589689.xyz

[ ] Linkedin - SSCP Cert Prep - 3 Risk Identification, Monitoring, and Analysis (2021)

  • 收录时间:2023-08-20 16:33:21
  • 文件大小:1GB
  • 下载次数:1
  • 最近下载:2023-08-20 16:33:21
  • 磁力链接:

文件列表

  1. ~Get Your Files Here !/2 Risk Management/05 Quantitative risk assessment.mp4 55MB
  2. ~Get Your Files Here !/7 Security Monitoring/31 Monitoring log files.mp4 49MB
  3. ~Get Your Files Here !/5 Vulnerability Scanning/22 Scan configuration.mp4 47MB
  4. ~Get Your Files Here !/4 Understanding Vulnerability Types/16 Vulnerability impacts.mp4 46MB
  5. ~Get Your Files Here !/5 Vulnerability Scanning/20 What is vulnerability management.mp4 44MB
  6. ~Get Your Files Here !/2 Risk Management/04 Risk assessment.mp4 40MB
  7. ~Get Your Files Here !/5 Vulnerability Scanning/25 Analyzing scan reports.mp4 40MB
  8. ~Get Your Files Here !/2 Risk Management/09 Risk visibility and reporting.mp4 39MB
  9. ~Get Your Files Here !/5 Vulnerability Scanning/21 Identifying scan targets.mp4 39MB
  10. ~Get Your Files Here !/5 Vulnerability Scanning/23 Scan perspective.mp4 39MB
  11. ~Get Your Files Here !/2 Risk Management/06 Risk management.mp4 38MB
  12. ~Get Your Files Here !/4 Understanding Vulnerability Types/17 Supply chain vulnerabilities.mp4 38MB
  13. ~Get Your Files Here !/6 Legal and Regulatory Concerns/29 Data privacy.mp4 37MB
  14. ~Get Your Files Here !/7 Security Monitoring/33 Continuous security monitoring.mp4 36MB
  15. ~Get Your Files Here !/7 Security Monitoring/32 Security information and event management.mp4 36MB
  16. ~Get Your Files Here !/2 Risk Management/08 Risk management frameworks.mp4 34MB
  17. ~Get Your Files Here !/3 Threat Modeling/14 Automating threat intelligence.mp4 33MB
  18. ~Get Your Files Here !/3 Threat Modeling/15 Threat hunting.mp4 33MB
  19. ~Get Your Files Here !/4 Understanding Vulnerability Types/18 Configuration vulnerabilities.mp4 33MB
  20. ~Get Your Files Here !/3 Threat Modeling/11 Managing threat indicators.mp4 32MB
  21. ~Get Your Files Here !/5 Vulnerability Scanning/24 CVSS (Common Vulnerability Scoring System).mp4 31MB
  22. ~Get Your Files Here !/3 Threat Modeling/10 Threat intelligence.mp4 29MB
  23. ~Get Your Files Here !/7 Security Monitoring/34 Visualization and reporting.mp4 26MB
  24. ~Get Your Files Here !/6 Legal and Regulatory Concerns/28 Legal definitions.mp4 25MB
  25. ~Get Your Files Here !/3 Threat Modeling/12 Intelligence sharing.mp4 22MB
  26. ~Get Your Files Here !/7 Security Monitoring/36 Legal and ethical issues in monitoring.mp4 22MB
  27. ~Get Your Files Here !/2 Risk Management/07 Ongoing risk management.mp4 22MB
  28. ~Get Your Files Here !/7 Security Monitoring/35 Compliance monitoring.mp4 21MB
  29. ~Get Your Files Here !/3 Threat Modeling/13 Identifying threats.mp4 21MB
  30. ~Get Your Files Here !/5 Vulnerability Scanning/26 Correlating scan results.mp4 21MB
  31. ~Get Your Files Here !/6 Legal and Regulatory Concerns/30 Data breaches.mp4 20MB
  32. ~Get Your Files Here !/4 Understanding Vulnerability Types/19 Architectural vulnerabilities.mp4 19MB
  33. ~Get Your Files Here !/6 Legal and Regulatory Concerns/27 Legal and compliance risks.mp4 18MB
  34. ~Get Your Files Here !/1 Introduction/01 Managing risks.mp4 18MB
  35. ~Get Your Files Here !/1 Introduction/03 Study resources.mp4 15MB
  36. ~Get Your Files Here !/8 Conclusion/37 Continuing your studies.mp4 6MB
  37. ~Get Your Files Here !/1 Introduction/02 What you need to know.mp4 5MB
