589689.xyz

CISSP® - Security Operations

  • 收录时间:2018-02-26 22:04:46
  • 文件大小:272MB
  • 下载次数:123
  • 最近下载:2020-12-03 22:49:18
  • 磁力链接:

文件列表

  1. 17. External Physical Security/56. Barriers.mp4 19MB
  2. 15. Internal Physical Security/48. Alarms, Access Cards, Biometrics, and Locks.mp4 16MB
  3. 7. Operate and Maintain Protective Controls/22. Maintaining and Operating Protective Controls.mp4 14MB
  4. 3. Digital Forensics/07. Creating a Digital Forensics Capability.mp4 13MB
  5. 13. Personnel Privacy and Safety/42. Safety Matters.mp4 12MB
  6. 6. Change Management/19. Change Control Process.mp4 12MB
  7. 3. Digital Forensics/06. Digital Forensics Foundations.mp4 10MB
  8. 4. Logging and Monitoring/12. Logging and Monitoring Concerns.mp4 10MB
  9. 5. Vulnerability Management/15. Vulnerability Assessment.mp4 9MB
  10. 14. Business Continuity and Disaster Recovery/45. Disaster Recovery and Business Continuity.mp4 9MB
  11. 4. Logging and Monitoring/11. Log Management.mp4 9MB
  12. 17. External Physical Security/57. Lighting.mp4 9MB
  13. 12. Recovery Strategies/38. Recovery Strategies.mp4 9MB
  14. cissp-security-operations.zip 9MB
  15. 11. Resource Provisioning/35. Provisioning Assets.mp4 9MB
  16. 16. Securing Assets/53. Protecting Security Equipment.mp4 8MB
  17. 5. Vulnerability Management/16. Patch Management.mp4 7MB
  18. 4. Logging and Monitoring/10. Logging and Monitoring Basics.mp4 7MB
  19. 13. Personnel Privacy and Safety/41. Privacy.mp4 6MB
  20. 8. Incident Management/26. Incident Response Life Cycle.mp4 5MB
  21. 15. Internal Physical Security/50. Mantraps, Safes, Vaults, and Turnstiles.mp4 5MB
  22. 9. Investigative Types/29. Investigative Types.mp4 5MB
  23. 8. Incident Management/25. Creating an Incident Response Capability.mp4 5MB
  24. 2. Introduction to Security Operations/03. Security Operations Foundations.mp4 5MB
  25. 10. Evidence Handling/32. Rules of Evidence.mp4 4MB
  26. 1. Course Overview/01. Course Overview.mp4 3MB
  27. 7. Operate and Maintain Protective Controls/23. Important Terms and Conclusion.mp4 3MB
  28. 17. External Physical Security/58. Closed Circuit Television.mp4 3MB
  29. 2. Introduction to Security Operations/02. Introduction.mp4 3MB
  30. 15. Internal Physical Security/49. Key Controls.mp4 3MB
  31. 3. Digital Forensics/05. Introduction to Digital Forensics.mp4 2MB
  32. 14. Business Continuity and Disaster Recovery/46. Conclusion.mp4 2MB
  33. 13. Personnel Privacy and Safety/43. Conclusion.mp4 1MB
  34. 17. External Physical Security/55. Introduction.mp4 1MB
  35. 3. Digital Forensics/08. Conclusion.mp4 1MB
  36. 14. Business Continuity and Disaster Recovery/44. Introduction.mp4 1MB
  37. 11. Resource Provisioning/36. Conclusion.mp4 1MB
  38. 12. Recovery Strategies/37. Introduction.mp4 1MB
  39. 11. Resource Provisioning/34. Introduction.mp4 1MB
  40. 7. Operate and Maintain Protective Controls/21. Introduction.mp4 1MB
  41. 9. Investigative Types/30. Conclusion.mp4 1MB
  42. 15. Internal Physical Security/47. Introduction.mp4 1MB
  43. 10. Evidence Handling/31. Introduction.mp4 1MB
  44. 9. Investigative Types/28. Introduction.mp4 1MB
  45. 5. Vulnerability Management/14. Introduction.mp4 928KB
  46. 6. Change Management/18. Introduction.mp4 924KB
  47. 16. Securing Assets/52. Introduction.mp4 910KB
  48. 6. Change Management/20. Conclusion.mp4 880KB
  49. 16. Securing Assets/54. Conclusion.mp4 874KB
  50. 4. Logging and Monitoring/09. Introduction.mp4 869KB
  51. 5. Vulnerability Management/17. Conclusion.mp4 861KB
  52. 17. External Physical Security/59. Conclusion.mp4 831KB
  53. 2. Introduction to Security Operations/04. Conclusion.mp4 829KB
  54. 8. Incident Management/24. Introduction.mp4 813KB
  55. 10. Evidence Handling/33. Conclusion.mp4 743KB
  56. 13. Personnel Privacy and Safety/40. Introduction.mp4 738KB
  57. 12. Recovery Strategies/39. Conclusion.mp4 724KB
  58. 4. Logging and Monitoring/13. Conclusion.mp4 716KB
  59. 15. Internal Physical Security/51. Conclusion.mp4 694KB
  60. 8. Incident Management/27. Conclusion.mp4 574KB