589689.xyz

Packt – CompTIA Advanced Security Practitioner (CASP)

  • 收录时间:2018-03-16 15:30:14
  • 文件大小:5GB
  • 下载次数:278
  • 最近下载:2021-01-19 15:44:31
  • 磁力链接:

文件列表

  1. learning_videos/32 - Outage Impact and Estimating Downtime Terms.mp4 90MB
  2. learning_videos/172 - Identifying and Communicating Security Requirements.mp4 89MB
  3. learning_videos/40 - Data Recovery-Storage and Backup Schemes.mp4 80MB
  4. learning_videos/79 - Hashing Algorithms.mp4 76MB
  5. learning_videos/83 - Symmetric Algorithms.mp4 71MB
  6. learning_videos/89 - Cryptographic Attacks.mp4 67MB
  7. learning_videos/176 - Web-Video Conferencing-Instant Messaging.mp4 66MB
  8. learning_videos/117 - Network Device Accessibility and Security.mp4 66MB
  9. learning_videos/86 - Public Key Infrastructure.mp4 65MB
  10. learning_videos/30 - Legal Compliance Part2.mp4 64MB
  11. learning_videos/189 - System Development Life Cycle.mp4 58MB
  12. learning_videos/39 - E-Discovery and Data Retention Policies.mp4 58MB
  13. learning_videos/81 - Cryptographic Concepts.mp4 57MB
  14. learning_videos/44 - Incident Response Guidelines.mp4 57MB
  15. learning_videos/104 - Remote Access Protocols.mp4 55MB
  16. learning_videos/71 - Passive Reconnaissance Tools.mp4 54MB
  17. learning_videos/29 - Legal Compliance Part1.mp4 53MB
  18. learning_videos/100 - Secure Storage Management Techniques.mp4 51MB
  19. learning_videos/188 - End to End Solution Ownership.mp4 51MB
  20. learning_videos/108 - Security Devices.mp4 50MB
  21. learning_videos/31 - Security Policy Business Documents.mp4 50MB
  22. learning_videos/114 - Availability Controls-Terms and Techniques.mp4 47MB
  23. learning_videos/93 - Cloud Storage.mp4 46MB
  24. learning_videos/88 - Des Modes.mp4 45MB
  25. learning_videos/182 - Remote Access and IPsec.mp4 45MB
  26. learning_videos/15 - Worst Case Scenario Planning.mp4 45MB
  27. learning_videos/52 - Situational Awareness and Vulnerability Assessments.mp4 44MB
  28. learning_videos/106 - Network Authentication Methods.mp4 43MB
  29. learning_videos/105 - IPv6 and Transport Encryption.mp4 42MB
  30. learning_videos/13 - Implementing Technical Controls.mp4 41MB
  31. learning_videos/186 - WLAN Security and Attacks.mp4 41MB
  32. learning_videos/109 - Network Devices.mp4 40MB
  33. learning_videos/144 - Software Development Methods.mp4 40MB
  34. learning_videos/27 - Policy Development Updates.mp4 39MB
  35. learning_videos/84 - Asymmetric Algorithms.mp4 39MB
  36. learning_videos/120 - Endpoint Security Software and Data Loss Prevention.mp4 38MB
  37. learning_videos/156 - Enterprise Application Integration Enablers.mp4 38MB
  38. learning_videos/125 - Configuring and Managing Interface Security.mp4 37MB
  39. learning_videos/73 - Memory Dumping and Penetration Testing.mp4 36MB
  40. learning_videos/34 - Incident Response Process.mp4 36MB
  41. learning_videos/141 - Buffer Overflow and other Application Issues.mp4 35MB
  42. learning_videos/123 - Standard Operating Environment and Group Policy Security.mp4 35MB
  43. learning_videos/161 - Biometrics.mp4 35MB
  44. learning_videos/46 - Media-Software and Network Analysis.mp4 34MB
  45. learning_videos/159 - Password Types-Management and Policies.mp4 34MB
  46. learning_videos/185 - WLAN Concepts-Terms-Standards.mp4 34MB
  47. learning_videos/17 - Return Of Investment.mp4 33MB
  48. learning_videos/113 - Network Security Solutions.mp4 33MB
