Общая информация
Название Certified Information Systems Security Professional - CISSP
Тип
Размер 17.37Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
001. Assessment, test, & security audit strategies.en.srt 46.74Кб
001. Assessment, test, & security audit strategies.mp4 158.31Мб
001. Control physical and logical access to assets.en.srt 45.65Кб
001. Control physical and logical access to assets.mp4 206.28Мб
001. Engineering process using secure design principles.en.srt 23.30Кб
001. Engineering process using secure design principles.mp4 153.97Мб
001. Identify and classify information, assets.en.srt 36.32Кб
001. Identify and classify information, assets.mp4 160.86Мб
001. Overview.en.srt 6.13Кб
001. Overview.mp4 26.37Мб
001. Spotlight on the OSI Model.en.srt 43.18Кб
001. Spotlight on the OSI Model.mp4 159.62Мб
001. Spotlight on the Software Development Life Cycle.en.srt 49.98Кб
001. Spotlight on the Software Development Life Cycle.mp4 190.49Мб
001. Understand and comply with investigations.en.srt 49.93Кб
001. Understand and comply with investigations.mp4 197.00Мб
001. What is the CISSP Toolbox.en.srt 2.17Кб
001. What is the CISSP Toolbox.mp4 13.96Мб
002. Certs & Accreditation Verification & Validation.en.srt 30.46Кб
002. Certs & Accreditation Verification & Validation.mp4 113.68Мб
002. Conduct logging & monitoring activities.en.srt 47.73Кб
002. Conduct logging & monitoring activities.mp4 246.74Мб
002. Establish information, asset handling requirements.en.srt 46.50Кб
002. Establish information, asset handling requirements.mp4 221.07Мб
002. Fundamental concepts of security models.en.srt 23.51Кб
002. Fundamental concepts of security models.mp4 151.65Мб
002. Manage identification and authentication.en.srt 49.28Кб
002. Manage identification and authentication.mp4 135.01Мб
002. Spotlight on Internet Protocol (IP) networking.en.srt 48.34Кб
002. Spotlight on Internet Protocol (IP) networking.mp4 154.92Мб
002. Spotlight on System and Org Controls Reports (SOC).en.srt 37.19Кб
002. Spotlight on System and Org Controls Reports (SOC).mp4 143.19Мб
002. Understand adhere, promote professional ethics.en.srt 21.09Кб
002. Understand adhere, promote professional ethics.mp4 72.38Мб
002. Who are you.en.srt 8.41Кб
002. Who are you.mp4 26.11Мб
003. Conduct logging & monitoring activities - threat.en.srt 42.90Кб
003. Conduct logging & monitoring activities - threat.mp4 267.72Мб
003. Conduct security control testing - the basics.en.srt 50.61Кб
003. Conduct security control testing - the basics.mp4 187.86Мб
003. Controls based upon system security requirements.en.srt 41.87Кб
003. Controls based upon system security requirements.mp4 141.10Мб
003. Federated identity with a third-party service.en.srt 47.11Кб
003. Federated identity with a third-party service.mp4 203.12Мб
003. Provision resources securely.en.srt 31.47Кб
003. Provision resources securely.mp4 254.22Мб
003. Security in the SDLC - Methodologies.en.srt 50.53Кб
003. Security in the SDLC - Methodologies.mp4 197.23Мб
003. Spotlight on IPsec.en.srt 48.87Кб
003. Spotlight on IPsec.mp4 194.96Мб
003. Understand and apply security concepts (CIA).en.srt 36.86Кб
003. Understand and apply security concepts (CIA).mp4 189.78Мб
003. What does your study plan look like.en.srt 10.41Кб
003. What does your study plan look like.mp4 33.94Мб
004. Conduct security control testing - the rest.en.srt 54.66Кб
004. Conduct security control testing - the rest.mp4 180.92Мб
004. Evaluate and apply security governance principles.en.srt 34.13Кб
004. Evaluate and apply security governance principles.mp4 165.86Мб
004. Implement, manage auth mechanisms - Vocab.en.srt 44.63Кб
004. Implement, manage auth mechanisms - Vocab.mp4 230.61Мб
004. Manage data lifecycle.en.srt 42.65Кб
004. Manage data lifecycle.mp4 150.99Мб
004. Perform Configuration Management (CM).en.srt 42.32Кб
004. Perform Configuration Management (CM).mp4 275.27Мб
004. Security capabilities of Information Systems - vocab.en.srt 46.44Кб
004. Security capabilities of Information Systems - vocab.mp4 134.71Мб
004. Security in the SDLC - Maturity Models.en.srt 47.15Кб
004. Security in the SDLC - Maturity Models.mp4 175.97Мб
004. Spotlight on Secure Protocols.en.srt 34.98Кб
004. Spotlight on Secure Protocols.mp4 122.92Мб
004. What is your timeline.en.mp4 42.04Мб
004. What is your timeline.en.srt 13.35Кб
005. Apply foundational security operations concepts.en.srt 17.64Кб
005. Apply foundational security operations concepts.mp4 55.22Мб
005. Collect security process data.en.srt 46.13Кб
005. Collect security process data.mp4 166.62Мб
005. Determine compliance and other requirements.en.srt 30.41Кб
005. Determine compliance and other requirements.mp4 144.28Мб
005. Ensure appropriate asset retention.en.srt 38.41Кб
005. Ensure appropriate asset retention.mp4 159.94Мб
005. Implement, manage auth mechanisms - Models.en.srt 48.86Кб
005. Implement, manage auth mechanisms - Models.mp4 306.31Мб
005. Implications of converged & multilayer protocols.en.srt 22.92Кб
005. Implications of converged & multilayer protocols.mp4 102.82Мб
005. Security capabilities of Information Systems - CPU.en.srt 44.12Кб
005. Security capabilities of Information Systems - CPU.mp4 222.00Мб
005. Security in the SDLC - odds & ends.en.srt 38.10Кб
005. Security in the SDLC - odds & ends.mp4 191.64Мб
006. Analyze test output and generate reports.en.srt 35.46Кб
006. Analyze test output and generate reports.mp4 145.34Мб
006. Apply controls in development ecosystems - basics.en.srt 51.29Кб
006. Apply controls in development ecosystems - basics.mp4 188.12Мб
006. Apply resource protection.en.srt 47.33Кб
006. Apply resource protection.mp4 276.24Мб
006. Data security controls and compliance requirements.en.srt 48.75Кб
006. Data security controls and compliance requirements.mp4 150.86Мб
006. Legal, regulatory issues for information security.en.srt 44.84Кб
006. Legal, regulatory issues for information security.mp4 238.76Мб
006. Manage the identity, access provisioning lifecycle.en.srt 43.30Кб
006. Manage the identity, access provisioning lifecycle.mp4 157.18Мб
006. Security capabilities of Info Systems - Memory.en.srt 52.82Кб
006. Security capabilities of Info Systems - Memory.mp4 288.93Мб
006. Spotlight on Micro-segmentation.en.srt 48.65Кб
006. Spotlight on Micro-segmentation.mp4 261.35Мб
007. Apply controls in development ecosystems - rest.en.srt 41.17Кб
007. Apply controls in development ecosystems - rest.mp4 161.60Мб
007. Assess and mitigate vulnerabilities - the basics.en.srt 51.72Кб
007. Assess and mitigate vulnerabilities - the basics.mp4 291.66Мб
007. Assets Security - Key Points.en.srt 39.60Кб
007. Assets Security - Key Points.mp4 111.05Мб
007. Conduct incident management.en.srt 33.15Кб
007. Conduct incident management.mp4 137.32Мб
007. Implement authentication systems.en.srt 47.20Кб
007. Implement authentication systems.mp4 159.12Мб
007. Security Assessment and Testing - Key Points.en.srt 41.32Кб
007. Security Assessment and Testing - Key Points.mp4 113.17Мб
007. Spotlight on the GDPR.en.srt 46.85Кб
007. Spotlight on the GDPR.mp4 247.16Мб
007. Wireless, Cellular & Content Distribution Networks.en.srt 49.98Кб
007. Wireless, Cellular & Content Distribution Networks.mp4 159.61Мб
008. Assess and mitigate vulnerabilities - the rest.en.srt 53.78Кб
008. Assess and mitigate vulnerabilities - the rest.mp4 321.12Мб
008. Detective & preventative measures.en.srt 50.74Кб
008. Detective & preventative measures.mp4 179.31Мб
008. Secure Network Components.en.srt 38.58Кб
008. Secure Network Components.mp4 167.40Мб
008. Spotlight on Kerberos.en.srt 53.47Кб
008. Spotlight on Kerberos.mp4 219.41Мб
008. Spotlight on the OWASP TOP 10.en.srt 45.07Кб
008. Spotlight on the OWASP TOP 10.mp4 164.36Мб
008. Understand requirements for investigation types.en.srt 46.61Кб
008. Understand requirements for investigation types.mp4 152.53Мб
009. Assess the effectiveness of software security.en.srt 51.30Кб
009. Assess the effectiveness of software security.mp4 195.31Мб
009. Implement Secure Communication Channels.en.srt 48.43Кб
009. Implement Secure Communication Channels.mp4 281.14Мб
009. Patch & vulnerability management.en.srt 34.54Кб
009. Patch & vulnerability management.mp4 159.97Мб
009. Security policy, standards, procedures, guidelines.en.srt 30.04Кб
009. Security policy, standards, procedures, guidelines.mp4 163.42Мб
009. Spotlight on cryptographic solutions - Symmetric.en.srt 49.88Кб
009. Spotlight on cryptographic solutions - Symmetric.mp4 204.96Мб
