589689.xyz

[] Udemy - Certified Information Systems Security Officer (CISSO)

  • 收录时间:2022-04-11 12:40:14
  • 文件大小:5GB
  • 下载次数:1
  • 最近下载:2022-04-11 12:40:14
  • 磁力链接:

文件列表

  1. 07 - Module 07 - Symmetric Cryptography and Hashing/003 Information Classification.mp4 158MB
  2. 13 - Module 13 - Software Development Security/001 Information Classification.mp4 144MB
  3. 06 - Module 06 - Operations Security/004 Methodology.mp4 142MB
  4. 14 - Module 14 - Database Security and System Development/002 Artificial Intelligence.mp4 141MB
  5. 19 - Module 19 – Physical/001 Information Classification.mp4 135MB
  6. 05 - Module 05 - Security Models/002 What Does It Mean to Be in a Specific Ring.mp4 131MB
  7. 15 - Module 15 - Malware and Software Attacks/001 Malware and Attacks.mp4 131MB
  8. 18 - Module 18 - Incident Management, Law, and Ethics/001 Information Classification.mp4 129MB
  9. 03 - Module 03 -Authentication/001 Authentication.mp4 129MB
  10. 13 - Module 13 - Software Development Security/004 Linking Through COM.mp4 125MB
  11. 07 - Module 07 - Symmetric Cryptography and Hashing/004 Symmetric Algorithms - DS.mp4 120MB
  12. 18 - Module 18 - Incident Management, Law, and Ethics/003 Countries Working Together.mp4 120MB
  13. 12 - Module 12 - Security Architecture/001 Information Classification.mp4 119MB
  14. 04 - Module 04 - Access Control/001 Access Control.mp4 115MB
  15. 11 - Module 11 - Telephony, VPNs and Wireless/005 WPA and WPA2 Mode Types.mp4 114MB
  16. 16 - Module 16 - Business Continuity/001 Information Classification.mp4 99MB
  17. 17 - Module 17 - Disaster Recovery/002 Recovery Plan.mp4 99MB
  18. 10 - Module 10 - Network Protocols and Devices/002 Transport Layer.mp4 94MB
  19. 08 - Module 08 - Asymmetric Cryptography and PKI/006 Types of Physical IDS.mp4 93MB
  20. 11 - Module 11 - Telephony, VPNs and Wireless/004 Wireless Network Topologies.mp4 93MB
  21. 06 - Module 06 - Operations Security/002 Product Implementation Concerns.mp4 89MB
  22. 05 - Module 05 - Security Models/004 ITSEC - Good and Bad.mp4 86MB
  23. 05 - Module 05 - Security Models/001 Security Models and Evaluation Criteria.mp4 86MB
  24. 14 - Module 14 - Database Security and System Development/001 Information Classification.mp4 83MB
  25. 09 - Module 09 - Network Connections/002 Summary of Topologies.mp4 79MB
  26. 14 - Module 14 - Database Security and System Development/003 Virus.mp4 78MB
  27. 08 - Module 08 - Asymmetric Cryptography and PKI/004 Link versus End-to-End Encryption.mp4 77MB
  28. 04 - Module 04 - Access Control/004 Information Classification.mp4 75MB
  29. 08 - Module 08 - Asymmetric Cryptography and PKI/002 Example of Hybrid Cryptography.mp4 75MB
  30. 16 - Module 16 - Business Continuity/003 Facility Backups - Hot Site.mp4 70MB
  31. 10 - Module 10 - Network Protocols and Devices/003 Repeater.mp4 69MB
  32. 04 - Module 04 - Access Control/003 Threats to Access Control.mp4 65MB
  33. 04 - Module 04 - Access Control/002 Access Control Characteristics.mp4 65MB
  34. 12 - Module 12 - Security Architecture/002 Integrated Security is Designed Security.mp4 63MB
  35. 04 - Module 04 - Access Control/005 Discretionary Access Control Model.mp4 61MB
  36. 09 - Module 09 - Network Connections/001 Information Classification.mp4 61MB
  37. 08 - Module 08 - Asymmetric Cryptography and PKI/001 Asymmetric Cryptography and PKI.mp4 61MB
  38. 01 - Module 01 - Risk Management/002 Risk Management.mp4 61MB
  39. 01 - Module 01 - Risk Management/003 Quantitative Analysis.mp4 61MB
  40. 06 - Module 06 - Operations Security/001 Information Classification.mp4 60MB
  41. 05 - Module 05 - Security Models/003 Non-Interference Model.mp4 60MB
  42. 07 - Module 07 - Symmetric Cryptography and Hashing/001 Symmetric Cryptography and Hashing.mp4 60MB
  43. 03 - Module 03 -Authentication/003 Memory Cards.mp4 59MB
  44. 11 - Module 11 - Telephony, VPNs and Wireless/001 Information Classification.mp4 58MB
  45. 09 - Module 09 - Network Connections/005 WAN Technologies - DSL.mp4 58MB
  46. 09 - Module 09 - Network Connections/003 Transmission Types - Number of Recievers.mp4 57MB
  47. 08 - Module 08 - Asymmetric Cryptography and PKI/003 CA and RA Roles.mp4 57MB
  48. 04 - Module 04 - Access Control/006 Access Control Administration.mp4 57MB
  49. 18 - Module 18 - Incident Management, Law, and Ethics/002 Intellectual Property Law.mp4 57MB
  50. 02 - Module 02 - Security Management/001 Security Management.mp4 57MB
  51. 14 - Module 14 - Database Security and System Development/004 DDoS.mp4 56MB
  52. 10 - Module 10 - Network Protocols and Devices/001 Information Classification.mp4 56MB
  53. 02 - Module 02 - Security Management/003 Roadmap to Maturity.mp4 55MB
  54. 09 - Module 09 - Network Connections/004 Network Topologies.mp4 54MB
  55. 10 - Module 10 - Network Protocols and Devices/004 Firewall Types - Circuit - Level Proxy Firewall.mp4 54MB
  56. 07 - Module 07 - Symmetric Cryptography and Hashing/002 Historical Uses of Symmetric Cryptography Vernam Cipher.mp4 53MB
  57. 18 - Module 18 - Incident Management, Law, and Ethics/004 Privacy of Sensitive Data.mp4 53MB
  58. 10 - Module 10 - Network Protocols and Devices/005 TCPIP Suite.mp4 51MB
  59. 06 - Module 06 - Operations Security/003 Redundant Array of Independent Disk (RAID).mp4 51MB
  60. 08 - Module 08 - Asymmetric Cryptography and PKI/005 IPSec Handshaking Process.mp4 51MB
  61. 02 - Module 02 - Security Management/004 Human Resources Issues.mp4 50MB
  62. 17 - Module 17 - Disaster Recovery/001 Disaster Recovery.mp4 48MB
  63. 17 - Module 17 - Disaster Recovery/003 Return to Normal Operations.mp4 48MB
  64. 13 - Module 13 - Software Development Security/003 Security Issues.mp4 47MB
  65. 13 - Module 13 - Software Development Security/002 Development Methodologies.mp4 45MB
  66. 16 - Module 16 - Business Continuity/002 How to Identify the Most Critical Company Functions.mp4 44MB
  67. 01 - Module 01 - Risk Management/001 Agenda.mp4 43MB
  68. 12 - Module 12 - Security Architecture/004 Attacking Through Applications.mp4 43MB
  69. 12 - Module 12 - Security Architecture/003 System Functionality.mp4 40MB
  70. 11 - Module 11 - Telephony, VPNs and Wireless/002 PBX Vulnerabilities.mp4 39MB