  49. learning_videos/82 - Transport Encryption Protocol.mp4 33MB
  50. learning_videos/33 - Sensitive Information-Internal Security Policies.mp4 33MB
  51. learning_videos/146 - Browser Extensions and Other Web Development Techniques.mp4 33MB
  52. learning_videos/152 - Cloud and Virtualization Models.mp4 33MB
  53. learning_videos/126 - USB-Bluetooth-Firewire Restrictions and Security.mp4 32MB
  54. learning_videos/85 - Hybrid Encryption and Digital Signatures.mp4 31MB
  55. learning_videos/179 - Email Messaging Protocol.mp4 31MB
  56. learning_videos/50 - Security Practices.mp4 31MB
  57. learning_videos/110 - Firewalls.mp4 30MB
  58. learning_videos/78 - Cryptographic Benefits and Techniques.mp4 30MB
  59. learning_videos/36 - Employment and Termination Procedures.mp4 30MB
  60. learning_videos/115 - Advanced Router and Switch Configuration.mp4 29MB
  61. learning_videos/129 - Cloud Security Services.mp4 29MB
  62. learning_videos/102 - Replication and Encryption Methods.mp4 28MB
  63. learning_videos/183 - Mobile and Personal Device Management.mp4 28MB
  64. learning_videos/164 - Access Control Models and Open Authorization.mp4 28MB
  65. learning_videos/53 - Researching Security Implications.mp4 28MB
  66. learning_videos/177 - Desktop Sharing.mp4 28MB
  67. learning_videos/68 - Protocol Analyzer- Network Enumerator-Password Cracker.mp4 27MB
  68. learning_videos/21 - Security Architecture Frameworks.mp4 27MB
  69. learning_videos/184 - Over Air Technology Concerns.mp4 27MB
  70. learning_videos/16 - Calculation Tools and Attacker Motivation.mp4 27MB
  71. learning_videos/18 - Total Cost of Ownership and Risk Strategies.mp4 27MB
  72. learning_videos/180 - Telephony-VoIP and Social Media.mp4 26MB
  73. learning_videos/76 - Social Engineering.mp4 25MB
  74. learning_videos/130 - Boot Loader Protections.mp4 25MB
  75. learning_videos/67 - Port Scanners and Vulnerability Scanners.mp4 24MB
  76. learning_videos/181 - Cloud Based Collaboration.mp4 24MB
  77. learning_videos/98 - Storage Protocols and Fiber Channel over Ethernet (FCoE).mp4 24MB
  78. learning_videos/137 - Specific Application Issues.mp4 24MB
  79. learning_videos/148 - Securing Data Flows.mp4 24MB
  80. learning_videos/45 - Incident and Emergency Response.mp4 24MB
  81. learning_videos/154 - Secure Infrastructure Design.mp4 23MB
  82. learning_videos/190 - Security Implications of Software Development Methodologies.mp4 23MB
  83. learning_videos/24 - Security Policies.mp4 23MB
  84. learning_videos/127 - Full Disk Encryption.mp4 23MB
  85. learning_videos/139 - Input Validation.mp4 23MB
  86. learning_videos/122 - Log Monitoring and Host Hardening.mp4 23MB
  87. learning_videos/92 - Virtual Storage Types and Challenges.mp4 22MB
  88. learning_videos/119 - Trusted Operation Systems.mp4 22MB
  89. learning_videos/90 - Strength vs Performance and Cryptographic Implementations.mp4 22MB
  90. learning_videos/169 - OpenID-Shibboleth and WAYF.mp4 22MB
  91. learning_videos/145 - Monitoring Mechanisms and Client-Server Side Processing.mp4 21MB
  92. learning_videos/107 - 802.1x and Mesh Networks.mp4 21MB
  93. learning_videos/142 - Application Security Framework.mp4 21MB
  94. learning_videos/59 - Benchmarks and Baselines.mp4 21MB
  95. learning_videos/140 - Web Vulnerabilities and Input Mitigation Issues.mp4 21MB
  96. learning_videos/62 - Metrics Collection and Trend Data.mp4 21MB
  97. learning_videos/60 - Prototyping and Testing Multiple Solutions.mp4 20MB
  98. learning_videos/101 - LUN Masking_Mapping and HBA Allocation.mp4 20MB
  99. learning_videos/96 - Storage Area Networks (SANs) and (VSANs).mp4 20MB
  100. learning_videos/128 - Virtualization Security.mp4 20MB
  101. learning_videos/168 - Federation and Security Assertion Markup Language (SAML).mp4 20MB
  102. learning_videos/28 - Developing Processes and Procedures.mp4 20MB
  103. learning_videos/69 - Fuzzers and HTTP Interceptors.mp4 20MB
  104. learning_videos/64 - Security Solutions Business Needs.mp4 19MB
  105. learning_videos/167 - Attestation and Identity Propagation.mp4 19MB
  106. learning_videos/20 - Identifying Vulnerabilities and Threats.mp4 19MB
  107. learning_videos/165 - Extensible Access Control Markup Language (XACML).mp4 19MB
  108. learning_videos/35 - Forensic Tasks.mp4 19MB
  109. learning_videos/55 - Threat Actors.mp4 19MB
  110. learning_videos/12 - Information Life Cycle and Steak-Holder Input.mp4 19MB
  111. learning_videos/95 - Data Archiving.mp4 19MB
  112. learning_videos/178 - Presence Guidelines.mp4 19MB
  113. learning_videos/111 - Wireless Controllers.mp4 19MB
  114. learning_videos/94 - Data Warehousing.mp4 18MB
  115. learning_videos/158 - Authentication and Identity Management.mp4 18MB
  116. learning_videos/11 - Business Classifications.mp4 18MB
  117. learning_videos/07 - Internal and External Influences.mp4 18MB
  118. learning_videos/132 - Virtual Desktop Infrastructure.mp4 18MB
  119. learning_videos/37 - Network Auditing.mp4 18MB
  120. learning_videos/72 - Vulnerability Assessments and Malware Sandboxing.mp4 18MB
  121. learning_videos/149 - Standards Concepts.mp4 17MB
  122. learning_videos/70 - Exploitation Tools.mp4 17MB
  123. learning_videos/74 - Reconnaissance and Fingerprinting.mp4 17MB
  124. learning_videos/80 - Message Authentication Code.mp4 17MB
  125. learning_videos/14 - Determine Aggregate CIA Score.mp4 16MB
  126. learning_videos/22 - Business Continuity Planning.mp4 16MB
  127. learning_videos/112 - Router Security and Port Numbers.mp4 16MB
  128. learning_videos/162 - Dual-Multi Factor and Certificate Authentication.mp4 16MB
  129. learning_videos/150 - Interoperability Issues.mp4 16MB
  130. learning_videos/63 - Security Controls-Reverse Engineering and Deconstructing.mp4 16MB
  131. learning_videos/134 - Virtual TPM.mp4 16MB
  132. learning_videos/41 - Data Owner and Data Handling.mp4 15MB
  133. learning_videos/87 - Digital Certificate Classes and Cypher Types.mp4 15MB
  134. learning_videos/99 - Storage Network File Systems.mp4 15MB
  135. learning_videos/75 - Code Review.mp4 15MB
  136. learning_videos/06 - Third Party Information Security and Providers.mp4 15MB
  137. learning_videos/23 - IT Governance.mp4 14MB
  138. learning_videos/19 - Risk Management Process.mp4 13MB
  139. learning_videos/42 - Disposal Terms and Concepts.mp4 13MB
  140. learning_videos/138 - Session Management.mp4 13MB
  141. learning_videos/43 - Data Breach and Data Analysis.mp4 13MB
  142. learning_videos/191 - Asset Management.mp4 13MB
  143. learning_videos/97 - Network Attached Storage (NAS).mp4 13MB
  144. learning_videos/65 - Lesson Learned- After Action Report.mp4 12MB
  145. learning_videos/10 - CIA Triad.mp4 12MB
  146. learning_videos/04 - Business Model Strategies.mp4 12MB
