zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
ITPRO.TV - CompTIA CASP+ (CAS-004)
magnet:?xt=urn:btih:132d24c41b3c647c5cf4231a8b74503f0439a5e4&dn=ITPRO.TV - CompTIA CASP+ (CAS-004)
磁力链接详情
文件列表详情
132d24c41b3c647c5cf4231a8b74503f0439a5e4
infohash:
73
文件数量
19.93 GB
文件大小
2025-10-5 05:29
创建日期
2025-10-9 12:50
最后访问
相关分词
ITPRO
TV
-
CompTIA
CASP
CAS-004
01. Overview.mp4 74.63 MB
02. Services - Discussion.mp4 291.03 MB
03. Segmentation - Discussion.mp4 254.87 MB
04. Services & Segmentation - Scenarios.mp4 303.23 MB
05. DeperimeterizationZero Trust.mp4 261.69 MB
06. Merging of Networks.mp4 251.66 MB
07. Software-defined Networking (SDN).mp4 222.92 MB
08. Infrastructure Design - Discussion.mp4 290.12 MB
09. Infrastructure Design - Scenarios.mp4 252.35 MB
10. Baselines & Templates & Software Assurance.mp4 281.69 MB
11. Integrating Enterprise Applications.mp4 123.6 MB
12. Security in the Development Lifecycle.mp4 275.78 MB
13. Securing Enterprise Architecture.mp4 295.66 MB
14. Authentication & Authorization - Discussion.mp4 274.17 MB
15. Authentication & Authorization - Scenarios.mp4 232.25 MB
16. Secure Cloud & Virtualization.mp4 272.33 MB
17. Cryptography & PKI.mp4 270.62 MB
18. Impact of Emerging Technologies.mp4 317.74 MB
19. Security Architecture - Key Points.mp4 161.82 MB
20. Perform Threat Management.mp4 288.52 MB
21. Indicators of Compromise & Response.mp4 325.51 MB
22. Vulnerability Management Activities.mp4 277.97 MB
23. Vulnerability Assessment - Methods & Tools.mp4 320.23 MB
24. Analyze Vulnerabilities - Vulnerabilities.mp4 317.65 MB
25. Analyze Vulnerabilities - Vulnerable Systems.mp4 288.18 MB
26. Analyze Vulnerabilities - Attacks.mp4 316.21 MB
27. Use Processes to Reduce Risk.mp4 304.51 MB
28. Triage & Incident Response.mp4 285.39 MB
29. Forensic Concepts.mp4 253.8 MB
30. File Carving & Binary Analysis.mp4 322.47 MB
31. Analysis Tools.mp4 335.4 MB
32. Live Collection Tools.mp4 296.29 MB
33. Security Operations - Key Points.mp4 171.79 MB
34. Managed Configurations.mp4 379.72 MB
35. Deployment Scenarios.mp4 180.24 MB
36. Security Considerations.mp4 356.73 MB
37. Hardening Techniques.mp4 336.87 MB
38. Processes.mp4 431.52 MB
39. Mandatory Access Control.mp4 286.54 MB
40. Trustworthy Computing.mp4 416.82 MB
41. Compensating Controls.mp4 136.84 MB
42. Security Considerations - Embedded.mp4 309.87 MB
43. Security Considerations - ICS-SCADA.mp4 380.37 MB
44. Security Considerations - Protocols.mp4 369.45 MB
45. Security Considerations - Sectors.mp4 134.4 MB
46. Cloud Technology - Basics.mp4 431.4 MB
47. Cloud Technology - Advanced.mp4 388.48 MB
48. PKI - Basics.mp4 427.75 MB
49. PKI - Advanced.mp4 361.3 MB
50. Hashing & Symmetric Algorithms.mp4 416.76 MB
51. Asymmetric Algorithms & Protocols.mp4 418.05 MB
52. Troubleshoot Cryptography - Keys.mp4 196.78 MB
53. Security Engineering & Cryptography - Key Points.mp4 140.16 MB
54. Troubleshoot Cryptography - Misconfigurations.mp4 280.87 MB
55. Risk Assessment.mp4 417.25 MB
56. Risk Handling Techniques.mp4 297.81 MB
57. Risk Types.mp4 273.75 MB
58. Risk Management Life Cycle.mp4 278.07 MB
59. Risk Tracking.mp4 346.53 MB
60. Policies and Security Practices.mp4 287.99 MB
61. Shared Responsibility Model - Cloud.mp4 174.82 MB
62. Performing Vendor Assessments.mp4 285.06 MB
63. Technical Considerations.mp4 244.58 MB
64. Data Considerations.mp4 306.63 MB
65. Regulations Accreditations & Standards.mp4 310.52 MB
66. Legal Considerations.mp4 195.14 MB
67. Contract and Agreement Types.mp4 161.34 MB
68. Business Impact Analysis (BIA).mp4 252.86 MB
69. Privacy Impact Assessment.mp4 115.76 MB
70. Disaster Recovery & Business Continuity Planning.mp4 174.95 MB
71. Incident Response Plan.mp4 197.23 MB
72. Testing Plans.mp4 311.34 MB
73. Governance, Risk & Compliance - Key Points.mp4 184.19 MB
其他位置