009. Spotlight on Federated Identity Management (FIM).en.srt 35.28Кб
009. Spotlight on Federated Identity Management (FIM).mp4 259.38Мб
010. Assess security impact of acquired software.en.srt 13.68Кб
010. Assess security impact of acquired software.mp4 221.01Мб
010. Communications & Network Security - Key Points.en.srt 46.84Кб
010. Communications & Network Security - Key Points.mp4 127.54Мб
010. Identify, analyze, prioritize BC requirements.en.srt 49.19Кб
010. Identify, analyze, prioritize BC requirements.mp4 186.57Мб
010. Identity Access Management (IAM) - Key Points.en.srt 29.47Кб
010. Identity Access Management (IAM) - Key Points.mp4 90.89Мб
010. Spotlight on cryptographic solutions - Asymmetric.en.srt 37.54Кб
010. Spotlight on cryptographic solutions - Asymmetric.mp4 151.81Мб
010. Understand & participate in change management.en.srt 34.32Кб
010. Understand & participate in change management.mp4 153.85Мб
011. Define, apply secure coding guidelines, standards.en.srt 38.59Кб
011. Define, apply secure coding guidelines, standards.mp4 210.04Мб
011. Implement recovery strategies.en.srt 47.27Кб
011. Implement recovery strategies.mp4 140.65Мб
011. Personnel security policies and procedures.en.srt 39.47Кб
011. Personnel security policies and procedures.mp4 177.73Мб
011. Spotlight on cryptographic solutions - PKI & certs.en.srt 45.20Кб
011. Spotlight on cryptographic solutions - PKI & certs.mp4 173.25Мб
012. Implement Disaster Recovery (DR) processes.en.srt 36.21Кб
012. Implement Disaster Recovery (DR) processes.mp4 134.52Мб
012. Spotlight on cryptographic solutions - hashing.en.srt 35.87Кб
012. Spotlight on cryptographic solutions - hashing.mp4 179.95Мб
012. Spotlight on Databases.en.srt 29.87Кб
012. Spotlight on Databases.mp4 293.75Мб
012. Understand, apply risk management concepts.en.srt 46.95Кб
012. Understand, apply risk management concepts.mp4 209.62Мб
013. Cryptographic solutions - digital signing.en.srt 32.38Кб
013. Cryptographic solutions - digital signing.mp4 144.30Мб
013. Software Development Security - Key Points.en.srt 28.90Кб
013. Software Development Security - Key Points.mp4 108.21Мб
013. Spotlight on the Risk Management Framework.en.srt 33.06Кб
013. Spotlight on the Risk Management Framework.mp4 95.13Мб
013. Test Disaster Recovery Plans (DRP).en.srt 32.71Кб
013. Test Disaster Recovery Plans (DRP).mp4 132.10Мб
014. Business Continuity (BC) planning & exercises.en.srt 26.08Кб
014. Business Continuity (BC) planning & exercises.mp4 98.10Мб
014. Threat modeling concepts and methodologies.en.srt 42.00Кб
014. Threat modeling concepts and methodologies.mp4 154.32Мб
014. Understand methods of cryptanalytic attacks.en.srt 45.90Кб
014. Understand methods of cryptanalytic attacks.mp4 155.41Мб
015. Apply Supply Chain Risk Management (SCRM) concepts.en.srt 45.20Кб
015. Apply Supply Chain Risk Management (SCRM) concepts.mp4 177.80Мб
015. Implement and manage physical security.en.srt 50.81Кб
015. Implement and manage physical security.mp4 195.10Мб
015. Security principles for site and facility design.en.srt 44.50Кб
015. Security principles for site and facility design.mp4 241.43Мб
016. Address personnel safety and security concerns.en.srt 37.06Кб
016. Address personnel safety and security concerns.mp4 210.26Мб
016. Design site and facility security controls.en.srt 50.84Кб
016. Design site and facility security controls.mp4 305.78Мб
016. Security awareness, education, and training program.en.srt 24.60Кб
016. Security awareness, education, and training program.mp4 116.98Мб
017. Security and Risk Management Key Points.en.srt 31.40Кб
017. Security and Risk Management Key Points.mp4 95.81Мб
017. Security Operations - Key points.en.srt 38.71Кб
017. Security Operations - Key points.mp4 106.02Мб
017. Spotlight on fire control.en.srt 52.84Кб
017. Spotlight on fire control.mp4 309.29Мб
018. Security Architecture & Engineering - Key Points.en.srt 40.45Кб
018. Security Architecture & Engineering - Key Points.mp4 102.14Мб
Статистика распространения по странам
Болгария (BG) 3
Россия (RU) 3
Украина (UA) 2
США (US) 2
Молдова (MD) 2
Чешская Республика (CZ) 1
Южная Корея (KR) 1
Мексика (MX) 1
Тайланд (TH) 1
Всего 16
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент