589689.xyz

Pluralsight - CISSP - Asset Security

  • 收录时间:2018-06-10 06:20:02
  • 文件大小:95MB
  • 下载次数:38
  • 最近下载:2020-12-12 22:35:31
  • 磁力链接:

文件列表

  1. 02. Information and Asset Classification/02_01-Introduction to Information and Asset Classification.mp4 9MB
  2. 06. Data Security Controls/06_04-Access Control Methodologies.mp4 6MB
  3. 02. Information and Asset Classification/02_02-Common Classification Levels.mp4 6MB
  4. 05. Appropriate Retention/05_05-Destruction of Data.mp4 6MB
  5. Exercise files/cisspassetsecurity.zip 5MB
  6. 03. Data and System Ownership/03_03-How to Identify Data and System Ownership.mp4 4MB
  7. 03. Data and System Ownership/03_02-What Is Data and System Ownership.mp4 4MB
  8. 02. Information and Asset Classification/02_05-Control Decisions Based on Classification.mp4 4MB
  9. 04. Privacy Protection/04_01-Introduction to Privacy Protection.mp4 3MB
  10. 04. Privacy Protection/04_03-What Type of Data Is Related to Privacy Protection.mp4 3MB
  11. 02. Information and Asset Classification/02_03-CMDB and Classification.mp4 2MB
  12. 02. Information and Asset Classification/02_04-Classification Impacts to Access.mp4 2MB
  13. 06. Data Security Controls/06_06-Automation Is Your Friend for Data Security Controls.mp4 2MB
  14. 05. Appropriate Retention/05_01-Introduction to Appropriate Retention.mp4 2MB
  15. 05. Appropriate Retention/05_02-What Is Appropriate Retention.mp4 2MB
  16. 06. Data Security Controls/06_03-Classification and Data Security Controls.mp4 2MB
  17. 04. Privacy Protection/04_04-How Is Privacy Protection Related to Data Classification.mp4 2MB
  18. 07. Handling Requirements/07_02-What Are Handling Requirements.mp4 2MB
  19. 06. Data Security Controls/06_02-What Are Data Security Controls.mp4 2MB
  20. 04. Privacy Protection/04_02-What Is Privacy Protection.mp4 2MB
  21. 05. Appropriate Retention/05_03-Common Data Retention Requirements.mp4 2MB
  22. 03. Data and System Ownership/03_04-Structured Is Easier to Determine than Unstructured.mp4 2MB
  23. 03. Data and System Ownership/03_01-Introduction to Data and System Ownership.mp4 2MB
  24. 07. Handling Requirements/07_04-Common Handling Requirements.mp4 2MB
  25. 04. Privacy Protection/04_05-International Privacy Landscape.mp4 2MB
  26. 06. Data Security Controls/06_05-Cryptography Methods.mp4 2MB
  27. 05. Appropriate Retention/05_04-Shouldnt I Keep My Data Forever.mp4 1MB
  28. 06. Data Security Controls/06_01-Introduction to Data Security Controls.mp4 1MB
  29. 04. Privacy Protection/04_06-CMDB and Privacy Protection.mp4 1MB
  30. 07. Handling Requirements/07_03-How Does Classification Impact Handling Requirements.mp4 1MB
  31. 05. Appropriate Retention/05_06-CMDB and Appropriate Retention.mp4 1MB
  32. 03. Data and System Ownership/03_05-CMDB and Ownership.mp4 1MB
  33. 07. Handling Requirements/07_01-Introduction to Handling Requirements.mp4 1015KB
  34. 01. Introduction/01_02-Whats Asset Security and Whats Next.mp4 989KB
  35. 01. Introduction/01_01-CISSP Asset Security.mp4 986KB
  36. 07. Handling Requirements/07_05-Conclusion.mp4 935KB
  37. 05. Appropriate Retention/05_07-Conclusion.mp4 929KB
  38. 02. Information and Asset Classification/02_06-Conclusion.mp4 857KB
  39. 04. Privacy Protection/04_07-Conclusion.mp4 798KB
  40. 06. Data Security Controls/06_07-Conclusion.mp4 687KB
  41. 03. Data and System Ownership/03_06-Conclusion.mp4 567KB