589689.xyz

Pluralsight - CISSP Security Assessment and Testing

  • 收录时间:2018-03-02 06:19:19
  • 文件大小:185MB
  • 下载次数:116
  • 最近下载:2021-01-18 01:40:24
  • 磁力链接:

文件列表

  1. 03 - Assessment and Testing Strategies - Ensuring Objectives Have Been Met.mp4 11MB
  2. 26 - Security Control Effectiveness Testing - Enumeration.mp4 11MB
  3. 28 - Security Control Effectiveness Testing - Security Assessment Techniques.mp4 9MB
  4. 01 - Course Overview - Course Overview.mp4 9MB
  5. 11 - Security Control Effectiveness Testing - Vulnerability Assessment.mp4 9MB
  6. 05 - Assessment and Testing Strategies - Security Assessment Foundations.mp4 9MB
  7. 08 - Assessment and Testing Strategies - Assessment Types.mp4 7MB
  8. 21 - Security Control Effectiveness Testing - Destructing and Non-destructive Testing.mp4 6MB
  9. 46 - Test Result Analysis - Penetration Testing Report Anatomy.mp4 6MB
  10. 02 - Assessment and Testing Strategies - Course Introduction.mp4 6MB
  11. 04 - Assessment and Testing Strategies - Resource Constraints.mp4 5MB
  12. 17 - Security Control Effectiveness Testing - Intro to Penetration Testing.mp4 5MB
  13. 29 - Security Control Effectiveness Testing - Source Code Review.mp4 4MB
  14. 27 - Security Control Effectiveness Testing - Identification.mp4 4MB
  15. 25 - Security Control Effectiveness Testing - Scoping the Test.mp4 4MB
  16. 13 - Security Control Effectiveness Testing - Identification.mp4 3MB
  17. 20 - Security Control Effectiveness Testing - Selecting Target Surface.mp4 3MB
  18. 07 - Assessment and Testing Strategies - Assessment Viewpoints.mp4 3MB
  19. 33 - Security Process Data Collection - Management Review.mp4 3MB
  20. 06 - Assessment and Testing Strategies - Security Assessment Program.mp4 3MB
  21. 35 - Security Process Data Collection - Account Management.mp4 2MB
  22. 42 - Test Result Analysis - Targeted Reporting.mp4 2MB
  23. 12 - Security Control Effectiveness Testing - Detection.mp4 2MB
  24. 34 - Security Process Data Collection - Training and Awareness.mp4 2MB
  25. 14 - Security Control Effectiveness Testing - Analysis.mp4 2MB
  26. 19 - Security Control Effectiveness Testing - Test Process Walkthrough.mp4 2MB
  27. 10 - Security Control Effectiveness Testing - Introduction.mp4 2MB
  28. 22 - Security Control Effectiveness Testing - Penetration Testing Frameworks.mp4 2MB
  29. 16 - Security Control Effectiveness Testing - Mitigation.mp4 2MB
  30. 18 - Security Control Effectiveness Testing - Penetration Testing.mp4 2MB
  31. cissp-security-assessment-testing.zip 2MB
  32. 45 - Test Result Analysis - Reporting Challenges.mp4 2MB
  33. 39 - Test Result Analysis - Introduction.mp4 2MB
  34. 48 - Third-party Assessment - Introduction.mp4 2MB
  35. 58 - Information Security Continuous Monitoring - Defining Your ISCM Program Strategy.mp4 2MB
  36. 31 - Security Process Data Collection - Introduction.mp4 2MB
  37. 32 - Security Process Data Collection - Key Performance Risk Indicators.mp4 2MB
  38. 49 - Third-party Assessment - Third-party Vendors.mp4 2MB
  39. 55 - Information Security Continuous Monitoring - Introduction.mp4 2MB
  40. 36 - Security Process Data Collection - Disaster Recovery and Business Continuity.mp4 2MB
  41. 53 - Third-party Assessment - Audit Stages.mp4 1MB
  42. 62 - Information Security Continuous Monitoring - Respond to ISCM Findings.mp4 1MB
  43. 41 - Test Result Analysis - Vulnerability Assessment Dashboards.mp4 1MB
  44. 64 - Information Security Continuous Monitoring - Summary.mp4 1MB
  45. 59 - Information Security Continuous Monitoring - Establishing Your ISCM Program Strategy.mp4 1MB
  46. 60 - Information Security Continuous Monitoring - Implementing Your ISCM Program Strategy.mp4 1MB
  47. 38 - Security Process Data Collection - Summary.mp4 1MB
  48. 50 - Third-party Assessment - Evaluating Guidelines.mp4 1MB
  49. 52 - Third-party Assessment - SSAE16.mp4 1MB
  50. 23 - Security Control Effectiveness Testing - CISSP Exam Tip.mp4 1MB
  51. 61 - Information Security Continuous Monitoring - Analyzing Your ISCM Program Strategy.mp4 1MB
  52. 30 - Security Control Effectiveness Testing - Summary.mp4 1MB
  53. 47 - Test Result Analysis - Summary.mp4 1MB
  54. 09 - Assessment and Testing Strategies - Summary.mp4 1MB
  55. 37 - Security Process Data Collection - Backup Data Verification.mp4 1MB
  56. 63 - Information Security Continuous Monitoring - Review Your ISCM Program Strategy.mp4 1MB
  57. 56 - Information Security Continuous Monitoring - What Is ISCM.mp4 973KB
  58. 51 - Third-party Assessment - Audit Reports.mp4 946KB
  59. 54 - Third-party Assessment - Summary.mp4 937KB
  60. 43 - Test Result Analysis - Data Analysis.mp4 921KB
  61. 24 - Security Control Effectiveness Testing - Penetration Testing Process.mp4 917KB
  62. 15 - Security Control Effectiveness Testing - Reporting.mp4 858KB
  63. 57 - Information Security Continuous Monitoring - ISCM Strategy.mp4 798KB
  64. 40 - Test Result Analysis - Vulnerability Assessment.mp4 419KB
  65. 44 - Test Result Analysis - Penetration Testing Reports.mp4 393KB