  71. 03 - Module 03 -Authentication/004 Issues Pertaining to Kerberos.mp4 39MB
  72. 03 - Module 03 -Authentication/002 Biometrics Error Types.mp4 35MB
  73. 11 - Module 11 - Telephony, VPNs and Wireless/003 SSLTLS.mp4 28MB
  74. 02 - Module 02 - Security Management/002 Enterprise Security Program.mp4 24MB
  75. 01 - Module 01 - Risk Management/12128224-CISSO-WB01.pdf 289KB
  76. 09 - Module 09 - Network Connections/12128266-CISSO-WB09.pdf 285KB
  77. 02 - Module 02 - Security Management/12128228-CISSO-WB02.pdf 284KB
  78. 05 - Module 05 - Security Models/12128250-CISSO-WB05.pdf 283KB
  79. 03 - Module 03 -Authentication/12128232-CISSO-WB03.pdf 283KB
  80. 19 - Module 19 – Physical/12128322-CISSO-WB19.pdf 282KB
  81. 06 - Module 06 - Operations Security/12128256-CISSO-WB06.pdf 282KB
  82. 15 - Module 15 - Malware and Software Attacks/12128292-CISSO-WB15.pdf 282KB
  83. 18 - Module 18 - Incident Management, Law, and Ethics/12128308-CISSO-WB18.pdf 281KB
  84. 12 - Module 12 - Security Architecture/12128278-CISSO-WB12.pdf 280KB
  85. 04 - Module 04 - Access Control/12128242-CISSO-WB04.pdf 280KB
  86. 10 - Module 10 - Network Protocols and Devices/12128270-CISSO-WB10.pdf 278KB
  87. 07 - Module 07 - Symmetric Cryptography and Hashing/12128258-CISSO-WB07.pdf 277KB
  88. 13 - Module 13 - Software Development Security/19401620-CISSO-WB13.pdf 277KB
  89. 11 - Module 11 - Telephony, VPNs and Wireless/12128274-CISSO-WB11.pdf 222KB
  90. 08 - Module 08 - Asymmetric Cryptography and PKI/19401622-CISSO-WB08.pdf 222KB
  91. 14 - Module 14 - Database Security and System Development/12128288-CISSO-WB14.pdf 221KB
  92. 17 - Module 17 - Disaster Recovery/12128306-CISSO-WB17.pdf 221KB
  93. 16 - Module 16 - Business Continuity/12128298-CISSO-WB16.pdf 221KB
  94. 17 - Module 17 - Disaster Recovery/002 Recovery Plan_en.vtt 23KB
  95. 10 - Module 10 - Network Protocols and Devices/003 Repeater_en.vtt 23KB
  96. 07 - Module 07 - Symmetric Cryptography and Hashing/004 Symmetric Algorithms - DS_en.vtt 22KB
  97. 09 - Module 09 - Network Connections/002 Summary of Topologies_en.vtt 21KB
  98. 09 - Module 09 - Network Connections/001 Information Classification_en.vtt 21KB
  99. 08 - Module 08 - Asymmetric Cryptography and PKI/006 Types of Physical IDS_en.vtt 20KB
  100. 12 - Module 12 - Security Architecture/002 Integrated Security is Designed Security_en.vtt 20KB
  101. 10 - Module 10 - Network Protocols and Devices/002 Transport Layer_en.vtt 20KB
  102. 09 - Module 09 - Network Connections/003 Transmission Types - Number of Recievers_en.vtt 20KB
  103. 14 - Module 14 - Database Security and System Development/002 Artificial Intelligence_en.vtt 20KB
  104. 08 - Module 08 - Asymmetric Cryptography and PKI/004 Link versus End-to-End Encryption_en.vtt 19KB
  105. 03 - Module 03 -Authentication/002 Biometrics Error Types_en.vtt 19KB
  106. 19 - Module 19 – Physical/001 Information Classification_en.vtt 19KB
  107. 04 - Module 04 - Access Control/002 Access Control Characteristics_en.vtt 19KB
  108. 08 - Module 08 - Asymmetric Cryptography and PKI/003 CA and RA Roles_en.vtt 19KB
