Общая информация
Название [GigaCourse.Com] Udemy - Certified Information Systems Security Officer (CISSO)
Тип
Размер 5.42Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[CourseClub.Me].url 122б
[CourseClub.Me].url 122б
[CourseClub.Me].url 122б
[CourseClub.Me].url 122б
[CourseClub.Me].url 122б
[CourseClub.Me].url 122б
[CourseClub.Me].url 122б
[GigaCourse.Com].url 49б
[GigaCourse.Com].url 49б
[GigaCourse.Com].url 49б
[GigaCourse.Com].url 49б
[GigaCourse.Com].url 49б
[GigaCourse.Com].url 49б
[GigaCourse.Com].url 49б
001 Access Control_en.vtt 14.44Кб
001 Access Control.mp4 115.39Мб
001 Agenda_en.vtt 17.91Кб
001 Agenda.mp4 43.43Мб
001 Asymmetric Cryptography and PKI_en.vtt 18.70Кб
001 Asymmetric Cryptography and PKI.mp4 60.84Мб
001 Authentication_en.vtt 17.30Кб
001 Authentication.mp4 128.59Мб
001 Disaster Recovery_en.vtt 15.10Кб
001 Disaster Recovery.mp4 47.93Мб
001 Information Classification_en.vtt 18.35Кб
001 Information Classification_en.vtt 20.54Кб
001 Information Classification_en.vtt 18.07Кб
001 Information Classification_en.vtt 18.10Кб
001 Information Classification_en.vtt 15.66Кб
001 Information Classification_en.vtt 18.22Кб
001 Information Classification_en.vtt 18.29Кб
001 Information Classification_en.vtt 18.63Кб
001 Information Classification_en.vtt 18.27Кб
001 Information Classification_en.vtt 19.05Кб
001 Information Classification.mp4 60.21Мб
001 Information Classification.mp4 60.96Мб
001 Information Classification.mp4 55.61Мб
001 Information Classification.mp4 58.40Мб
001 Information Classification.mp4 118.73Мб
001 Information Classification.mp4 144.45Мб
001 Information Classification.mp4 83.45Мб
001 Information Classification.mp4 98.75Мб
001 Information Classification.mp4 129.46Мб
001 Information Classification.mp4 135.27Мб
001 Malware and Attacks_en.vtt 18.39Кб
001 Malware and Attacks.mp4 130.56Мб
001 Security Management_en.vtt 17.54Кб
001 Security Management.mp4 56.53Мб
001 Security Models and Evaluation Criteria_en.vtt 17.89Кб
001 Security Models and Evaluation Criteria.mp4 85.51Мб
001 Symmetric Cryptography and Hashing_en.vtt 16.84Кб
001 Symmetric Cryptography and Hashing.mp4 59.75Мб
002 Access Control Characteristics_en.vtt 19.04Кб
002 Access Control Characteristics.mp4 64.56Мб
002 Artificial Intelligence_en.vtt 19.56Кб
002 Artificial Intelligence.mp4 140.97Мб
002 Biometrics Error Types_en.vtt 19.15Кб
002 Biometrics Error Types.mp4 35.23Мб
002 Development Methodologies_en.vtt 13.31Кб
002 Development Methodologies.mp4 44.82Мб
002 Enterprise Security Program_en.vtt 12.99Кб
002 Enterprise Security Program.mp4 24.25Мб
002 Example of Hybrid Cryptography_en.vtt 16.77Кб
002 Example of Hybrid Cryptography.mp4 74.61Мб
002 Historical Uses of Symmetric Cryptography Vernam Cipher_en.vtt 14.84Кб
002 Historical Uses of Symmetric Cryptography Vernam Cipher.mp4 53.48Мб
002 How to Identify the Most Critical Company Functions_en.vtt 12.39Кб
002 How to Identify the Most Critical Company Functions.mp4 43.58Мб
002 Integrated Security is Designed Security_en.vtt 20.45Кб
002 Integrated Security is Designed Security.mp4 63.35Мб
002 Intellectual Property Law_en.vtt 17.98Кб
002 Intellectual Property Law.mp4 56.77Мб
002 PBX Vulnerabilities_en.vtt 11.88Кб
002 PBX Vulnerabilities.mp4 39.06Мб
002 Product Implementation Concerns_en.vtt 17.64Кб
002 Product Implementation Concerns.mp4 88.65Мб
002 Recovery Plan_en.vtt 23.16Кб
002 Recovery Plan.mp4 98.52Мб
002 Risk Management_en.vtt 17.09Кб
002 Risk Management.mp4 60.80Мб
002 Summary of Topologies_en.vtt 21.44Кб
002 Summary of Topologies.mp4 79.44Мб
002 Transport Layer_en.vtt 20.30Кб
002 Transport Layer.mp4 94.46Мб
002 What Does It Mean to Be in a Specific Ring_en.vtt 15.62Кб
002 What Does It Mean to Be in a Specific Ring.mp4 131.42Мб
003 CA and RA Roles_en.vtt 18.95Кб
003 CA and RA Roles.mp4 57.04Мб
003 Countries Working Together_en.vtt 17.87Кб
003 Countries Working Together.mp4 119.64Мб
003 Facility Backups - Hot Site_en.vtt 10.69Кб
003 Facility Backups - Hot Site.mp4 70.10Мб
003 Information Classification_en.vtt 18.70Кб
003 Information Classification.mp4 157.78Мб
003 Memory Cards_en.vtt 13.59Кб
003 Memory Cards.mp4 58.60Мб
003 Non-Interference Model_en.vtt 12.84Кб
003 Non-Interference Model.mp4 60.00Мб
003 Quantitative Analysis_en.vtt 18.00Кб
003 Quantitative Analysis.mp4 60.73Мб
003 Redundant Array of Independent Disk (RAID)_en.vtt 16.65Кб
003 Redundant Array of Independent Disk (RAID).mp4 51.31Мб
003 Repeater_en.vtt 22.67Кб
003 Repeater.mp4 69.01Мб
003 Return to Normal Operations_en.vtt 14.94Кб
003 Return to Normal Operations.mp4 47.74Мб
003 Roadmap to Maturity_en.vtt 16.91Кб
003 Roadmap to Maturity.mp4 55.44Мб
003 Security Issues_en.vtt 14.74Кб
003 Security Issues.mp4 46.93Мб
003 SSLTLS_en.vtt 8.54Кб
003 SSLTLS.mp4 27.78Мб
003 System Functionality_en.vtt 12.64Кб
003 System Functionality.mp4 40.30Мб
003 Threats to Access Control_en.vtt 6.72Кб
003 Threats to Access Control.mp4 65.16Мб
003 Transmission Types - Number of Recievers_en.vtt 19.65Кб
003 Transmission Types - Number of Recievers.mp4 57.23Мб
003 Virus_en.vtt 9.32Кб
003 Virus.mp4 77.63Мб
004 Attacking Through Applications_en.vtt 13.50Кб
004 Attacking Through Applications.mp4 42.51Мб
004 DDoS_en.vtt 10.70Кб
004 DDoS.mp4 56.44Мб
004 Firewall Types - Circuit - Level Proxy Firewall_en.vtt 18.35Кб
004 Firewall Types - Circuit - Level Proxy Firewall.mp4 54.24Мб
004 Human Resources Issues_en.vtt 9.69Кб
004 Human Resources Issues.mp4 49.64Мб
004 Information Classification_en.vtt 9.69Кб
004 Information Classification.mp4 74.67Мб
004 Issues Pertaining to Kerberos_en.vtt 11.84Кб
004 Issues Pertaining to Kerberos.mp4 38.91Мб
004 ITSEC - Good and Bad_en.vtt 10.72Кб
004 ITSEC - Good and Bad.mp4 86.44Мб
004 Linking Through COM_en.vtt 17.64Кб
004 Linking Through COM.mp4 125.39Мб
004 Link versus End-to-End Encryption_en.vtt 19.48Кб
004 Link versus End-to-End Encryption.mp4 76.88Мб
004 Methodology_en.vtt 18.48Кб
004 Methodology.mp4 141.61Мб
004 Network Topologies_en.vtt 18.43Кб
004 Network Topologies.mp4 54.28Мб
004 Privacy of Sensitive Data_en.vtt 12.98Кб
004 Privacy of Sensitive Data.mp4 52.94Мб
004 Symmetric Algorithms - DS_en.vtt 22.06Кб
004 Symmetric Algorithms - DS.mp4 120.35Мб
004 Wireless Network Topologies_en.vtt 18.08Кб
004 Wireless Network Topologies.mp4 92.51Мб
005 Discretionary Access Control Model_en.vtt 12.84Кб
005 Discretionary Access Control Model.mp4 61.01Мб
005 IPSec Handshaking Process_en.vtt 17.45Кб
005 IPSec Handshaking Process.mp4 51.19Мб
005 TCPIP Suite_en.vtt 16.82Кб
005 TCPIP Suite.mp4 51.49Мб
005 WAN Technologies - DSL_en.vtt 15.66Кб
005 WAN Technologies - DSL.mp4 57.72Мб
005 WPA and WPA2 Mode Types_en.vtt 16.19Кб
005 WPA and WPA2 Mode Types.mp4 113.72Мб
006 Access Control Administration_en.vtt 12.59Кб
006 Access Control Administration.mp4 56.85Мб
006 Types of Physical IDS_en.vtt 20.49Кб
006 Types of Physical IDS.mp4 93.46Мб
12128224-CISSO-WB01.pdf 289.36Кб
12128228-CISSO-WB02.pdf 284.08Кб
12128232-CISSO-WB03.pdf 283.16Кб
12128242-CISSO-WB04.pdf 280.37Кб
12128250-CISSO-WB05.pdf 283.38Кб
12128256-CISSO-WB06.pdf 282.20Кб
12128258-CISSO-WB07.pdf 277.08Кб
12128266-CISSO-WB09.pdf 284.82Кб
12128270-CISSO-WB10.pdf 277.97Кб
12128274-CISSO-WB11.pdf 221.97Кб
12128278-CISSO-WB12.pdf 280.49Кб
12128288-CISSO-WB14.pdf 221.33Кб
12128292-CISSO-WB15.pdf 281.96Кб
12128298-CISSO-WB16.pdf 220.77Кб
12128306-CISSO-WB17.pdf 220.96Кб
12128308-CISSO-WB18.pdf 280.88Кб
12128322-CISSO-WB19.pdf 282.44Кб
19401620-CISSO-WB13.pdf 276.79Кб
19401622-CISSO-WB08.pdf 221.67Кб
Статистика распространения по странам
Всего 0
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент