589689.xyz

CISSP® - Identity and Access Management

  • 收录时间:2018-03-31 04:21:09
  • 文件大小:181MB
  • 下载次数:192
  • 最近下载:2021-01-08 03:49:17
  • 磁力链接:

文件列表

  1. 2. Control Physical and Logical Access to Assets/03. Layered Defense.mp4 17MB
  2. 2. Control Physical and Logical Access to Assets/04. Controls.mp4 15MB
  3. 3. Manage Identification and Authentication of People and Devices/07. What You Have.mp4 14MB
  4. 8. Manage the Identity and Access Provisioning Lifecycle/21. Manage the Identity and Access Provisioning Lifecycle.mp4 14MB
  5. 6. Implement and Manage Authorization Mechanisms/15. Implement and Manage Authorization Mechanisms.mp4 13MB
  6. 6. Implement and Manage Authorization Mechanisms/16. Rule Based Access Control.mp4 13MB
  7. 7. Prevent or Mitigate Access Control Attacks/19. Prevent or Mitigate Access Control Attacks.mp4 12MB
  8. 3. Manage Identification and Authentication of People and Devices/11. Credential Management Systems.mp4 11MB
  9. 3. Manage Identification and Authentication of People and Devices/10. Kerberos.mp4 9MB
  10. 2. Control Physical and Logical Access to Assets/02. Control Physical and Logical Access to Assets.mp4 8MB
  11. 3. Manage Identification and Authentication of People and Devices/09. Single Sign On.mp4 8MB
  12. 6. Implement and Manage Authorization Mechanisms/17. Context Dependent Access Control.mp4 8MB
  13. 4. Integrate Identity as a Service/13. Integrate Identity as a Service.mp4 8MB
  14. 3. Manage Identification and Authentication of People and Devices/06. Manage Identification and Authentication of People and Devices.mp4 6MB
  15. 3. Manage Identification and Authentication of People and Devices/08. Authorization.mp4 6MB
  16. 1. Course Overview/01. Course Overview.mp4 6MB
  17. 5. Integrate Third-party Identity Services/14. Integrate Third-party Identity Services.mp4 5MB
  18. 2. Control Physical and Logical Access to Assets/05. Key Points.mp4 3MB
  19. 3. Manage Identification and Authentication of People and Devices/12. Summary.mp4 2MB
  20. cissp-identity-access-management.zip 2MB
  21. 7. Prevent or Mitigate Access Control Attacks/20. Summary.mp4 1MB
  22. 6. Implement and Manage Authorization Mechanisms/18. Summary.mp4 857KB
  23. 8. Manage the Identity and Access Provisioning Lifecycle/22. Summary.mp4 771KB