  38. ~Get Your Files Here !/2 Risk Management/05 Quantitative risk assessment.en.srt 10KB
  39. ~Get Your Files Here !/5 Vulnerability Scanning/22 Scan configuration.en.srt 10KB
  40. ~Get Your Files Here !/7 Security Monitoring/31 Monitoring log files.en.srt 10KB
  41. ~Get Your Files Here !/5 Vulnerability Scanning/20 What is vulnerability management.en.srt 9KB
  42. ~Get Your Files Here !/4 Understanding Vulnerability Types/16 Vulnerability impacts.en.srt 9KB
  43. ~Get Your Files Here !/5 Vulnerability Scanning/25 Analyzing scan reports.en.srt 9KB
  44. ~Get Your Files Here !/5 Vulnerability Scanning/23 Scan perspective.en.srt 8KB
  45. ~Get Your Files Here !/5 Vulnerability Scanning/21 Identifying scan targets.en.srt 8KB
  46. ~Get Your Files Here !/2 Risk Management/04 Risk assessment.en.srt 8KB
  47. ~Get Your Files Here !/7 Security Monitoring/32 Security information and event management.en.srt 8KB
  48. ~Get Your Files Here !/4 Understanding Vulnerability Types/17 Supply chain vulnerabilities.en.srt 8KB
  49. ~Get Your Files Here !/2 Risk Management/09 Risk visibility and reporting.en.srt 8KB
  50. ~Get Your Files Here !/2 Risk Management/06 Risk management.en.srt 8KB
  51. ~Get Your Files Here !/6 Legal and Regulatory Concerns/29 Data privacy.en.srt 7KB
  52. ~Get Your Files Here !/7 Security Monitoring/33 Continuous security monitoring.en.srt 7KB
  53. ~Get Your Files Here !/3 Threat Modeling/14 Automating threat intelligence.en.srt 7KB
  54. ~Get Your Files Here !/2 Risk Management/08 Risk management frameworks.en.srt 7KB
  55. ~Get Your Files Here !/3 Threat Modeling/15 Threat hunting.en.srt 6KB
  56. ~Get Your Files Here !/4 Understanding Vulnerability Types/18 Configuration vulnerabilities.en.srt 6KB
  57. ~Get Your Files Here !/3 Threat Modeling/11 Managing threat indicators.en.srt 6KB
  58. ~Get Your Files Here !/5 Vulnerability Scanning/24 CVSS (Common Vulnerability Scoring System).en.srt 6KB
  59. ~Get Your Files Here !/3 Threat Modeling/10 Threat intelligence.en.srt 6KB
  60. ~Get Your Files Here !/7 Security Monitoring/34 Visualization and reporting.en.srt 5KB
  61. ~Get Your Files Here !/6 Legal and Regulatory Concerns/28 Legal definitions.en.srt 5KB
  62. ~Get Your Files Here !/7 Security Monitoring/35 Compliance monitoring.en.srt 4KB
  63. ~Get Your Files Here !/7 Security Monitoring/36 Legal and ethical issues in monitoring.en.srt 4KB
  64. ~Get Your Files Here !/2 Risk Management/07 Ongoing risk management.en.srt 4KB
  65. ~Get Your Files Here !/5 Vulnerability Scanning/26 Correlating scan results.en.srt 4KB
  66. ~Get Your Files Here !/3 Threat Modeling/12 Intelligence sharing.en.srt 4KB
  67. ~Get Your Files Here !/6 Legal and Regulatory Concerns/30 Data breaches.en.srt 4KB
  68. ~Get Your Files Here !/3 Threat Modeling/13 Identifying threats.en.srt 4KB
  69. ~Get Your Files Here !/4 Understanding Vulnerability Types/19 Architectural vulnerabilities.en.srt 4KB
  70. ~Get Your Files Here !/6 Legal and Regulatory Concerns/27 Legal and compliance risks.en.srt 4KB
  71. ~Get Your Files Here !/1 Introduction/03 Study resources.en.srt 3KB
  72. ~Get Your Files Here !/1 Introduction/01 Managing risks.en.srt 2KB
  73. ~Get Your Files Here !/1 Introduction/02 What you need to know.en.srt 1KB
  74. ~Get Your Files Here !/8 Conclusion/37 Continuing your studies.en.srt 1KB
  75. ~Get Your Files Here !/Bonus Resources.txt 357B
  76. Get Bonus Downloads Here.url 180B