  109. 07 - Module 07 - Symmetric Cryptography and Hashing/003 Information Classification_en.vtt 19KB
  110. 08 - Module 08 - Asymmetric Cryptography and PKI/001 Asymmetric Cryptography and PKI_en.vtt 19KB
  111. 16 - Module 16 - Business Continuity/001 Information Classification_en.vtt 19KB
  112. 06 - Module 06 - Operations Security/004 Methodology_en.vtt 18KB
  113. 09 - Module 09 - Network Connections/004 Network Topologies_en.vtt 18KB
  114. 15 - Module 15 - Malware and Software Attacks/001 Malware and Attacks_en.vtt 18KB
  115. 06 - Module 06 - Operations Security/001 Information Classification_en.vtt 18KB
  116. 10 - Module 10 - Network Protocols and Devices/004 Firewall Types - Circuit - Level Proxy Firewall_en.vtt 18KB
  117. 14 - Module 14 - Database Security and System Development/001 Information Classification_en.vtt 18KB
  118. 18 - Module 18 - Incident Management, Law, and Ethics/001 Information Classification_en.vtt 18KB
  119. 13 - Module 13 - Software Development Security/001 Information Classification_en.vtt 18KB
  120. 11 - Module 11 - Telephony, VPNs and Wireless/001 Information Classification_en.vtt 18KB
  121. 11 - Module 11 - Telephony, VPNs and Wireless/004 Wireless Network Topologies_en.vtt 18KB
  122. 10 - Module 10 - Network Protocols and Devices/001 Information Classification_en.vtt 18KB
  123. 01 - Module 01 - Risk Management/003 Quantitative Analysis_en.vtt 18KB
  124. 18 - Module 18 - Incident Management, Law, and Ethics/002 Intellectual Property Law_en.vtt 18KB
  125. 01 - Module 01 - Risk Management/001 Agenda_en.vtt 18KB
  126. 05 - Module 05 - Security Models/001 Security Models and Evaluation Criteria_en.vtt 18KB
  127. 18 - Module 18 - Incident Management, Law, and Ethics/003 Countries Working Together_en.vtt 18KB
  128. 13 - Module 13 - Software Development Security/004 Linking Through COM_en.vtt 18KB
  129. 06 - Module 06 - Operations Security/002 Product Implementation Concerns_en.vtt 18KB
  130. 02 - Module 02 - Security Management/001 Security Management_en.vtt 18KB
  131. 08 - Module 08 - Asymmetric Cryptography and PKI/005 IPSec Handshaking Process_en.vtt 17KB
  132. 03 - Module 03 -Authentication/001 Authentication_en.vtt 17KB
  133. 01 - Module 01 - Risk Management/002 Risk Management_en.vtt 17KB
  134. 02 - Module 02 - Security Management/003 Roadmap to Maturity_en.vtt 17KB
  135. 07 - Module 07 - Symmetric Cryptography and Hashing/001 Symmetric Cryptography and Hashing_en.vtt 17KB
  136. 10 - Module 10 - Network Protocols and Devices/005 TCPIP Suite_en.vtt 17KB
  137. 08 - Module 08 - Asymmetric Cryptography and PKI/002 Example of Hybrid Cryptography_en.vtt 17KB
  138. 06 - Module 06 - Operations Security/003 Redundant Array of Independent Disk (RAID)_en.vtt 17KB
  139. 11 - Module 11 - Telephony, VPNs and Wireless/005 WPA and WPA2 Mode Types_en.vtt 16KB
  140. 09 - Module 09 - Network Connections/005 WAN Technologies - DSL_en.vtt 16KB
  141. 12 - Module 12 - Security Architecture/001 Information Classification_en.vtt 16KB
  142. 05 - Module 05 - Security Models/002 What Does It Mean to Be in a Specific Ring_en.vtt 16KB
