Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[Tutorialsplanet.NET].url |
128б |
1.1 CISSP DOMAIN 7 SLIDES - THOR TEACHES v1.0.3.pdf.pdf |
9.53Мб |
1.1 CISSP DOMAIN 8 SLIDES - THOR TEACHES v1.0.4.pdf.pdf |
7.21Мб |
1. Domain 7 - What we will be covering..mp4 |
18.45Мб |
1. Domain 7 - What we will be covering..vtt |
2.16Кб |
1. Domain 8 - What we will be covering..mp4 |
32.56Мб |
1. Domain 8 - What we will be covering..vtt |
3.68Кб |
1. Introduction..mp4 |
21.54Мб |
1. Introduction..vtt |
2.66Кб |
10. SIEM (Security Information and Event Management..mp4 |
27.47Мб |
10. SIEM (Security Information and Event Management..vtt |
3.11Кб |
10. Software vulnerabilities and Attacks..mp4 |
66.57Мб |
10. Software vulnerabilities and Attacks..vtt |
7.38Кб |
11. Application white-listing..mp4 |
28.13Мб |
11. Application white-listing..vtt |
3.21Кб |
11. Capability Maturity Model (CMM)..mp4 |
79.58Мб |
11. Capability Maturity Model (CMM)..vtt |
9.58Кб |
12. Buying software from other companies..mp4 |
101.94Мб |
12. Buying software from other companies..vtt |
11.95Кб |
12. Honeynets and Honeypots..mp4 |
31.50Мб |
12. Honeynets and Honeypots..vtt |
3.44Кб |
13. Artificial intelligence (AI).mp4 |
59.03Мб |
13. Artificial intelligence (AI).vtt |
6.32Кб |
13. Configuration Management..mp4 |
34.31Мб |
13. Configuration Management..vtt |
4.37Кб |
14. Patch Management..mp4 |
63.36Мб |
14. Patch Management..vtt |
63.37Мб |
14. What we covered in Domain 8..mp4 |
11.40Мб |
14. What we covered in Domain 8..vtt |
1.53Кб |
15. Change management..mp4 |
55.62Мб |
15. Change management..vtt |
6.58Кб |
16. 0-day attacks..mp4 |
52.12Мб |
16. 0-day attacks..vtt |
5.63Кб |
17. Backups..mp4 |
105.30Мб |
17. Backups..vtt |
12.09Кб |
18. RAID (Redundant Array of Independent Disks)..mp4 |
55.81Мб |
18. RAID (Redundant Array of Independent Disks)..vtt |
6.07Кб |
19. Redundancy..mp4 |
90.96Мб |
19. Redundancy..vtt |
90.97Мб |
2. Designing security into our software..mp4 |
40.52Мб |
2. Designing security into our software..vtt |
4.13Кб |
2. Domain 7 key concepts..mp4 |
58.00Мб |
2. Domain 7 key concepts..vtt |
5.59Кб |
2. Introduction to this course!.mp4 |
13.68Мб |
2. Introduction to this course!.vtt |
1.73Кб |
20. BCP and DRP..mp4 |
158.99Мб |
20. BCP and DRP..vtt |
17.06Кб |
21. Warfare, terrorism, sabotage, and ransomware..mp4 |
59.76Мб |
21. Warfare, terrorism, sabotage, and ransomware..vtt |
6.14Кб |
22. Personnel..mp4 |
36.30Мб |
22. Personnel..vtt |
4.08Кб |
23. DRP basics..mp4 |
58.64Мб |
23. DRP basics..vtt |
7.17Кб |
24. Developing our BCP and DRP..mp4 |
113.24Мб |
24. Developing our BCP and DRP..vtt |
12.17Кб |
25. BIA (Business Impact Analysis)..mp4 |
68.80Мб |
25. BIA (Business Impact Analysis)..vtt |
7.98Кб |
26. Supply and infrastructure redundancy..mp4 |
27.26Мб |
26. Supply and infrastructure redundancy..vtt |
3.39Кб |
27. Disaster Recovery sites..mp4 |
81.37Мб |
27. Disaster Recovery sites..vtt |
9.53Кб |
28. Other BCP sub plans..mp4 |
102.40Мб |
28. Other BCP sub plans..vtt |
12.40Кб |
29. Employee redundancy..mp4 |
96.64Мб |
29. Employee redundancy..vtt |
10.69Кб |
3. Administrative personnel controls..mp4 |
80.60Мб |
3. Administrative personnel controls..vtt |
80.62Мб |
3. Programming concepts..mp4 |
135.14Мб |
3. Programming concepts..vtt |
16.46Кб |
3. Why should you want to get the CISSP certification.mp4 |
56.68Мб |
3. Why should you want to get the CISSP certification.vtt |
8.31Кб |
30. Testing the plans..mp4 |
132.71Мб |
30. Testing the plans..vtt |
17.29Кб |
31. After a disruption..mp4 |
79.88Мб |
31. After a disruption..vtt |
10.07Кб |
32. What we covered in Domain 7..mp4 |
40.01Мб |
32. What we covered in Domain 7..vtt |
4.24Кб |
33. (Bonus) Domain 7 - 30 practice questions..html |
127б |
34. Domain 7 links..html |
4.88Кб |
4. Digital forensics..mp4 |
79.03Мб |
4. Digital forensics..vtt |
8.69Кб |
4. Software development methodologies part 1..mp4 |
183.71Мб |
4. Software development methodologies part 1..vtt |
20.81Кб |
4. The 8 CISSP domains or CBKs (Common Bodies of Knowledge)..mp4 |
110.42Мб |
4. The 8 CISSP domains or CBKs (Common Bodies of Knowledge)..vtt |
14.99Кб |
5. Lecture speed..mp4 |
8.38Мб |
5. Lecture speed..vtt |
905б |
5. Software development methodologies part 2..mp4 |
160.40Мб |
5. Software development methodologies part 2..vtt |
18.36Кб |
5. Spinning disk forensics..mp4 |
32.04Мб |
5. Spinning disk forensics..vtt |
3.26Кб |
6. Databases part 1..mp4 |
171.76Мб |
6. Databases part 1..vtt |
18.79Кб |
6. Download all the lecture slides from this course!.mp4 |
8.74Мб |
6. Download all the lecture slides from this course!.vtt |
1.25Кб |
6. Network and Software forensics..mp4 |
66.08Мб |
6. Network and Software forensics..vtt |
8.04Кб |
7. Databases part 2..mp4 |
143.20Мб |
7. Databases part 2..vtt |
15.77Кб |
7. Incident Management definitions..mp4 |
70.48Мб |
7. Incident Management definitions..vtt |
8.55Кб |
7. Links, important topics and where to focus on my slides..mp4 |
19.05Мб |
7. Links, important topics and where to focus on my slides..vtt |
1.77Кб |
8. General CISSP links..html |
1.79Кб |
8. Incident Management..mp4 |
163.68Мб |
8. Incident Management..vtt |
19.62Кб |
8. OWASP part 1..mp4 |
106.48Мб |
8. OWASP part 1..vtt |
11.83Кб |
9. Intrusion detection and prevention systems..mp4 |
106.11Мб |
9. Intrusion detection and prevention systems..vtt |
12.80Кб |
9. OWASP part 2..mp4 |
121.84Мб |
9. OWASP part 2..vtt |
15.19Кб |