  147. learning_videos/170 - Advanced Trust Models.mp4 12MB
  148. learning_videos/54 - Global Industry Security Response.mp4 12MB
  149. learning_videos/131 - Virtual Host Vulnerabilities.mp4 11MB
  150. learning_videos/143 - Web Service Security and Secure Coding Standards.mp4 11MB
  151. learning_videos/136 - Web Application Security Design.mp4 11MB
  152. learning_videos/116 - Data Flow Enforcement of Applications and Networks.mp4 11MB
  153. learning_videos/47 - Order of Volatility.mp4 10MB
  154. learning_videos/03 - Risk Management.mp4 10MB
  155. learning_videos/56 - Contract Security Requirements.mp4 10MB
  156. learning_videos/49 - Performing Ongoing Research.mp4 10MB
  157. learning_videos/160 - Authentication Factors.mp4 10MB
  158. learning_videos/163 - Single Sign On Issues.mp4 9MB
  159. learning_videos/173 - Security Controls Recommendations.mp4 9MB
  160. learning_videos/61 - Cost_Benefit Analysis.mp4 9MB
  161. learning_videos/57 - Contract Documents.mp4 9MB
  162. learning_videos/121 - Host Based Firewalls.mp4 9MB
  163. learning_videos/51 - Evolution of Technology.mp4 8MB
  164. learning_videos/166 - Service Provisioning Markup Language (SPML).mp4 8MB
  165. learning_videos/08 - Impact of De-Perimeterization.mp4 8MB
  166. learning_videos/151 - In House Commercial and Customized Applications.mp4 8MB
  167. learning_videos/155 - Storage Integration Security.mp4 7MB
  168. learning_videos/153 - Logical and Physical Deployment Diagrams.mp4 7MB
  169. learning_videos/124 - Command Shell Restrictions.mp4 7MB
  170. learning_videos/135 - Application Vulnerabilities and Security Controls.mp4 7MB
  171. learning_videos/66 - Assessment Tools and Methods.mp4 7MB
  172. learning_videos/48 - Industry Trends Overview.mp4 6MB
  173. learning_videos/05 - Integrating Diverse Industries.mp4 6MB
  174. learning_videos/118 - Security Controls for Hosts.mp4 6MB
  175. learning_videos/91 - Enterprise Storage.mp4 6MB
  176. learning_videos/103 - Network and Security Components-Concepts-Security Architectures.mp4 6MB
  177. learning_videos/175 - Secure Communication and Collaboration.mp4 6MB
  178. learning_videos/25 - Security-Privacy Policies and Procedures Part1.mp4 6MB
  179. learning_videos/187 - Security Across the Technology Life Cycle.mp4 5MB
  180. learning_videos/174 - Secure Solutions Collaboration.mp4 5MB
  181. learning_videos/77 - Social Cryptographic Concepts and Techniques.mp4 5MB
  182. learning_videos/58 - Securing the Enterprise Overview.mp4 5MB
  183. learning_videos/01 - Course Introduction.mp4 5MB
  184. learning_videos/157 - Authentication and Authorization Technologies.mp4 5MB
  185. learning_videos/147 - Host-Storage-Network and Application Integration.mp4 5MB
  186. learning_videos/02 - Business Influences and Associated Security Risks.mp4 5MB
  187. learning_videos/171 - Business Unit Collaboration.mp4 5MB
  188. learning_videos/38 - Incident Response and Recovery Procedures.mp4 4MB
  189. learning_videos/09 - Risk Mitigation Planning - Strategies and Controls.mp4 4MB
  190. learning_videos/133 - Terminal Services.mp4 4MB
  191. learning_videos/26 - Security-Privacy Policies and Procedures Part2.mp4 3MB
  192. learning_videos/192 - Course End.mp4 2MB
  193. Приватные видеокурсы.pdf 348KB
  194. Packt – CompTIA Advanced Security Practitioner (CASP) description.pdf 209KB
  195. Это очень важно!.txt 769B