  143. 17 - Module 17 - Disaster Recovery/001 Disaster Recovery_en.vtt 15KB
  144. 17 - Module 17 - Disaster Recovery/003 Return to Normal Operations_en.vtt 15KB
  145. 07 - Module 07 - Symmetric Cryptography and Hashing/002 Historical Uses of Symmetric Cryptography Vernam Cipher_en.vtt 15KB
  146. 13 - Module 13 - Software Development Security/003 Security Issues_en.vtt 15KB
  147. 04 - Module 04 - Access Control/001 Access Control_en.vtt 14KB
  148. 03 - Module 03 -Authentication/003 Memory Cards_en.vtt 14KB
  149. 12 - Module 12 - Security Architecture/004 Attacking Through Applications_en.vtt 14KB
  150. 13 - Module 13 - Software Development Security/002 Development Methodologies_en.vtt 13KB
  151. 02 - Module 02 - Security Management/002 Enterprise Security Program_en.vtt 13KB
  152. 18 - Module 18 - Incident Management, Law, and Ethics/004 Privacy of Sensitive Data_en.vtt 13KB
  153. 05 - Module 05 - Security Models/003 Non-Interference Model_en.vtt 13KB
  154. 04 - Module 04 - Access Control/005 Discretionary Access Control Model_en.vtt 13KB
  155. 12 - Module 12 - Security Architecture/003 System Functionality_en.vtt 13KB
  156. 04 - Module 04 - Access Control/006 Access Control Administration_en.vtt 13KB
  157. 16 - Module 16 - Business Continuity/002 How to Identify the Most Critical Company Functions_en.vtt 12KB
  158. 11 - Module 11 - Telephony, VPNs and Wireless/002 PBX Vulnerabilities_en.vtt 12KB
  159. 03 - Module 03 -Authentication/004 Issues Pertaining to Kerberos_en.vtt 12KB
  160. 05 - Module 05 - Security Models/004 ITSEC - Good and Bad_en.vtt 11KB
  161. 14 - Module 14 - Database Security and System Development/004 DDoS_en.vtt 11KB
  162. 16 - Module 16 - Business Continuity/003 Facility Backups - Hot Site_en.vtt 11KB
  163. 02 - Module 02 - Security Management/004 Human Resources Issues_en.vtt 10KB
  164. 04 - Module 04 - Access Control/004 Information Classification_en.vtt 10KB
  165. 14 - Module 14 - Database Security and System Development/003 Virus_en.vtt 9KB
  166. 11 - Module 11 - Telephony, VPNs and Wireless/003 SSLTLS_en.vtt 9KB
  167. 04 - Module 04 - Access Control/003 Threats to Access Control_en.vtt 7KB
  168. 0. Websites you may like/[CourseClub.Me].url 122B
  169. 02 - Module 02 - Security Management/[CourseClub.Me].url 122B
  170. 07 - Module 07 - Symmetric Cryptography and Hashing/[CourseClub.Me].url 122B
  171. 11 - Module 11 - Telephony, VPNs and Wireless/[CourseClub.Me].url 122B
  172. 15 - Module 15 - Malware and Software Attacks/[CourseClub.Me].url 122B
  173. 18 - Module 18 - Incident Management, Law, and Ethics/[CourseClub.Me].url 122B
  174. [CourseClub.Me].url 122B
  175. 0. Websites you may like/[GigaCourse.Com].url 49B
  176. 02 - Module 02 - Security Management/[GigaCourse.Com].url 49B
  177. 07 - Module 07 - Symmetric Cryptography and Hashing/[GigaCourse.Com].url 49B
  178. 11 - Module 11 - Telephony, VPNs and Wireless/[GigaCourse.Com].url 49B
  179. 15 - Module 15 - Malware and Software Attacks/[GigaCourse.Com].url 49B
  180. 18 - Module 18 - Incident Management, Law, and Ethics/[GigaCourse.Com].url 49B
  181. [GigaCourse.Com].url 49B