589689.xyz

[ITProTV] CompTIA CASP+ (CAS-004)

  • 收录时间:2023-08-18 09:40:11
  • 文件大小:9GB
  • 下载次数:1
  • 最近下载:2023-08-18 09:40:11
  • 磁力链接:

文件列表

  1. 4 - Governance, Risk, and Compliance/4 - 1 - Risk Assessment.mp4 194MB
  2. 3 - Security Engineering and Cryptography/3 - 7 - Trustworthy Computing.mp4 183MB
  3. 3 - Security Engineering and Cryptography/3 - 13 - Cloud Technology - Basics.mp4 180MB
  4. 3 - Security Engineering and Cryptography/3 - 18 - Asymmetric Algorithms & Protocols.mp4 180MB
  5. 3 - Security Engineering and Cryptography/3 - 17 - Hashing & Symmetric Algorithms.mp4 177MB
  6. 3 - Security Engineering and Cryptography/3 - 5 - Processes.mp4 174MB
  7. 3 - Security Engineering and Cryptography/3 - 11 - Security Considerations - Protocols.mp4 173MB
  8. 3 - Security Engineering and Cryptography/3 - 14 - Cloud Technology - Advanced.mp4 168MB
  9. 3 - Security Engineering and Cryptography/3 - 10 - Security Considerations - ICS-SCADA.mp4 166MB
  10. 3 - Security Engineering and Cryptography/3 - 15 - PKI - Basics.mp4 165MB
  11. 3 - Security Engineering and Cryptography/3 - 16 - PKI - Advanced.mp4 162MB
  12. 3 - Security Engineering and Cryptography/3 - 1 - Managed Configurations.mp4 157MB
  13. 3 - Security Engineering and Cryptography/3 - 3 - Security Considerations.mp4 156MB
  14. 4 - Governance, Risk, and Compliance/4 - 5 - Risk Tracking.mp4 155MB
  15. 2 - Security Operations/2 - 12 - Analysis Tools.mp4 152MB
  16. 2 - Security Operations/2 - 2 - Indicators of Compromise & Response.mp4 148MB
  17. 2 - Security Operations/2 - 11 - File Carving & Binary Analysis.mp4 147MB
  18. 1 - Security Architecture/1 - 18 - Impact of Emerging Technologies.mp4 147MB
  19. 2 - Security Operations/2 - 4 - Vulnerability Assessment - Methods & Tools.mp4 146MB
  20. 2 - Security Operations/2 - 7 - Analyze Vulnerabilities - Attacks.mp4 146MB
  21. 3 - Security Engineering and Cryptography/3 - 4 - Hardening Techniques.mp4 146MB
  22. 2 - Security Operations/2 - 5 - Analyze Vulnerabilities - Vulnerabilities.mp4 145MB
  23. 4 - Governance, Risk, and Compliance/4 - 11 - Regulations Accreditations & Standards.mp4 144MB
  24. 4 - Governance, Risk, and Compliance/4 - 10 - Data Considerations.mp4 140MB
  25. 4 - Governance, Risk, and Compliance/4 - 2 - Risk Handling Techniques.mp4 139MB
  26. 4 - Governance, Risk, and Compliance/4 - 18 - Testing Plans.mp4 138MB
  27. 2 - Security Operations/2 - 8 - Use Processes to Reduce Risk.mp4 136MB
  28. 1 - Security Architecture/1 - 4 - Services & Segmentation - Scenarios.mp4 136MB
  29. 1 - Security Architecture/1 - 2 - Services - Discussion.mp4 134MB
  30. 1 - Security Architecture/1 - 13 - Securing Enterprise Architecture.mp4 134MB
  31. 2 - Security Operations/2 - 13 - Live Collection Tools.mp4 133MB
  32. 1 - Security Architecture/1 - 8 - Infrastructure Design - Discussion.mp4 133MB
  33. 2 - Security Operations/2 - 1 - Perform Threat Management.mp4 132MB
  34. 2 - Security Operations/2 - 6 - Analyze Vulnerabilities - Vulnerable Systems.mp4 132MB
  35. 3 - Security Engineering and Cryptography/3 - 9 - Security Considerations - Embedded.mp4 128MB
  36. 2 - Security Operations/2 - 9 - Triage & Incident Response.mp4 128MB
  37. 4 - Governance, Risk, and Compliance/4 - 3 - Risk Types.mp4 127MB
  38. 1 - Security Architecture/1 - 10 - Baselines & Templates & Software Assurance.mp4 127MB
  39. 3 - Security Engineering and Cryptography/3 - 21 - Troubleshoot Cryptography - Misconfigurations.mp4 127MB
  40. 4 - Governance, Risk, and Compliance/4 - 6 - Policies and Security Practices.mp4 126MB
  41. 1 - Security Architecture/1 - 14 - Authentication & Authorization - Discussion.mp4 126MB
  42. 1 - Security Architecture/1 - 12 - Security in the Development Lifecycle.mp4 126MB
  43. 1 - Security Architecture/1 - 17 - Cryptography & PKI.mp4 126MB
  44. 2 - Security Operations/2 - 3 - Vulnerability Management Activities.mp4 125MB
  45. 1 - Security Architecture/1 - 16 - Secure Cloud & Virtualization.mp4 125MB
  46. 4 - Governance, Risk, and Compliance/4 - 4 - Risk Management Life Cycle.mp4 125MB
  47. 3 - Security Engineering and Cryptography/3 - 6 - Mandatory Access Control.mp4 122MB
  48. 4 - Governance, Risk, and Compliance/4 - 8 - Performing Vendor Assessments.mp4 122MB
  49. 4 - Governance, Risk, and Compliance/4 - 14 - Business Impact Analysis (BIA).mp4 117MB
  50. 2 - Security Operations/2 - 10 - Forensic Concepts.mp4 114MB
  51. 1 - Security Architecture/1 - 6 - Merging of Networks.mp4 113MB
  52. 1 - Security Architecture/1 - 9 - Infrastructure Design - Scenarios.mp4 112MB
  53. 1 - Security Architecture/1 - 3 - Segmentation - Discussion.mp4 112MB
  54. 1 - Security Architecture/1 - 5 - Deperimeterization_Zero Trust.mp4 111MB
  55. 1 - Security Architecture/1 - 15 - Authentication & Authorization - Scenarios.mp4 105MB
  56. 4 - Governance, Risk, and Compliance/4 - 9 - Technical Considerations.mp4 103MB
  57. 1 - Security Architecture/1 - 7 - Software-defined Networking (SDN).mp4 101MB
  58. 4 - Governance, Risk, and Compliance/4 - 12 - Legal Considerations.mp4 89MB
  59. 4 - Governance, Risk, and Compliance/4 - 17 - Incident Response Plan.mp4 88MB
  60. 3 - Security Engineering and Cryptography/3 - 19 - Troubleshoot Cryptography - Keys.mp4 87MB
  61. 4 - Governance, Risk, and Compliance/4 - 19 - Governance, Risk & Compliance - Key Points.mp4 82MB
  62. 4 - Governance, Risk, and Compliance/4 - 16 - Disaster Recovery & Business Continuity Planning.mp4 78MB
  63. 2 - Security Operations/2 - 14 - Security Operations - Key Points.mp4 78MB
  64. 4 - Governance, Risk, and Compliance/4 - 7 - Shared Responsibility Model - Cloud.mp4 78MB
  65. 3 - Security Engineering and Cryptography/3 - 2 - Deployment Scenarios.mp4 75MB
  66. 4 - Governance, Risk, and Compliance/4 - 13 - Contract and Agreement Types.mp4 74MB
  67. 1 - Security Architecture/1 - 19 - Security Architecture - Key Points.mp4 73MB
  68. 3 - Security Engineering and Cryptography/3 - 20 - Security Engineering & Cryptography - Key Points.mp4 63MB
  69. 3 - Security Engineering and Cryptography/3 - 12 - Security Considerations - Sectors.mp4 60MB
  70. 3 - Security Engineering and Cryptography/3 - 8 - Compensating Controls.mp4 58MB
  71. 1 - Security Architecture/1 - 11 - Integrating Enterprise Applications.mp4 55MB
  72. 4 - Governance, Risk, and Compliance/4 - 15 - Privacy Impact Assessment.mp4 53MB
  73. 1 - Security Architecture/1 - 1 - Overview.mp4 32MB
  74. CASP004 ADISH/Risk Management Life Cycle – 4-1-4.pptx 2MB
  75. CASP004 ADISH/Services & Segmentation Scenarios – 1-1-3.pptx 1MB
  76. CASP004 ADISH/Infrastructure Design Scenarios – 1-2-2.pptx 1MB
  77. CASP004 ADISH/Authentication & Authorization – Scenarios - 1-5-2.pptx 1MB
  78. CASP004 ADISH/PKI - Certificate Authorities.jpg 110KB
  79. CASP004 ADISH/Cloud Shared Responsibility Model.jpg 84KB
  80. CASP004 ADISH/Domain 3 - Crypto Definitions.docx 74KB
  81. CASP004 ADISH/CompTIA-SecurityPlus-Acronyms.pdf 52KB
  82. CASP004 ADISH/CompTIA CASP+ 004 Glossary.txt 47KB
  83. CASP004 ADISH/Risk Register.xlsx 13KB
  84. CASP004 ADISH/IPSEC Primer.txt 12KB
  85. CASP004 ADISH/CompTIA CASP+ Acronym List.txt 11KB