Clustering for Fault Tolerance.mp4 |
15.94Мб |
647.Disk or Database Shadowing.mp4 |
41.84Мб |
648.Cost and Recovery Times.mp4 |
18.12Мб |
649.Recovery Solutions.mp4 |
5.49Мб |
65.Most Organizations.mp4 |
28.45Мб |
650.Preventative Measures.mp4 |
12.97Мб |
651.Reviewing Insurance.mp4 |
8.59Мб |
652.Results from the BIA.mp4 |
13.77Мб |
653.Basic Structure of BCP.mp4 |
31.47Мб |
654.External Groups.mp4 |
14.85Мб |
655.Activation Phase.mp4 |
60.88Мб |
656.Reconstitution Phase.mp4 |
21.16Мб |
659.Termination of BCP.mp4 |
5.55Мб |
66.Silo Security Structure.mp4 |
14.15Мб |
660.Life Cycle.mp4 |
20.49Мб |
661.Types of Tests to Choose From.mp4 |
25.66Мб |
662.Test Objectives.mp4 |
10.58Мб |
663.Training Requirements.mp4 |
19.41Мб |
666.Keeping It Current.mp4 |
8.71Мб |
667.Change Control.mp4 |
4.99Мб |
668.Resulting Plan Should ContainGǪ.mp4 |
14.23Мб |
669.Phases of the BCP.mp4 |
4.91Мб |
67.Security Is a Process.mp4 |
11.28Мб |
670.Domain 8 Review.mp4 |
32.19Мб |
671.Application Security.mp4 |
5.87Мб |
674.Usual Trend of Dealing with Security.mp4 |
14.54Мб |
675.Software Development Tools.mp4 |
17.58Мб |
676.Security Issues.mp4 |
12.38Мб |
677.Language Types.mp4 |
28.24Мб |
678.Turn Into Machine Code.mp4 |
5.84Мб |
679.New and Old.mp4 |
4.03Мб |
68.Approach to Security Management.mp4 |
5.01Мб |
680.Object-Oriented Programming.mp4 |
11.23Мб |
681.Classes and Objects.mp4 |
22.33Мб |
682.Functions and Messages.mp4 |
11.04Мб |
683.Object-Oriented Programming Characteristic.mp4 |
9.25Мб |
684.Polymorphism.mp4 |
18.04Мб |
685.Module Characteristics.mp4 |
9.56Мб |
686.Low Cohesion.mp4 |
8.22Мб |
687.Coupling.mp4 |
4.63Мб |
688.Agenda 2.mp4 |
13.59Мб |
689.Distributed Computing.mp4 |
9.14Мб |
69.Result of Battling Management.mp4 |
4.50Мб |
690.Distributed Computing GÇö ORBs.mp4 |
6.15Мб |
691.Common Object Request Broker Architecture.mp4 |
5.16Мб |
692.COM Architecture.mp4 |
16.57Мб |
693.Enterprise Java Beans.mp4 |
8.96Мб |
694.J2EE Platform Example.mp4 |
7.55Мб |
695.Linking Through COM.mp4 |
9.32Мб |
696.Mobile Code with Active Content.mp4 |
21.22Мб |
697.Java and Applets.mp4 |
23.29Мб |
698.Database Systems.mp4 |
17.39Мб |
699.Database Model.mp4 |
18.83Мб |
70.Industry Best Practices Standards.mp4 |
14.83Мб |
700.Object-Oriented Database.mp4 |
7.38Мб |
701.Benefits of OO Database Model.mp4 |
14.26Мб |
702.Database Models GÇö Relational Components.mp4 |
29.26Мб |
703.Database Integrity.mp4 |
10.01Мб |
704.Different Modeling Approaches.mp4 |
4.48Мб |
705.Database Access Methods.mp4 |
50.99Мб |
71.Pieces and Parts.mp4 |
6.68Мб |
72.Numbering.mp4 |
11.86Мб |
73.New ISO Standards.mp4 |
14.77Мб |
74.COBIT.mp4 |
16.79Мб |
75.Measurements.mp4 |
3.33Мб |
76.Information Technology Infrastructure Library.mp4 |
19.18Мб |
77.Security Governance.mp4 |
38.33Мб |
78.Security Program Components.mp4 |
4.48Мб |
79.Policy Framework.mp4 |
45.27Мб |
8.Relationships.mp4 |
8.52Мб |
80.Standards.mp4 |
33.15Мб |
81.Data Collection for Metrics.mp4 |
19.65Мб |
82.Tying Them Together.mp4 |
10.10Мб |
83.Entity Relationships.mp4 |
691.74Кб |
84.Senior ManagementGÇÖs Role.mp4 |
10.94Мб |
85.Security Roles.mp4 |
40.84Мб |
86.Information Classification.mp4 |
6.61Мб |
87.Data Leakage.mp4 |
7.70Мб |
89.Types of Classification Levels.mp4 |
8.05Мб |
90.Data Protection Levels.mp4 |
4.21Мб |
91.Classification Program Steps.mp4 |
30.80Мб |
92.Classification Levels.mp4 |
24.15Мб |
93.Information Owner Requirements.mp4 |
8.42Мб |
94.Clearly Labeled.mp4 |
10.47Мб |
95.Testing Classification Program.mp4 |
6.61Мб |
96.Employee Management.mp4 |
2.90Мб |
97.Employee Position and Management.mp4 |
7.88Мб |
98.Hiring and Firing Issues.mp4 |
14.86Мб |
99.Unfriendly Termination.mp4 |
22.38Мб |
Downloaded From PirateBB.org - Business Materials & E-Learning Video Tutorials Download.txt |
384б |