Общая информация
Название [ TutPig.com ] Linkedin - Certified Information Security Manager (CISM) Cert Prep - 2 Information Security Risk Management
Тип
Размер 781.99Мб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
01 - Business continuity planning.mp4 8.03Мб
01 - Business continuity planning.srt 6.20Кб
01 - Comparing viruses, worms, and Trojans.mp4 23.30Мб
01 - Comparing viruses, worms, and Trojans.srt 9.68Кб
01 - Continuing your studies.mp4 6.71Мб
01 - Continuing your studies.srt 1.15Кб
01 - Cybersecurity adversaries.mp4 16.92Мб
01 - Cybersecurity adversaries.srt 8.48Кб
01 - Denial of service attacks.mp4 15.65Мб
01 - Denial of service attacks.srt 7.74Кб
01 - Disaster recovery planning.mp4 14.07Мб
01 - Disaster recovery planning.srt 8.32Кб
01 - Information security risk management.mp4 13.21Мб
01 - Information security risk management.srt 1.20Кб
01 - Legal and compliance risks.mp4 7.41Мб
01 - Legal and compliance risks.srt 3.79Кб
01 - Managing vendor relationships.mp4 12.40Мб
01 - Managing vendor relationships.srt 7.43Кб
01 - Risk assessment.mp4 13.71Мб
01 - Risk assessment.srt 8.57Кб
01 - Risk treatment options.mp4 17.17Мб
01 - Risk treatment options.srt 7.51Кб
01 - Security awareness training.mp4 19.83Мб
01 - Security awareness training.srt 9.65Кб
01 - Social engineering.mp4 16.91Мб
01 - Social engineering.srt 10.19Кб
01 - What is vulnerability management.mp4 16.64Мб
01 - What is vulnerability management.srt 9.77Кб
02 - Backups.mp4 11.13Мб
02 - Backups.srt 7.78Кб
02 - Business continuity controls.mp4 11.09Мб
02 - Business continuity controls.srt 6.96Кб
02 - Compliance training.mp4 13.28Мб
02 - Compliance training.srt 5.47Кб
02 - Eavesdropping attacks.mp4 13.55Мб
02 - Eavesdropping attacks.srt 7.92Кб
02 - Identify scan targets.mp4 13.74Мб
02 - Identify scan targets.srt 8.56Кб
02 - Impersonation attacks.mp4 15.11Мб
02 - Impersonation attacks.srt 9.98Кб
02 - Malware payloads.mp4 20.49Мб
02 - Malware payloads.srt 10.35Кб
02 - Preventing insider threats.mp4 9.82Мб
02 - Preventing insider threats.srt 4.75Кб
02 - Privacy compliance.mp4 8.84Мб
02 - Privacy compliance.srt 6.12Кб
02 - Quantitative risk assessment.mp4 20.06Мб
02 - Quantitative risk assessment.srt 10.67Кб
02 - Security control selection and implementation.mp4 20.06Мб
02 - Security control selection and implementation.srt 10.67Кб
02 - Vendor agreements.mp4 15.62Мб
02 - Vendor agreements.srt 7.82Кб
02 - What you need to know.mp4 1.99Мб
02 - What you need to know.srt 1.20Кб
03 - Data breaches.mp4 6.96Мб
03 - Data breaches.srt 4.20Кб
03 - DNS attacks.mp4 12.59Мб
03 - DNS attacks.srt 6.27Кб
03 - High availability and fault tolerance.mp4 14.59Мб
03 - High availability and fault tolerance.srt 10.67Кб
03 - Information classification.mp4 12.48Мб
03 - Information classification.srt 6.71Кб
03 - Ongoing risk management.mp4 8.80Мб
03 - Ongoing risk management.srt 4.60Кб
03 - Physical social engineering.mp4 11.07Мб
03 - Physical social engineering.srt 4.64Кб
03 - Restoring backups.mp4 7.25Мб
03 - Restoring backups.srt 4.34Кб
03 - Scan configuration.mp4 15.49Мб
03 - Scan configuration.srt 10.91Кб
03 - Study resources.mp4 13.42Мб
03 - Study resources.srt 2.52Кб
03 - Threat intelligence.mp4 11.11Мб
03 - Threat intelligence.srt 6.44Кб
03 - Understanding backdoors and logic bombs.mp4 15.59Мб
03 - Understanding backdoors and logic bombs.srt 8.14Кб
03 - User habits.mp4 9.51Мб
03 - User habits.srt 6.63Кб
03 - Vendor information management.mp4 6.13Мб
03 - Vendor information management.srt 3.25Кб
04 - Audits and assessments.mp4 18.81Мб
04 - Audits and assessments.srt 10.43Кб
04 - Botnets.mp4 9.28Мб
04 - Botnets.srt 6.05Кб
04 - Disaster recovery sites.mp4 12.52Мб
04 - Disaster recovery sites.srt 6.41Кб
04 - Intellectual property.mp4 17.15Мб
04 - Intellectual property.srt 7.24Кб
04 - Layer 2 attacks.mp4 7.10Мб
04 - Layer 2 attacks.srt 3.83Кб
04 - Measuring compliance and security posture.mp4 7.73Мб
04 - Measuring compliance and security posture.srt 3.48Кб
04 - Risk management frameworks.mp4 10.93Мб
04 - Risk management frameworks.srt 5.91Кб
04 - Scan perspective.mp4 12.75Мб
04 - Scan perspective.srt 8.54Кб
05 - Advanced persistent threats.mp4 10.58Мб
05 - Advanced persistent threats.srt 6.12Кб
05 - Awareness program reviews.mp4 3.19Мб
05 - Awareness program reviews.srt 2.23Кб
05 - Cloud audits.mp4 13.23Мб
05 - Cloud audits.srt 7.01Кб
05 - Network address spoofing.mp4 12.03Мб
05 - Network address spoofing.srt 6.90Кб
05 - Risk visibility and reporting.mp4 21.23Мб
05 - Risk visibility and reporting.srt 8.08Кб
05 - Security Content Automation Protocol (SCAP).mp4 6.99Мб
05 - Security Content Automation Protocol (SCAP).srt 4.32Кб
05 - Testing BCDR plans.mp4 10.96Мб
05 - Testing BCDR plans.srt 6.15Кб
06 - Common Vulnerability Scoring System (CVSS).mp4 10.33Мб
06 - Common Vulnerability Scoring System (CVSS).srt 6.18Кб
06 - Password attacks.mp4 32.82Мб
06 - Password attacks.srt 14.53Кб
07 - Analyzing scan reports.mp4 16.16Мб
07 - Analyzing scan reports.srt 8.99Кб
07 - Password spraying and credential stuffing.mp4 6.12Мб
07 - Password spraying and credential stuffing.srt 3.21Кб
08 - Correlating scan results.mp4 7.95Мб
08 - Correlating scan results.srt 4.44Кб
08 - Watering hole attacks.mp4 12.00Мб
08 - Watering hole attacks.srt 5.74Кб
Bonus Resources.txt 386б
Get Bonus Downloads Here.url 176б
Статистика распространения по странам
Уганда (UG) 4
Венгрия (HU) 1
Иордания (JO) 1
Болгария (BG) 1
Россия (RU) 1
США (US) 1
Испания (ES) 1
Всего 10
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент