Pluralsight - CISSP - Asset Security
- 收录时间:2018-06-10 06:20:02
- 文件大小:95MB
- 下载次数:38
- 最近下载:2020-12-12 22:35:31
- 磁力链接:
-
文件列表
- 02. Information and Asset Classification/02_01-Introduction to Information and Asset Classification.mp4 9MB
- 06. Data Security Controls/06_04-Access Control Methodologies.mp4 6MB
- 02. Information and Asset Classification/02_02-Common Classification Levels.mp4 6MB
- 05. Appropriate Retention/05_05-Destruction of Data.mp4 6MB
- Exercise files/cisspassetsecurity.zip 5MB
- 03. Data and System Ownership/03_03-How to Identify Data and System Ownership.mp4 4MB
- 03. Data and System Ownership/03_02-What Is Data and System Ownership.mp4 4MB
- 02. Information and Asset Classification/02_05-Control Decisions Based on Classification.mp4 4MB
- 04. Privacy Protection/04_01-Introduction to Privacy Protection.mp4 3MB
- 04. Privacy Protection/04_03-What Type of Data Is Related to Privacy Protection.mp4 3MB
- 02. Information and Asset Classification/02_03-CMDB and Classification.mp4 2MB
- 02. Information and Asset Classification/02_04-Classification Impacts to Access.mp4 2MB
- 06. Data Security Controls/06_06-Automation Is Your Friend for Data Security Controls.mp4 2MB
- 05. Appropriate Retention/05_01-Introduction to Appropriate Retention.mp4 2MB
- 05. Appropriate Retention/05_02-What Is Appropriate Retention.mp4 2MB
- 06. Data Security Controls/06_03-Classification and Data Security Controls.mp4 2MB
- 04. Privacy Protection/04_04-How Is Privacy Protection Related to Data Classification.mp4 2MB
- 07. Handling Requirements/07_02-What Are Handling Requirements.mp4 2MB
- 06. Data Security Controls/06_02-What Are Data Security Controls.mp4 2MB
- 04. Privacy Protection/04_02-What Is Privacy Protection.mp4 2MB
- 05. Appropriate Retention/05_03-Common Data Retention Requirements.mp4 2MB
- 03. Data and System Ownership/03_04-Structured Is Easier to Determine than Unstructured.mp4 2MB
- 03. Data and System Ownership/03_01-Introduction to Data and System Ownership.mp4 2MB
- 07. Handling Requirements/07_04-Common Handling Requirements.mp4 2MB
- 04. Privacy Protection/04_05-International Privacy Landscape.mp4 2MB
- 06. Data Security Controls/06_05-Cryptography Methods.mp4 2MB
- 05. Appropriate Retention/05_04-Shouldnt I Keep My Data Forever.mp4 1MB
- 06. Data Security Controls/06_01-Introduction to Data Security Controls.mp4 1MB
- 04. Privacy Protection/04_06-CMDB and Privacy Protection.mp4 1MB
- 07. Handling Requirements/07_03-How Does Classification Impact Handling Requirements.mp4 1MB
- 05. Appropriate Retention/05_06-CMDB and Appropriate Retention.mp4 1MB
- 03. Data and System Ownership/03_05-CMDB and Ownership.mp4 1MB
- 07. Handling Requirements/07_01-Introduction to Handling Requirements.mp4 1015KB
- 01. Introduction/01_02-Whats Asset Security and Whats Next.mp4 989KB
- 01. Introduction/01_01-CISSP Asset Security.mp4 986KB
- 07. Handling Requirements/07_05-Conclusion.mp4 935KB
- 05. Appropriate Retention/05_07-Conclusion.mp4 929KB
- 02. Information and Asset Classification/02_06-Conclusion.mp4 857KB
- 04. Privacy Protection/04_07-Conclusion.mp4 798KB
- 06. Data Security Controls/06_07-Conclusion.mp4 687KB
- 03. Data and System Ownership/03_06-Conclusion.mp4 567KB