Общая информация
Название [Tutorialsplanet.NET] Udemy - CISSP Certification CISSP Domain 7 & 8 Video Boot Camp 2019
Тип
Размер 4.08Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[Tutorialsplanet.NET].url 128б
1.1 CISSP DOMAIN 7 SLIDES - THOR TEACHES v1.0.3.pdf.pdf 9.53Мб
1.1 CISSP DOMAIN 8 SLIDES - THOR TEACHES v1.0.4.pdf.pdf 7.21Мб
1. Domain 7 - What we will be covering..mp4 18.45Мб
1. Domain 7 - What we will be covering..vtt 2.16Кб
1. Domain 8 - What we will be covering..mp4 32.56Мб
1. Domain 8 - What we will be covering..vtt 3.68Кб
1. Introduction..mp4 21.54Мб
1. Introduction..vtt 2.66Кб
10. SIEM (Security Information and Event Management..mp4 27.47Мб
10. SIEM (Security Information and Event Management..vtt 3.11Кб
10. Software vulnerabilities and Attacks..mp4 66.57Мб
10. Software vulnerabilities and Attacks..vtt 7.38Кб
11. Application white-listing..mp4 28.13Мб
11. Application white-listing..vtt 3.21Кб
11. Capability Maturity Model (CMM)..mp4 79.58Мб
11. Capability Maturity Model (CMM)..vtt 9.58Кб
12. Buying software from other companies..mp4 101.94Мб
12. Buying software from other companies..vtt 11.95Кб
12. Honeynets and Honeypots..mp4 31.50Мб
12. Honeynets and Honeypots..vtt 3.44Кб
13. Artificial intelligence (AI).mp4 59.03Мб
13. Artificial intelligence (AI).vtt 6.32Кб
13. Configuration Management..mp4 34.31Мб
13. Configuration Management..vtt 4.37Кб
14. Patch Management..mp4 63.36Мб
14. Patch Management..vtt 63.37Мб
14. What we covered in Domain 8..mp4 11.40Мб
14. What we covered in Domain 8..vtt 1.53Кб
15. Change management..mp4 55.62Мб
15. Change management..vtt 6.58Кб
16. 0-day attacks..mp4 52.12Мб
16. 0-day attacks..vtt 5.63Кб
17. Backups..mp4 105.30Мб
17. Backups..vtt 12.09Кб
18. RAID (Redundant Array of Independent Disks)..mp4 55.81Мб
18. RAID (Redundant Array of Independent Disks)..vtt 6.07Кб
19. Redundancy..mp4 90.96Мб
19. Redundancy..vtt 90.97Мб
2. Designing security into our software..mp4 40.52Мб
2. Designing security into our software..vtt 4.13Кб
2. Domain 7 key concepts..mp4 58.00Мб
2. Domain 7 key concepts..vtt 5.59Кб
2. Introduction to this course!.mp4 13.68Мб
2. Introduction to this course!.vtt 1.73Кб
20. BCP and DRP..mp4 158.99Мб
20. BCP and DRP..vtt 17.06Кб
21. Warfare, terrorism, sabotage, and ransomware..mp4 59.76Мб
21. Warfare, terrorism, sabotage, and ransomware..vtt 6.14Кб
22. Personnel..mp4 36.30Мб
22. Personnel..vtt 4.08Кб
23. DRP basics..mp4 58.64Мб
23. DRP basics..vtt 7.17Кб
24. Developing our BCP and DRP..mp4 113.24Мб
24. Developing our BCP and DRP..vtt 12.17Кб
25. BIA (Business Impact Analysis)..mp4 68.80Мб
25. BIA (Business Impact Analysis)..vtt 7.98Кб
26. Supply and infrastructure redundancy..mp4 27.26Мб
26. Supply and infrastructure redundancy..vtt 3.39Кб
27. Disaster Recovery sites..mp4 81.37Мб
27. Disaster Recovery sites..vtt 9.53Кб
28. Other BCP sub plans..mp4 102.40Мб
28. Other BCP sub plans..vtt 12.40Кб
29. Employee redundancy..mp4 96.64Мб
29. Employee redundancy..vtt 10.69Кб
3. Administrative personnel controls..mp4 80.60Мб
3. Administrative personnel controls..vtt 80.62Мб
3. Programming concepts..mp4 135.14Мб
3. Programming concepts..vtt 16.46Кб
3. Why should you want to get the CISSP certification.mp4 56.68Мб
3. Why should you want to get the CISSP certification.vtt 8.31Кб
30. Testing the plans..mp4 132.71Мб
30. Testing the plans..vtt 17.29Кб
31. After a disruption..mp4 79.88Мб
31. After a disruption..vtt 10.07Кб
32. What we covered in Domain 7..mp4 40.01Мб
32. What we covered in Domain 7..vtt 4.24Кб
33. (Bonus) Domain 7 - 30 practice questions..html 127б
34. Domain 7 links..html 4.88Кб
4. Digital forensics..mp4 79.03Мб
4. Digital forensics..vtt 8.69Кб
4. Software development methodologies part 1..mp4 183.71Мб
4. Software development methodologies part 1..vtt 20.81Кб
4. The 8 CISSP domains or CBKs (Common Bodies of Knowledge)..mp4 110.42Мб
4. The 8 CISSP domains or CBKs (Common Bodies of Knowledge)..vtt 14.99Кб
5. Lecture speed..mp4 8.38Мб
5. Lecture speed..vtt 905б
5. Software development methodologies part 2..mp4 160.40Мб
5. Software development methodologies part 2..vtt 18.36Кб
5. Spinning disk forensics..mp4 32.04Мб
5. Spinning disk forensics..vtt 3.26Кб
6. Databases part 1..mp4 171.76Мб
6. Databases part 1..vtt 18.79Кб
6. Download all the lecture slides from this course!.mp4 8.74Мб
6. Download all the lecture slides from this course!.vtt 1.25Кб
6. Network and Software forensics..mp4 66.08Мб
6. Network and Software forensics..vtt 8.04Кб
7. Databases part 2..mp4 143.20Мб
7. Databases part 2..vtt 15.77Кб
7. Incident Management definitions..mp4 70.48Мб
7. Incident Management definitions..vtt 8.55Кб
7. Links, important topics and where to focus on my slides..mp4 19.05Мб
7. Links, important topics and where to focus on my slides..vtt 1.77Кб
8. General CISSP links..html 1.79Кб
8. Incident Management..mp4 163.68Мб
8. Incident Management..vtt 19.62Кб
8. OWASP part 1..mp4 106.48Мб
8. OWASP part 1..vtt 11.83Кб
9. Intrusion detection and prevention systems..mp4 106.11Мб
9. Intrusion detection and prevention systems..vtt 12.80Кб
9. OWASP part 2..mp4 121.84Мб
9. OWASP part 2..vtt 15.19Кб
Статистика распространения по странам
Россия (RU) 1
США (US) 1
Южная Корея (KR) 1
Италия (IT) 1
Всего 4
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент