589689.xyz

LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL

  • 收录时间:2018-12-19 20:22:47
  • 文件大小:287MB
  • 下载次数:4
  • 最近下载:2020-12-20 19:31:29
  • 磁力链接:

文件列表

  1. 04. Security Architecture/04_04-Managing user access and identity.mp4 20MB
  2. 04. Security Architecture/04_05-Implementing preventative security.mp4 18MB
  3. 04. Security Architecture/04_06-Monitoring and alerts.mp4 15MB
  4. 04. Security Architecture/04_01-Describing security requirements.mp4 14MB
  5. 02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 14MB
  6. 02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 14MB
  7. 05. Incident Management/05_02-Preparing for an incident.mp4 14MB
  8. 04. Security Architecture/04_02-Architecting security risk.mp4 13MB
  9. 03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 13MB
  10. 02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 13MB
  11. 02. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12MB
  12. 03. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11MB
  13. 05. Incident Management/05_03-Responding to an incident.mp4 11MB
  14. 02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 10MB
  15. 03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9MB
  16. 03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9MB
  17. 03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9MB
  18. 02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 9MB
  19. 03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 9MB
  20. 04. Security Architecture/04_03-Selecting security controls.mp4 8MB
  21. 05. Incident Management/05_01-Managing incident response.mp4 8MB
  22. 03. Cybersecurity Threats/03_08-Exploring ransomware.mp4 8MB
  23. 02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 8MB
  24. 03. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 8MB
  25. 01. Introduction/01_01-Welcome.mp4 6MB
  26. 06. Conclusion/06_01-Next steps.mp4 3MB
  27. 01. Introduction/01_02-What you should know.mp4 2MB