Enterprise Security Policies, Practices, and Procedures
- 收录时间:2018-03-13 10:28:16
- 文件大小:246MB
- 下载次数:113
- 最近下载:2021-01-18 08:52:28
- 磁力链接:
-
文件列表
- 02. Security Data Analytics What's Going On/06. Historical Analysis.mp4 17MB
- 03. Defense in Depth This Is Where It Begins/02. What Is Defense in Depth.mp4 17MB
- 02. Security Data Analytics What's Going On/03. Teaching an Old Dog New Tricks.mp4 15MB
- 04. Defense in Depth What Tools Can You Use/03. IPSHIPS.mp4 13MB
- 04. Defense in Depth What Tools Can You Use/08. A New Hope.mp4 13MB
- 04. Defense in Depth What Tools Can You Use/06. EMET.mp4 12MB
- 06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/03. Policies.mp4 12MB
- 02. Security Data Analytics What's Going On/01. Series Introductionoverview.mp4 11MB
- 05. Defense in Depth Drill, Test, Rinse, Repeat/03. Rules Are Rules.mp4 10MB
- 04. Defense in Depth What Tools Can You Use/02. Let's Break It Down!.mp4 10MB
- 02. Security Data Analytics What's Going On/04. Trend Analysis.mp4 9MB
- enterprise-security-policies-practices-procedures.zip 8MB
- 04. Defense in Depth What Tools Can You Use/07. Web Proxies & WAFs.mp4 8MB
- 05. Defense in Depth Drill, Test, Rinse, Repeat/06. Risk Evaluation.mp4 7MB
- 06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/05. Procedures.mp4 7MB
- 06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/02. Frameworks.mp4 7MB
- 06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/04. Controls.mp4 7MB
- 05. Defense in Depth Drill, Test, Rinse, Repeat/02. Why Penetration Tests.mp4 7MB
- 06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/06. Quality Controls & Verification.mp4 6MB
- 05. Defense in Depth Drill, Test, Rinse, Repeat/05. Teams Involved.mp4 5MB
- 02. Security Data Analytics What's Going On/05. Data Aggregation and Correlation.mp4 5MB
- 04. Defense in Depth What Tools Can You Use/04. Firewalls Softwarehardware.mp4 4MB
- 05. Defense in Depth Drill, Test, Rinse, Repeat/04. Reverse Engineering.mp4 4MB
- 01. Course Overview/01. Course Overview.mp4 4MB
- 03. Defense in Depth This Is Where It Begins/06. Level 4 The Network.mp4 4MB
- 03. Defense in Depth This Is Where It Begins/04. Level 2 Processes.mp4 4MB
- 03. Defense in Depth This Is Where It Begins/05. Level 3 Technologies.mp4 3MB
- 04. Defense in Depth What Tools Can You Use/09. Summary.mp4 2MB
- 03. Defense in Depth This Is Where It Begins/07. Summary.mp4 2MB
- 04. Defense in Depth What Tools Can You Use/01. Introduction and Overview.mp4 2MB
- 05. Defense in Depth Drill, Test, Rinse, Repeat/07. Summary.mp4 2MB
- 04. Defense in Depth What Tools Can You Use/05. Anti-virusanti-malware.mp4 2MB
- 02. Security Data Analytics What's Going On/07. Summary.mp4 2MB
- 06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/07. Module & Course Summary.mp4 1MB
- 02. Security Data Analytics What's Going On/02. Module Overview.mp4 1MB
- 03. Defense in Depth This Is Where It Begins/01 Introduction and Overview.mp4 1MB
- 05. Defense in Depth Drill, Test, Rinse, Repeat/01. Introduction and Overview.mp4 1MB
- 06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/01. Introduction and Overview.mp4 1MB
- Torrent Downloaded From Katcr.co - Kickasstorrents.txt 52B