Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
524.39Кб |
1 |
740.69Кб |
10 |
737.64Кб |
10 - 1.8 Identity and Access Management.mp4 |
397.76Мб |
11 |
592.71Кб |
11 - 1.9 Cloud Access Security Broker (CASB).mp4 |
318.47Мб |
12 |
563.38Кб |
12 - 1.10 Honeypots and Breach Detection.mp4 |
195.88Мб |
13 |
700.67Кб |
13 - 1.11 Encryption and Certificate Management.mp4 |
38.76Мб |
14 |
30.92Кб |
14 - Learning objectives.mp4 |
21.45Мб |
15 |
419.67Кб |
15 - 2.1 SDLC Platforms.mp4 |
86.58Мб |
16 |
466.29Кб |
16 - 2.2 DevSecOps.mp4 |
188.47Мб |
17 |
859.13Кб |
17 - 2.3 Software Assessment Methods.mp4 |
96.54Мб |
18 |
432.26Кб |
18 - 2.4 User Acceptance Training and Stress Test.mp4 |
142.45Мб |
19 |
369.95Кб |
19 - 2.5 Security Regression Training.mp4 |
83.37Мб |
1 - Secure Operations and Protections LiveLessons - Introduction.mp4 |
61.97Мб |
2 |
835.85Кб |
20 |
643.32Кб |
20 - 2.6 Code Review.mp4 |
50.00Мб |
21 |
615.98Кб |
21 - 2.7 Secure Coding Best Practices.mp4 |
138.97Мб |
22 |
861.13Кб |
22 - 2.8 Input Validation.mp4 |
63.43Мб |
23 |
114.49Кб |
23 - 2.9 Output Encoding.mp4 |
64.63Мб |
24 |
561.99Кб |
24 - 2.10 Session Management.mp4 |
85.64Мб |
25 |
804.38Кб |
25 - 2.11 Authentication.mp4 |
69.45Мб |
26 |
586.86Кб |
26 - 2.12 Data Protection.mp4 |
69.89Мб |
27 |
768.35Кб |
27 - 2.13 Paramaterized Queries.mp4 |
65.25Мб |
28 |
381.77Кб |
28 - Learning objectives.mp4 |
19.16Мб |
29 |
583.30Кб |
29 - 3.1 Change Control.mp4 |
186.28Мб |
2 - Learning objectives.mp4 |
22.73Мб |
3 |
247.03Кб |
30 |
359.35Кб |
30 - 3.2 Allow List.mp4 |
39.96Мб |
31 |
663.68Кб |
3 - 1.1 Cloud vs. On-premises - Part 1.mp4 |
159.42Мб |
31 - 3.3 Blocklist.mp4 |
62.65Мб |
32 |
29.17Кб |
32 - 3.4 Firewall.mp4 |
217.80Мб |
33 |
757.36Кб |
33 - 3.5 Intrusion Prevention System (IPS) Rules.mp4 |
58.14Мб |
34 |
878.84Кб |
34 - 3.6 Data Loss Prevention (DLP).mp4 |
94.16Мб |
35 |
158.29Кб |
35 - 3.7 Endpoint Detection and Response (EDR).mp4 |
67.43Мб |
36 |
715.08Кб |
36 - 3.8 Network Access Control (NAC).mp4 |
51.36Мб |
37 |
866.65Кб |
37 - 3.9 Sinkholing.mp4 |
69.21Мб |
38 |
654.38Кб |
38 - 3.10 Malware Signature Rule Writing.mp4 |
56.85Мб |
39 |
1003.63Кб |
39 - 3.11 Sandboxing.mp4 |
28.64Мб |
4 |
539.51Кб |
40 |
1021.48Кб |
40 - 3.12 Port Security.mp4 |
80.16Мб |
41 |
218.00Кб |
4 - 1.2 Cloud vs. On-premises - Part 2.mp4 |
439.28Мб |
41 - Learning objectives.mp4 |
26.19Мб |
42 |
727.23Кб |
42 - 4.1 What is a Cyber Incident.mp4 |
420.18Мб |
43 |
625.55Кб |
43 - 4.2 Communication Plan.mp4 |
54.30Мб |
44 |
55.03Кб |
44 - 4.3 Trusted Parties.mp4 |
298.13Мб |
45 |
670.43Кб |
45 - 4.4 Regulatory and Legislative Requirements.mp4 |
62.35Мб |
46 |
713.59Кб |
46 - 4.5 Preventing Inadvertent Release of Information.mp4 |
195.49Мб |
47 |
39.91Кб |
47 - Learning objectives.mp4 |
24.29Мб |
48 |
248.15Кб |
48 - 5.1 Legal.mp4 |
107.59Мб |
49 |
353.88Кб |
49 - 5.2 Human Resources.mp4 |
59.26Мб |
5 |
889.08Кб |
50 |
372.55Кб |
50 - 5.3 Public Relations.mp4 |
50.02Мб |
51 |
827.89Кб |
5 - 1.3 Asset Management.mp4 |
141.32Мб |
51 - 5.4 Senior Leadership.mp4 |
47.39Мб |
52 |
209.45Кб |
52 - 5.5 Regulatory Bodies.mp4 |
40.35Мб |
53 |
730.51Кб |
53 - Learning objectives.mp4 |
20.85Мб |
54 |
278.04Кб |
54 - 6.1 Personal Identifiable Information (PII).mp4 |
40.95Мб |
55 |
567.60Кб |
55 - 6.2 Personal Health Information (PHI).mp4 |
48.79Мб |
56 |
153.71Кб |
56 - 6.3 Sensitive Personal Information (SPI) and High Value Assets.mp4 |
40.30Мб |
57 - 6.4 Intellectual Property.mp4 |
54.15Мб |
58 - Secure Operations and Protections LiveLessons - Summary.mp4 |
24.80Мб |
6 |
200.03Кб |
6 - 1.4 Segmentation.mp4 |
82.40Мб |
7 |
118.12Кб |
7 - 1.5 Network Architecture.mp4 |
449.49Мб |
8 |
526.99Кб |
8 - 1.6 Change Management.mp4 |
48.29Мб |
9 |
543.85Кб |
9 - 1.7 Containerization.mp4 |
38.65Мб |
TutsNode.com.txt |
63б |