|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| 0001.Course Overview.mp4 |
6.44Мб |
| 0101.Introduction.mp4 |
8.93Мб |
| 0201.Introduction.mp4 |
3.18Мб |
| 0202.Security and Risk Management Fundamentals.mp4 |
8.16Мб |
| 0203.Balancing Business and Security.mp4 |
3.16Мб |
| 0204.The CIA Triad.mp4 |
15.49Мб |
| 0205.Accountability and Assurance.mp4 |
8.82Мб |
| 0206.Control Types.mp4 |
2.97Мб |
| 0207.Delaying, Preventing, or Detecting Attacks.mp4 |
7.14Мб |
| 0208.Due Care and Due Diligence.mp4 |
3.45Мб |
| 0209.Ethics.mp4 |
4.68Мб |
| 0210.Conclusion.mp4 |
1.25Мб |
| 0301.Introduction.mp4 |
1.61Мб |
| 0302.Legal Systems.mp4 |
975.66Кб |
| 0303.Criminal and Civil Law.mp4 |
3.66Мб |
| 0304.Administrative Law.mp4 |
3.43Мб |
| 0305.Important Laws.mp4 |
11.75Мб |
| 0306.Summary.mp4 |
625.65Кб |
| 0401.Introduction.mp4 |
1.29Мб |
| 0402.Computers Can Be Used for EVIL.mp4 |
5.44Мб |
| 0403.Some Hack Just Because They Can.mp4 |
2.91Мб |
| 0404.It's All About the Money.mp4 |
3.99Мб |
| 0405.Spies Are Real.mp4 |
5.01Мб |
| 0406.Payback and Government Hackers.mp4 |
5.49Мб |
| 0407.Theft, Vandalism, and Trespass.mp4 |
2.77Мб |
| 0408.Fraud, Spam, and Slander.mp4 |
4.53Мб |
| 0409.Conclusion.mp4 |
2.63Мб |
| 0501.Introduction.mp4 |
1.11Мб |
| 0502.Patents.mp4 |
3.57Мб |
| 0503.Trademarks and Trade Secrets.mp4 |
2.28Мб |
| 0504.Copyrights.mp4 |
2.67Мб |
| 0505.Summary.mp4 |
632.19Кб |
| 0601.Introduction.mp4 |
1.71Мб |
| 0602.Privacy Matters.mp4 |
8.09Мб |
| 0603.Privacy Law Examples.mp4 |
14.59Мб |
| 0604.Conclusion.mp4 |
1.63Мб |
| 0701.Introduction.mp4 |
1.11Мб |
| 0702.Reasons for Licensing.mp4 |
3.17Мб |
| 0703.License Types.mp4 |
495.75Кб |
| 0704.Open Versus Closed Source Licensing.mp4 |
4.01Мб |
| 0705.Commercial Versus Non-commercial Licensing.mp4 |
4.72Мб |
| 0706.End User License Agreements.mp4 |
1.05Мб |
| 0707.Free Software.mp4 |
4.58Мб |
| 0708.Demo and Trial Licenses.mp4 |
1.73Мб |
| 0709.Shareware.mp4 |
1.77Мб |
| 0710.Academic Software Licensing.mp4 |
1.25Мб |
| 0711.Summary.mp4 |
1.17Мб |
| 0801.Introduction.mp4 |
1.38Мб |
| 0802.Trans-border Data Flow.mp4 |
8.17Мб |
| 0803.Import and Export Controls.mp4 |
4.75Мб |
| 0804.Summary.mp4 |
1.79Мб |
| 0901.Introduction.mp4 |
1.69Мб |
| 0902.Develop a Culture of Security Awareness.mp4 |
8.63Мб |
| 0903.Types of Security Awareness.mp4 |
5.05Мб |
| 0904.Expected Impact of Training.mp4 |
3.95Мб |
| 0905.Awareness Validation.mp4 |
8.07Мб |
| 0906.Summary.mp4 |
1.31Мб |
| 1001.Introduction.mp4 |
1.83Мб |
| 1002.Governance.mp4 |
1.00Мб |
| 1003.Roles and Responsibilities.mp4 |
11.33Мб |
