Pluralsight - CISSP Security Assessment and Testing
- 收录时间:2018-03-02 06:19:19
- 文件大小:185MB
- 下载次数:116
- 最近下载:2021-01-18 01:40:24
- 磁力链接:
-
文件列表
- 03 - Assessment and Testing Strategies - Ensuring Objectives Have Been Met.mp4 11MB
- 26 - Security Control Effectiveness Testing - Enumeration.mp4 11MB
- 28 - Security Control Effectiveness Testing - Security Assessment Techniques.mp4 9MB
- 01 - Course Overview - Course Overview.mp4 9MB
- 11 - Security Control Effectiveness Testing - Vulnerability Assessment.mp4 9MB
- 05 - Assessment and Testing Strategies - Security Assessment Foundations.mp4 9MB
- 08 - Assessment and Testing Strategies - Assessment Types.mp4 7MB
- 21 - Security Control Effectiveness Testing - Destructing and Non-destructive Testing.mp4 6MB
- 46 - Test Result Analysis - Penetration Testing Report Anatomy.mp4 6MB
- 02 - Assessment and Testing Strategies - Course Introduction.mp4 6MB
- 04 - Assessment and Testing Strategies - Resource Constraints.mp4 5MB
- 17 - Security Control Effectiveness Testing - Intro to Penetration Testing.mp4 5MB
- 29 - Security Control Effectiveness Testing - Source Code Review.mp4 4MB
- 27 - Security Control Effectiveness Testing - Identification.mp4 4MB
- 25 - Security Control Effectiveness Testing - Scoping the Test.mp4 4MB
- 13 - Security Control Effectiveness Testing - Identification.mp4 3MB
- 20 - Security Control Effectiveness Testing - Selecting Target Surface.mp4 3MB
- 07 - Assessment and Testing Strategies - Assessment Viewpoints.mp4 3MB
- 33 - Security Process Data Collection - Management Review.mp4 3MB
- 06 - Assessment and Testing Strategies - Security Assessment Program.mp4 3MB
- 35 - Security Process Data Collection - Account Management.mp4 2MB
- 42 - Test Result Analysis - Targeted Reporting.mp4 2MB
- 12 - Security Control Effectiveness Testing - Detection.mp4 2MB
- 34 - Security Process Data Collection - Training and Awareness.mp4 2MB
- 14 - Security Control Effectiveness Testing - Analysis.mp4 2MB
- 19 - Security Control Effectiveness Testing - Test Process Walkthrough.mp4 2MB
- 10 - Security Control Effectiveness Testing - Introduction.mp4 2MB
- 22 - Security Control Effectiveness Testing - Penetration Testing Frameworks.mp4 2MB
- 16 - Security Control Effectiveness Testing - Mitigation.mp4 2MB
- 18 - Security Control Effectiveness Testing - Penetration Testing.mp4 2MB
- cissp-security-assessment-testing.zip 2MB
- 45 - Test Result Analysis - Reporting Challenges.mp4 2MB
- 39 - Test Result Analysis - Introduction.mp4 2MB
- 48 - Third-party Assessment - Introduction.mp4 2MB
- 58 - Information Security Continuous Monitoring - Defining Your ISCM Program Strategy.mp4 2MB
- 31 - Security Process Data Collection - Introduction.mp4 2MB
- 32 - Security Process Data Collection - Key Performance Risk Indicators.mp4 2MB
- 49 - Third-party Assessment - Third-party Vendors.mp4 2MB
- 55 - Information Security Continuous Monitoring - Introduction.mp4 2MB
- 36 - Security Process Data Collection - Disaster Recovery and Business Continuity.mp4 2MB
- 53 - Third-party Assessment - Audit Stages.mp4 1MB
- 62 - Information Security Continuous Monitoring - Respond to ISCM Findings.mp4 1MB
- 41 - Test Result Analysis - Vulnerability Assessment Dashboards.mp4 1MB
- 64 - Information Security Continuous Monitoring - Summary.mp4 1MB
- 59 - Information Security Continuous Monitoring - Establishing Your ISCM Program Strategy.mp4 1MB
- 60 - Information Security Continuous Monitoring - Implementing Your ISCM Program Strategy.mp4 1MB
- 38 - Security Process Data Collection - Summary.mp4 1MB
- 50 - Third-party Assessment - Evaluating Guidelines.mp4 1MB
- 52 - Third-party Assessment - SSAE16.mp4 1MB
- 23 - Security Control Effectiveness Testing - CISSP Exam Tip.mp4 1MB
- 61 - Information Security Continuous Monitoring - Analyzing Your ISCM Program Strategy.mp4 1MB
- 30 - Security Control Effectiveness Testing - Summary.mp4 1MB
- 47 - Test Result Analysis - Summary.mp4 1MB
- 09 - Assessment and Testing Strategies - Summary.mp4 1MB
- 37 - Security Process Data Collection - Backup Data Verification.mp4 1MB
- 63 - Information Security Continuous Monitoring - Review Your ISCM Program Strategy.mp4 1MB
- 56 - Information Security Continuous Monitoring - What Is ISCM.mp4 973KB
- 51 - Third-party Assessment - Audit Reports.mp4 946KB
- 54 - Third-party Assessment - Summary.mp4 937KB
- 43 - Test Result Analysis - Data Analysis.mp4 921KB
- 24 - Security Control Effectiveness Testing - Penetration Testing Process.mp4 917KB
- 15 - Security Control Effectiveness Testing - Reporting.mp4 858KB
- 57 - Information Security Continuous Monitoring - ISCM Strategy.mp4 798KB
- 40 - Test Result Analysis - Vulnerability Assessment.mp4 419KB
- 44 - Test Result Analysis - Penetration Testing Reports.mp4 393KB