[ITProTV] CompTIA CASP+ (CAS-004)
- 收录时间:2023-08-18 09:40:11
- 文件大小:9GB
- 下载次数:1
- 最近下载:2023-08-18 09:40:11
- 磁力链接:
-
文件列表
- 4 - Governance, Risk, and Compliance/4 - 1 - Risk Assessment.mp4 194MB
- 3 - Security Engineering and Cryptography/3 - 7 - Trustworthy Computing.mp4 183MB
- 3 - Security Engineering and Cryptography/3 - 13 - Cloud Technology - Basics.mp4 180MB
- 3 - Security Engineering and Cryptography/3 - 18 - Asymmetric Algorithms & Protocols.mp4 180MB
- 3 - Security Engineering and Cryptography/3 - 17 - Hashing & Symmetric Algorithms.mp4 177MB
- 3 - Security Engineering and Cryptography/3 - 5 - Processes.mp4 174MB
- 3 - Security Engineering and Cryptography/3 - 11 - Security Considerations - Protocols.mp4 173MB
- 3 - Security Engineering and Cryptography/3 - 14 - Cloud Technology - Advanced.mp4 168MB
- 3 - Security Engineering and Cryptography/3 - 10 - Security Considerations - ICS-SCADA.mp4 166MB
- 3 - Security Engineering and Cryptography/3 - 15 - PKI - Basics.mp4 165MB
- 3 - Security Engineering and Cryptography/3 - 16 - PKI - Advanced.mp4 162MB
- 3 - Security Engineering and Cryptography/3 - 1 - Managed Configurations.mp4 157MB
- 3 - Security Engineering and Cryptography/3 - 3 - Security Considerations.mp4 156MB
- 4 - Governance, Risk, and Compliance/4 - 5 - Risk Tracking.mp4 155MB
- 2 - Security Operations/2 - 12 - Analysis Tools.mp4 152MB
- 2 - Security Operations/2 - 2 - Indicators of Compromise & Response.mp4 148MB
- 2 - Security Operations/2 - 11 - File Carving & Binary Analysis.mp4 147MB
- 1 - Security Architecture/1 - 18 - Impact of Emerging Technologies.mp4 147MB
- 2 - Security Operations/2 - 4 - Vulnerability Assessment - Methods & Tools.mp4 146MB
- 2 - Security Operations/2 - 7 - Analyze Vulnerabilities - Attacks.mp4 146MB
- 3 - Security Engineering and Cryptography/3 - 4 - Hardening Techniques.mp4 146MB
- 2 - Security Operations/2 - 5 - Analyze Vulnerabilities - Vulnerabilities.mp4 145MB
- 4 - Governance, Risk, and Compliance/4 - 11 - Regulations Accreditations & Standards.mp4 144MB
- 4 - Governance, Risk, and Compliance/4 - 10 - Data Considerations.mp4 140MB
- 4 - Governance, Risk, and Compliance/4 - 2 - Risk Handling Techniques.mp4 139MB
- 4 - Governance, Risk, and Compliance/4 - 18 - Testing Plans.mp4 138MB
- 2 - Security Operations/2 - 8 - Use Processes to Reduce Risk.mp4 136MB
- 1 - Security Architecture/1 - 4 - Services & Segmentation - Scenarios.mp4 136MB
- 1 - Security Architecture/1 - 2 - Services - Discussion.mp4 134MB
- 1 - Security Architecture/1 - 13 - Securing Enterprise Architecture.mp4 134MB
- 2 - Security Operations/2 - 13 - Live Collection Tools.mp4 133MB
- 1 - Security Architecture/1 - 8 - Infrastructure Design - Discussion.mp4 133MB
- 2 - Security Operations/2 - 1 - Perform Threat Management.mp4 132MB
- 2 - Security Operations/2 - 6 - Analyze Vulnerabilities - Vulnerable Systems.mp4 132MB
- 3 - Security Engineering and Cryptography/3 - 9 - Security Considerations - Embedded.mp4 128MB
- 2 - Security Operations/2 - 9 - Triage & Incident Response.mp4 128MB
- 4 - Governance, Risk, and Compliance/4 - 3 - Risk Types.mp4 127MB
- 1 - Security Architecture/1 - 10 - Baselines & Templates & Software Assurance.mp4 127MB
- 3 - Security Engineering and Cryptography/3 - 21 - Troubleshoot Cryptography - Misconfigurations.mp4 127MB
- 4 - Governance, Risk, and Compliance/4 - 6 - Policies and Security Practices.mp4 126MB
- 1 - Security Architecture/1 - 14 - Authentication & Authorization - Discussion.mp4 126MB
- 1 - Security Architecture/1 - 12 - Security in the Development Lifecycle.mp4 126MB
- 1 - Security Architecture/1 - 17 - Cryptography & PKI.mp4 126MB
- 2 - Security Operations/2 - 3 - Vulnerability Management Activities.mp4 125MB
- 1 - Security Architecture/1 - 16 - Secure Cloud & Virtualization.mp4 125MB
- 4 - Governance, Risk, and Compliance/4 - 4 - Risk Management Life Cycle.mp4 125MB
- 3 - Security Engineering and Cryptography/3 - 6 - Mandatory Access Control.mp4 122MB
- 4 - Governance, Risk, and Compliance/4 - 8 - Performing Vendor Assessments.mp4 122MB
- 4 - Governance, Risk, and Compliance/4 - 14 - Business Impact Analysis (BIA).mp4 117MB
- 2 - Security Operations/2 - 10 - Forensic Concepts.mp4 114MB
- 1 - Security Architecture/1 - 6 - Merging of Networks.mp4 113MB
- 1 - Security Architecture/1 - 9 - Infrastructure Design - Scenarios.mp4 112MB
- 1 - Security Architecture/1 - 3 - Segmentation - Discussion.mp4 112MB
- 1 - Security Architecture/1 - 5 - Deperimeterization_Zero Trust.mp4 111MB
- 1 - Security Architecture/1 - 15 - Authentication & Authorization - Scenarios.mp4 105MB
- 4 - Governance, Risk, and Compliance/4 - 9 - Technical Considerations.mp4 103MB
- 1 - Security Architecture/1 - 7 - Software-defined Networking (SDN).mp4 101MB
- 4 - Governance, Risk, and Compliance/4 - 12 - Legal Considerations.mp4 89MB
- 4 - Governance, Risk, and Compliance/4 - 17 - Incident Response Plan.mp4 88MB
- 3 - Security Engineering and Cryptography/3 - 19 - Troubleshoot Cryptography - Keys.mp4 87MB
- 4 - Governance, Risk, and Compliance/4 - 19 - Governance, Risk & Compliance - Key Points.mp4 82MB
- 4 - Governance, Risk, and Compliance/4 - 16 - Disaster Recovery & Business Continuity Planning.mp4 78MB
- 2 - Security Operations/2 - 14 - Security Operations - Key Points.mp4 78MB
- 4 - Governance, Risk, and Compliance/4 - 7 - Shared Responsibility Model - Cloud.mp4 78MB
- 3 - Security Engineering and Cryptography/3 - 2 - Deployment Scenarios.mp4 75MB
- 4 - Governance, Risk, and Compliance/4 - 13 - Contract and Agreement Types.mp4 74MB
- 1 - Security Architecture/1 - 19 - Security Architecture - Key Points.mp4 73MB
- 3 - Security Engineering and Cryptography/3 - 20 - Security Engineering & Cryptography - Key Points.mp4 63MB
- 3 - Security Engineering and Cryptography/3 - 12 - Security Considerations - Sectors.mp4 60MB
- 3 - Security Engineering and Cryptography/3 - 8 - Compensating Controls.mp4 58MB
- 1 - Security Architecture/1 - 11 - Integrating Enterprise Applications.mp4 55MB
- 4 - Governance, Risk, and Compliance/4 - 15 - Privacy Impact Assessment.mp4 53MB
- 1 - Security Architecture/1 - 1 - Overview.mp4 32MB
- CASP004 ADISH/Risk Management Life Cycle – 4-1-4.pptx 2MB
- CASP004 ADISH/Services & Segmentation Scenarios – 1-1-3.pptx 1MB
- CASP004 ADISH/Infrastructure Design Scenarios – 1-2-2.pptx 1MB
- CASP004 ADISH/Authentication & Authorization – Scenarios - 1-5-2.pptx 1MB
- CASP004 ADISH/PKI - Certificate Authorities.jpg 110KB
- CASP004 ADISH/Cloud Shared Responsibility Model.jpg 84KB
- CASP004 ADISH/Domain 3 - Crypto Definitions.docx 74KB
- CASP004 ADISH/CompTIA-SecurityPlus-Acronyms.pdf 52KB
- CASP004 ADISH/CompTIA CASP+ 004 Glossary.txt 47KB
- CASP004 ADISH/Risk Register.xlsx 13KB
- CASP004 ADISH/IPSEC Primer.txt 12KB
- CASP004 ADISH/CompTIA CASP+ Acronym List.txt 11KB