| 1004.Organizational Objectives.mp4 |
2.81Мб |
| 1005.Security Goals.mp4 |
5.86Мб |
| 1006.Security Mission.mp4 |
2.36Мб |
| 1007.Conclusion.mp4 |
1.30Мб |
| 1101.Introduction.mp4 |
1.92Мб |
| 1102.Security Frameworks Introduction.mp4 |
7.59Мб |
| 1103.Effective Policies and Procedures.mp4 |
7.51Мб |
| 1104.Policy Sections.mp4 |
5.34Мб |
| 1105.Procedures.mp4 |
4.86Мб |
| 1106.Guidelines.mp4 |
1.89Мб |
| 1107.Baselines.mp4 |
3.82Мб |
| 1108.Summary.mp4 |
2.35Мб |
| 1201.Introduction.mp4 |
1.86Мб |
| 1202.Business Continuity Process.mp4 |
1.73Мб |
| 1203.Conducting a Business Impact Analysis.mp4 |
1.76Мб |
| 1204.Disaster Recovery Planning vs. Business Continuity Planning.mp4 |
2.82Мб |
| 1205.Testing Your Plans.mp4 |
2.51Мб |
| 1206.Disaster Events.mp4 |
958.23Кб |
| 1207.Recovering from Disaster.mp4 |
1.40Мб |
| 1208.Disaster Recovery Controls.mp4 |
3.55Мб |
| 1209.Conclusion.mp4 |
631.93Кб |
| 1301.Introduction.mp4 |
1.92Мб |
| 1302.Threat Modeling Overview.mp4 |
3.69Мб |
| 1303.Threat Modeling Focus.mp4 |
4.62Мб |
| 1304.Threat Model - Scoping.mp4 |
3.31Мб |
| 1305.Reviewing the Architecture.mp4 |
1.87Мб |
| 1306.Decomposing.mp4 |
1.55Мб |
| 1307.Threat Identification using STRIDE.mp4 |
4.90Мб |
| 1308.Defining and Documenting Countermeasures.mp4 |
1.77Мб |
| 1309.Prioritization with DREAD.mp4 |
1.05Мб |
| 1310.Summary.mp4 |
1.65Мб |
| 1401.Introduction.mp4 |
2.04Мб |
| 1402.Threats.mp4 |
2.64Мб |
| 1403.Threat Source.mp4 |
2.79Мб |
| 1404.Vulnerabilities.mp4 |
2.02Мб |
| 1405.Risk.mp4 |
754.30Кб |
| 1406.Risk Assessments.mp4 |
2.77Мб |
| 1407.Risk Assessment Methodologies.mp4 |
2.58Мб |
| 1408.Real World Threats and Vulnerabilities.mp4 |
3.35Мб |
| 1409.Assessment Approach.mp4 |
870.48Кб |
| 1410.Analysis Approach.mp4 |
1.01Мб |
| 1411.Risk Acceptance and Assignment.mp4 |
3.24Мб |
| 1412.Common Calculations.mp4 |
1.52Мб |
| 1413.Conclusion.mp4 |
1.06Мб |
| 1501.Introduction.mp4 |
1.96Мб |
| 1502.What Is a Countermeasure.mp4 |
2.04Мб |
| 1503.Control Variations.mp4 |
1.99Мб |
| 1504.Control Types.mp4 |
2.43Мб |
| 1505.Control Considerations.mp4 |
2.90Мб |
| 1506.Assessing Control Strength.mp4 |
3.30Мб |
| 1507.Countermeasure Assurance.mp4 |
1.15Мб |
| 1508.Example Countermeasures.mp4 |
5.75Мб |
| 1509.Conclusion.mp4 |
1.20Мб |
| 1601.Introduction.mp4 |
2.57Мб |
| 1602.Risk Management Framework.mp4 |
1.16Мб |
| 1603.Leveraging Frameworks.mp4 |
1.95Мб |
| 1604.NIST Risk Management Framework RMF.mp4 |
8.64Мб |
| 1605.FAIR.mp4 |
4.12Мб |
| 1606.OCTAVE Allegro.mp4 |
3.06Мб |
| 1607.Summary.mp4 |
897.41Кб |
| cissp-security-risk-management.zip |
21.20Мб |