CompTIA Security (SY0-501) Cert Prep_ 3 Architecture and Design 收录时间:2020-02-25 13:04:12 文件大小:532MB 下载次数:44 最近下载:2021-01-03 22:40:42 磁力链接: magnet:?xt=urn:btih:9d719ce2f2e14caf23c00b25fcce047427ce8ad8 立即下载 复制链接 文件列表 02 Security Design/004 Leveraging industry standards.mp4 21MB 08 Software Development Security/001 Development methodologies.mp4 18MB 05 Secure Systems Design/002 Data encryption.mp4 18MB 10 Physical Security/005 Physical access control.mp4 16MB 02 Security Design/002 Frameworks and reference architectures.mp4 15MB 08 Software Development Security/005 Code repositories.mp4 15MB 08 Software Development Security/012 Fuzz testing.mp4 14MB 03 User Training/001 Security education.mp4 13MB 09 Cloud Computing and Virtualization/003 Public cloud tiers.mp4 13MB 07 Embedded System Security/001 Industrial control systems.mp4 13MB 10 Physical Security/003 Data center environmental protection.mp4 13MB 09 Cloud Computing and Virtualization/001 Virtualization.mp4 11MB 03 User Training/003 Compliance training.mp4 11MB 09 Cloud Computing and Virtualization/004 Cloud storage security.mp4 11MB 10 Physical Security/004 Physical security control types.mp4 11MB 09 Cloud Computing and Virtualization/006 Desktop and application virtualization.mp4 11MB 04 Secure Network Design/002 Public and private addressing.mp4 11MB 04 Secure Network Design/005 Security device placement.mp4 11MB 10 Physical Security/002 Data center environmental controls.mp4 11MB 10 Physical Security/007 Hardware physical security.mp4 11MB 08 Software Development Security/006 Third-party code.mp4 10MB 05 Secure Systems Design/001 Operating system types.mp4 10MB 07 Embedded System Security/002 Internet of Things.mp4 9MB 10 Physical Security/001 Site and facility design.mp4 8MB 07 Embedded System Security/005 Embedded systems.mp4 8MB 05 Secure Systems Design/003 Hardware and firmware security.mp4 8MB 07 Embedded System Security/003 Securing smart devices.mp4 8MB 03 User Training/004 User habits.mp4 8MB 01 Introduction/001 Welcome.mp4 8MB 05 Secure Systems Design/004 Peripheral security.mp4 7MB 05 Secure Systems Design/005 IT automation.mp4 7MB 09 Cloud Computing and Virtualization/002 Cloud computing models.mp4 7MB 08 Software Development Security/003 Operation maintenance and change management.mp4 7MB 03 User Training/002 Information classification.mp4 7MB 08 Software Development Security/004 DevOps.mp4 7MB 06 Secure Staging and Deployment/002 Software risk assessment and mitigation.mp4 7MB 02 Security Design/007 Control diversity.mp4 7MB 06 Secure Staging and Deployment/001 Software staging and release.mp4 7MB 02 Security Design/001 Legislative and regulatory compliance.mp4 7MB 04 Secure Network Design/003 Subnetting.mp4 7MB 02 Security Design/006 Defense in depth.mp4 7MB 08 Software Development Security/002 Maturity models.mp4 6MB 02 Security Design/003 Developing security baselines.mp4 6MB 07 Embedded System Security/004 Secure networking for smart devices.mp4 6MB 08 Software Development Security/008 Database security controls.mp4 6MB 08 Software Development Security/007 Code signing.mp4 6MB 08 Software Development Security/011 Code tests.mp4 6MB 08 Software Development Security/013 Code Execution.mp4 6MB 04 Secure Network Design/006 Software-defined networking (SDN).mp4 6MB 08 Software Development Security/009 Software testing.mp4 5MB 03 User Training/006 Measuring security education.mp4 5MB 08 Software Development Security/010 Code reviews.mp4 5MB 03 User Training/005 User-based threats.mp4 5MB 04 Secure Network Design/001 Security zones.mp4 5MB 09 Cloud Computing and Virtualization/005 Security service providers.mp4 5MB 02 Security Design/005 Customizing security standards.mp4 4MB 10 Physical Security/006 Visitor management.mp4 4MB 04 Secure Network Design/007 Port isolation.mp4 4MB 04 Secure Network Design/004 VLANs and network segmentation.mp4 3MB 05 Secure Systems Design/006 Non-persistence.mp4 3MB 06 Secure Staging and Deployment/003 Secure baselines and integrity measurement.mp4 2MB 11 Conclusion/001 Whats next_.mp4 2MB 01 Introduction/002 What you need to know.mp4 936KB 08 Software Development Security/012 Fuzz testing-en.srt 13KB 04 Secure Network Design/005 Security device placement-en.srt 12KB 08 Software Development Security/005 Code repositories-en.srt 12KB 08 Software Development Security/001 Development methodologies-en.srt 12KB 05 Secure Systems Design/002 Data encryption-en.srt 11KB 04 Secure Network Design/002 Public and private addressing-en.srt 11KB 02 Security Design/002 Frameworks and reference architectures-en.srt 11KB 09 Cloud Computing and Virtualization/004 Cloud storage security-en.srt 11KB 09 Cloud Computing and Virtualization/003 Public cloud tiers-en.srt 10KB 09 Cloud Computing and Virtualization/006 Desktop and application virtualization-en.srt 10KB 10 Physical Security/003 Data center environmental protection-en.srt 9KB 07 Embedded System Security/001 Industrial control systems-en.srt 9KB 02 Security Design/004 Leveraging industry standards-en.srt 9KB 09 Cloud Computing and Virtualization/001 Virtualization-en.srt 9KB 03 User Training/001 Security education-en.srt 9KB 06 Secure Staging and Deployment/001 Software staging and release-en.srt 9KB 05 Secure Systems Design/003 Hardware and firmware security-en.srt 8KB 08 Software Development Security/006 Third-party code-en.srt 8KB 10 Physical Security/005 Physical access control-en.srt 8KB 10 Physical Security/007 Hardware physical security-en.srt 8KB 02 Security Design/001 Legislative and regulatory compliance-en.srt 8KB 02 Security Design/003 Developing security baselines-en.srt 8KB 08 Software Development Security/004 DevOps-en.srt 8KB 02 Security Design/007 Control diversity-en.srt 7KB 10 Physical Security/002 Data center environmental controls-en.srt 7KB 05 Secure Systems Design/001 Operating system types-en.srt 7KB 08 Software Development Security/008 Database security controls-en.srt 7KB 09 Cloud Computing and Virtualization/002 Cloud computing models-en.srt 7KB 04 Secure Network Design/006 Software-defined networking (SDN)-en.srt 7KB 07 Embedded System Security/002 Internet of Things-en.srt 6KB 10 Physical Security/004 Physical security control types-en.srt 6KB 05 Secure Systems Design/005 IT automation-en.srt 6KB 08 Software Development Security/002 Maturity models-en.srt 6KB 06 Secure Staging and Deployment/002 Software risk assessment and mitigation-en.srt 6KB 02 Security Design/006 Defense in depth-en.srt 6KB 05 Secure Systems Design/004 Peripheral security-en.srt 6KB 04 Secure Network Design/003 Subnetting-en.srt 6KB 03 User Training/003 Compliance training-en.srt 6KB 08 Software Development Security/013 Code Execution-en.srt 6KB 04 Secure Network Design/001 Security zones-en.srt 6KB 07 Embedded System Security/003 Securing smart devices-en.srt 6KB 08 Software Development Security/009 Software testing-en.srt 6KB 07 Embedded System Security/005 Embedded systems-en.srt 6KB 08 Software Development Security/003 Operation maintenance and change management-en.srt 6KB 08 Software Development Security/007 Code signing-en.srt 5KB 10 Physical Security/001 Site and facility design-en.srt 5KB 03 User Training/002 Information classification-en.srt 5KB 08 Software Development Security/010 Code reviews-en.srt 5KB 02 Security Design/005 Customizing security standards-en.srt 5KB 07 Embedded System Security/004 Secure networking for smart devices-en.srt 5KB 03 User Training/004 User habits-en.srt 5KB 09 Cloud Computing and Virtualization/005 Security service providers-en.srt 5KB 08 Software Development Security/011 Code tests-en.srt 5KB 04 Secure Network Design/004 VLANs and network segmentation-en.srt 4KB 03 User Training/006 Measuring security education-en.srt 4KB 05 Secure Systems Design/006 Non-persistence-en.srt 3KB 03 User Training/005 User-based threats-en.srt 3KB 06 Secure Staging and Deployment/003 Secure baselines and integrity measurement-en.srt 3KB 04 Secure Network Design/007 Port isolation-en.srt 3KB 01 Introduction/001 Welcome-en.srt 3KB 10 Physical Security/006 Visitor management-en.srt 3KB 11 Conclusion/001 Whats next_-en.srt 1KB 01 Introduction/002 What you need to know-en.srt 1KB