[ ] Udemy - Information Security Fundamentals (Best Starting Point)
- 收录时间:2021-11-16 05:35:23
- 文件大小:2GB
- 下载次数:1
- 最近下载:2021-11-16 05:35:23
- 磁力链接:
-
文件列表
- ~Get Your Files Here !/11. Common Information Security Policies/3. Common Policies (Part 2).mp4 183MB
- ~Get Your Files Here !/11. Common Information Security Policies/2. Common Policies (Part 1).mp4 169MB
- ~Get Your Files Here !/3. User Authorisation/2. Passwords.mp4 140MB
- ~Get Your Files Here !/7. Types of Attacks/2. Phishing.mp4 138MB
- ~Get Your Files Here !/2. What is Information Security/1. What is Information Security (definition and CIA).mp4 107MB
- ~Get Your Files Here !/2. What is Information Security/3. Compliance Standards.mp4 100MB
- ~Get Your Files Here !/3. User Authorisation/4. Authentication Sessions.mp4 89MB
- ~Get Your Files Here !/1. Course Introduction/1. Welcome & What's coming up..mp4 81MB
- ~Get Your Files Here !/4. Asset Classification/2. Managing Classification.mp4 81MB
- ~Get Your Files Here !/3. User Authorisation/1. Types of Authentication.mp4 80MB
- ~Get Your Files Here !/10. Incident Management/1. Overview of Incident Management.mp4 75MB
- ~Get Your Files Here !/9. Risk/2. Managing Risk.mp4 75MB
- ~Get Your Files Here !/9. Risk/1. What is Risk.mp4 70MB
- ~Get Your Files Here !/7. Types of Attacks/3. Social Engineering.mp4 67MB
- ~Get Your Files Here !/4. Asset Classification/1. What is Asset Classification.mp4 67MB
- ~Get Your Files Here !/3. User Authorisation/3. Multi Factor Authentication.mp4 64MB
- ~Get Your Files Here !/11. Common Information Security Policies/1. Overview of Information Security Policies.mp4 58MB
- ~Get Your Files Here !/5. Access Control/3. Physical Security.mp4 55MB
- ~Get Your Files Here !/1. Course Introduction/3. The Q&A Board.mp4 54MB
- ~Get Your Files Here !/6. Network Security/2. Firewalls.mp4 54MB
- ~Get Your Files Here !/7. Types of Attacks/1. Common Types of Attacks.mp4 53MB
- ~Get Your Files Here !/8. Encryption/2. Types of Encryption.mp4 52MB
- ~Get Your Files Here !/12. Cyber Awareness/1. Importance of Cyber Awareness.mp4 50MB
- ~Get Your Files Here !/5. Access Control/1. Principle of Least Privileged Access.mp4 45MB
- ~Get Your Files Here !/6. Network Security/1. Types of Network.mp4 36MB
- ~Get Your Files Here !/6. Network Security/3. Network Segmentation.mp4 30MB
- ~Get Your Files Here !/2. What is Information Security/4. Information Security vs Cyber Security.mp4 30MB
- ~Get Your Files Here !/1. Course Introduction/2. The Udemy App.mp4 21MB
- ~Get Your Files Here !/5. Access Control/2. Protecting Files.mp4 18MB
- ~Get Your Files Here !/2. What is Information Security/2. How do we safe guard our data.mp4 15MB
- ~Get Your Files Here !/8. Encryption/1. What is Encryption.mp4 14MB
- ~Get Your Files Here !/3. User Authorisation/1.1 3.1 Types of Authentication.pdf 3MB
- ~Get Your Files Here !/5. Access Control/1.1 5.1 Principle of Least Privilege Access.pdf 2MB
- ~Get Your Files Here !/4. Asset Classification/2.1 4.2 Managing Classifications.pdf 2MB
- ~Get Your Files Here !/5. Access Control/2.1 5.2 Protecting Files-2.pdf 2MB
- ~Get Your Files Here !/1. Course Introduction/3.1 1.3 Using the Q&A.pdf 1MB
- ~Get Your Files Here !/2. What is Information Security/3.1 2.3 Available Standards-2.pdf 752KB
- ~Get Your Files Here !/8. Encryption/1.1 8.1 What is encryption.pdf 695KB
- ~Get Your Files Here !/11. Common Information Security Policies/1.1 11.1 Information Security Policies.pdf 679KB
- ~Get Your Files Here !/3. User Authorisation/2.1 3.2 Passwords-3.pdf 666KB
- ~Get Your Files Here !/3. User Authorisation/3.1 3.3 MFA.pdf 665KB
- ~Get Your Files Here !/10. Incident Management/1.1 10.1 Incident Management.pdf 653KB
- ~Get Your Files Here !/6. Network Security/3.1 6.3 Network Segmentation-3.pdf 643KB
- ~Get Your Files Here !/5. Access Control/3.1 5.3 Physical Security.pdf 639KB
- ~Get Your Files Here !/2. What is Information Security/1.1 2.1 CIA-2.pdf 626KB
- ~Get Your Files Here !/1. Course Introduction/1.1 1.1 Course Intro.pdf 601KB
- ~Get Your Files Here !/6. Network Security/1.1 6.1 Types of Network.pdf 601KB
- ~Get Your Files Here !/12. Cyber Awareness/1.1 12.1 Cyber Awareness.pdf 595KB
- ~Get Your Files Here !/1. Course Introduction/2.1 1.2 The Udemy App.pdf 500KB
- ~Get Your Files Here !/7. Types of Attacks/2.1 7.2 Phishing.pdf 326KB
- ~Get Your Files Here !/8. Encryption/2.1 8.2 Types of Encryption.pdf 295KB
- ~Get Your Files Here !/3. User Authorisation/4.1 3.4 Sessions.pdf 280KB
- ~Get Your Files Here !/9. Risk/2.1 9.2 Managing Risk.pdf 275KB
- ~Get Your Files Here !/7. Types of Attacks/1.1 7.1 Common Types of Attack-2.pdf 253KB
- ~Get Your Files Here !/6. Network Security/2.1 6.2 Firewalls.pdf 243KB
- ~Get Your Files Here !/7. Types of Attacks/3.1 7.3 Social Engineering-3.pdf 238KB
- ~Get Your Files Here !/11. Common Information Security Policies/3.1 11.3 Common Policies Part 2.pdf 231KB
- ~Get Your Files Here !/11. Common Information Security Policies/2.1 11.2 Common Policies Part 1.pdf 231KB
- ~Get Your Files Here !/9. Risk/1.1 9.1 What is Risk.pdf 225KB
- ~Get Your Files Here !/4. Asset Classification/1.1 4.1 What is an Asset-3.pdf 220KB
- ~Get Your Files Here !/2. What is Information Security/2.1 2.2 overview of how we can control access.pdf 175KB
- ~Get Your Files Here !/2. What is Information Security/4.1 2.4 Different between Cyber and Insec.pdf 159KB
- ~Get Your Files Here !/1. Course Introduction/1. Welcome & What's coming up..srt 5KB
- ~Get Your Files Here !/1. Course Introduction/3. The Q&A Board.srt 3KB
- ~Get Your Files Here !/1. Course Introduction/2. The Udemy App.srt 1KB
- ~Get Your Files Here !/Bonus Resources.txt 357B
- Get Bonus Downloads Here.url 176B