Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
01 - Business continuity planning.mp4 |
8.03Мб |
01 - Business continuity planning.srt |
6.20Кб |
01 - Comparing viruses, worms, and Trojans.mp4 |
23.30Мб |
01 - Comparing viruses, worms, and Trojans.srt |
9.68Кб |
01 - Continuing your studies.mp4 |
6.71Мб |
01 - Continuing your studies.srt |
1.15Кб |
01 - Cybersecurity adversaries.mp4 |
16.92Мб |
01 - Cybersecurity adversaries.srt |
8.48Кб |
01 - Denial of service attacks.mp4 |
15.65Мб |
01 - Denial of service attacks.srt |
7.74Кб |
01 - Disaster recovery planning.mp4 |
14.07Мб |
01 - Disaster recovery planning.srt |
8.32Кб |
01 - Information security risk management.mp4 |
13.21Мб |
01 - Information security risk management.srt |
1.20Кб |
01 - Legal and compliance risks.mp4 |
7.41Мб |
01 - Legal and compliance risks.srt |
3.79Кб |
01 - Managing vendor relationships.mp4 |
12.40Мб |
01 - Managing vendor relationships.srt |
7.43Кб |
01 - Risk assessment.mp4 |
13.71Мб |
01 - Risk assessment.srt |
8.57Кб |
01 - Risk treatment options.mp4 |
17.17Мб |
01 - Risk treatment options.srt |
7.51Кб |
01 - Security awareness training.mp4 |
19.83Мб |
01 - Security awareness training.srt |
9.65Кб |
01 - Social engineering.mp4 |
16.91Мб |
01 - Social engineering.srt |
10.19Кб |
01 - What is vulnerability management.mp4 |
16.64Мб |
01 - What is vulnerability management.srt |
9.77Кб |
02 - Backups.mp4 |
11.13Мб |
02 - Backups.srt |
7.78Кб |
02 - Business continuity controls.mp4 |
11.09Мб |
02 - Business continuity controls.srt |
6.96Кб |
02 - Compliance training.mp4 |
13.28Мб |
02 - Compliance training.srt |
5.47Кб |
02 - Eavesdropping attacks.mp4 |
13.55Мб |
02 - Eavesdropping attacks.srt |
7.92Кб |
02 - Identify scan targets.mp4 |
13.74Мб |
02 - Identify scan targets.srt |
8.56Кб |
02 - Impersonation attacks.mp4 |
15.11Мб |
02 - Impersonation attacks.srt |
9.98Кб |
02 - Malware payloads.mp4 |
20.49Мб |
02 - Malware payloads.srt |
10.35Кб |
02 - Preventing insider threats.mp4 |
9.82Мб |
02 - Preventing insider threats.srt |
4.75Кб |
02 - Privacy compliance.mp4 |
8.84Мб |
02 - Privacy compliance.srt |
6.12Кб |
02 - Quantitative risk assessment.mp4 |
20.06Мб |
02 - Quantitative risk assessment.srt |
10.67Кб |
02 - Security control selection and implementation.mp4 |
20.06Мб |
02 - Security control selection and implementation.srt |
10.67Кб |
02 - Vendor agreements.mp4 |
15.62Мб |
02 - Vendor agreements.srt |
7.82Кб |
02 - What you need to know.mp4 |
1.99Мб |
02 - What you need to know.srt |
1.20Кб |
03 - Data breaches.mp4 |
6.96Мб |
03 - Data breaches.srt |
4.20Кб |
03 - DNS attacks.mp4 |
12.59Мб |
03 - DNS attacks.srt |
6.27Кб |
03 - High availability and fault tolerance.mp4 |
14.59Мб |
03 - High availability and fault tolerance.srt |
10.67Кб |
03 - Information classification.mp4 |
12.48Мб |
03 - Information classification.srt |
6.71Кб |
03 - Ongoing risk management.mp4 |
8.80Мб |
03 - Ongoing risk management.srt |
4.60Кб |
03 - Physical social engineering.mp4 |
11.07Мб |
03 - Physical social engineering.srt |
4.64Кб |
03 - Restoring backups.mp4 |
7.25Мб |
03 - Restoring backups.srt |
4.34Кб |
03 - Scan configuration.mp4 |
15.49Мб |
03 - Scan configuration.srt |
10.91Кб |
03 - Study resources.mp4 |
13.42Мб |
03 - Study resources.srt |
2.52Кб |
03 - Threat intelligence.mp4 |
11.11Мб |
03 - Threat intelligence.srt |
6.44Кб |
03 - Understanding backdoors and logic bombs.mp4 |
15.59Мб |
03 - Understanding backdoors and logic bombs.srt |
8.14Кб |
03 - User habits.mp4 |
9.51Мб |
03 - User habits.srt |
6.63Кб |
03 - Vendor information management.mp4 |
6.13Мб |
03 - Vendor information management.srt |
3.25Кб |
04 - Audits and assessments.mp4 |
18.81Мб |
04 - Audits and assessments.srt |
10.43Кб |
04 - Botnets.mp4 |
9.28Мб |
04 - Botnets.srt |
6.05Кб |
04 - Disaster recovery sites.mp4 |
12.52Мб |
04 - Disaster recovery sites.srt |
6.41Кб |
04 - Intellectual property.mp4 |
17.15Мб |
04 - Intellectual property.srt |
7.24Кб |
04 - Layer 2 attacks.mp4 |
7.10Мб |
04 - Layer 2 attacks.srt |
3.83Кб |
04 - Measuring compliance and security posture.mp4 |
7.73Мб |
04 - Measuring compliance and security posture.srt |
3.48Кб |
04 - Risk management frameworks.mp4 |
10.93Мб |
04 - Risk management frameworks.srt |
5.91Кб |
04 - Scan perspective.mp4 |
12.75Мб |
04 - Scan perspective.srt |
8.54Кб |
05 - Advanced persistent threats.mp4 |
10.58Мб |
05 - Advanced persistent threats.srt |
6.12Кб |
05 - Awareness program reviews.mp4 |
3.19Мб |
05 - Awareness program reviews.srt |
2.23Кб |
05 - Cloud audits.mp4 |
13.23Мб |
05 - Cloud audits.srt |
7.01Кб |
05 - Network address spoofing.mp4 |
12.03Мб |
05 - Network address spoofing.srt |
6.90Кб |
05 - Risk visibility and reporting.mp4 |
21.23Мб |
05 - Risk visibility and reporting.srt |
8.08Кб |
05 - Security Content Automation Protocol (SCAP).mp4 |
6.99Мб |
05 - Security Content Automation Protocol (SCAP).srt |
4.32Кб |
05 - Testing BCDR plans.mp4 |
10.96Мб |
05 - Testing BCDR plans.srt |
6.15Кб |
06 - Common Vulnerability Scoring System (CVSS).mp4 |
10.33Мб |
06 - Common Vulnerability Scoring System (CVSS).srt |
6.18Кб |
06 - Password attacks.mp4 |
32.82Мб |
06 - Password attacks.srt |
14.53Кб |
07 - Analyzing scan reports.mp4 |
16.16Мб |
07 - Analyzing scan reports.srt |
8.99Кб |
07 - Password spraying and credential stuffing.mp4 |
6.12Мб |
07 - Password spraying and credential stuffing.srt |
3.21Кб |
08 - Correlating scan results.mp4 |
7.95Мб |
08 - Correlating scan results.srt |
4.44Кб |
08 - Watering hole attacks.mp4 |
12.00Мб |
08 - Watering hole attacks.srt |
5.74Кб |
Bonus Resources.txt |
386б |
Get Bonus Downloads Here.url |
176б |