zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Pearson Certification - CISSP Video Course
magnet:?xt=urn:btih:2ECE5961C4C75B363DB789AD125D338531661080&dn=Pearson Certification - CISSP Video Course
磁力链接详情
文件列表详情
2ECE5961C4C75B363DB789AD125D338531661080
infohash:
667
文件数量
12.65 GB
文件大小
2014-7-26 05:15
创建日期
2025-1-3 13:04
最后访问
相关分词
Pearson
Certification
-
CISSP
Video
Course
464.Domain 5 Review.mp4 202.8 MB
472.Preparing for a Crime Before It Happens.mp4 189.22 MB
454.CPU and OS.mp4 186.37 MB
534.Dedicated Proxy Servers.mp4 174.54 MB
457.Enterprise Architecture.mp4 157.21 MB
582.Wireless EAP.mp4 144.96 MB
537.Virtual Private Network Technologies.mp4 138.81 MB
542.Routing Protocol Attacks.mp4 124.51 MB
571.Wireless Technologies.mp4 121.42 MB
463.Trusted Computer System Evaluation Criteria (TCSEC).mp4 121.28 MB
459.Bell-LaPadula.mp4 120.35 MB
455.Trusted Computing Base.mp4 118.21 MB
453.Memory Types.mp4 116.52 MB
567.IP Telephony.mp4 115.54 MB
471.Computer Crime and Its Barriers.mp4 112.97 MB
487.Media Access Technologies.mp4 111.61 MB
444.Fire Prevention.mp4 110.94 MB
473.Domain 6 Review.mp4 97.19 MB
492.Transmission Types.mp4 90.13 MB
541.Routing Protocols.mp4 86.23 MB
445.Domain 4 Review.mp4 80.44 MB
536.Authentication Protocols.mp4 75.58 MB
439.Entrance Protection.mp4 71.13 MB
320.Mathematics.mp4 66.03 MB
205.Kerberos as a Single Sign-on Technology.mp4 62.2 MB
442.Alarm Systems.mp4 61.19 MB
655.Activation Phase.mp4 60.88 MB
43.ARO Values.mp4 59.79 MB
485.Network Topologies.mp4 59.01 MB
452.Multiprocessing and Multitasking.mp4 58.55 MB
443.Electrical Power.mp4 58.38 MB
529.Network Devices GÇö Firewalls.mp4 57.14 MB
484.Layers Working Together.mp4 55.96 MB
438.Security Zones.mp4 55.82 MB
533.Circuit-Level Proxy.mp4 55.65 MB
469.Privacy of Sensitive Data.mp4 54.8 MB
579.Wireless Technologies GÇö WEP Woes.mp4 54.79 MB
25.Risk Management.mp4 52.86 MB
543.Network Service GÇö NAT.mp4 51.44 MB
580.802.11 Security Solutions.mp4 51.29 MB
275.Enigma Machine.mp4 51.03 MB
705.Database Access Methods.mp4 50.99 MB
293.Security Holes.mp4 50.89 MB
440.Perimeter Security GÇö Security Guards.mp4 50.18 MB
458.Access Control Models.mp4 50.08 MB
137.Passwords.mp4 49.79 MB
494.Networking Devices.mp4 49.58 MB
609.Business Silos.mp4 48.38 MB
303.Questions 1.mp4 45.88 MB
79.Policy Framework.mp4 45.27 MB
462.Access Control Matrix Model.mp4 45.26 MB
538.SDLC and HDLC.mp4 44.75 MB
557.Wide Area Network Technologies.mp4 44.46 MB
470.Different Types of Laws.mp4 43.84 MB
535.Dial-Up Protocols and Authentication Protocols.mp4 43.79 MB
482.Data Link Layer.mp4 42.82 MB
647.Disk or Database Shadowing.mp4 41.84 MB
329.Block Cipher Modes GÇö CFB and OFB.mp4 40.99 MB
85.Security Roles.mp4 40.84 MB
441.Types of Physical Intrusion Detection Systems.mp4 40.07 MB
456.Security Levels.mp4 38.81 MB
468.A Few Attack Types.mp4 38.53 MB
256.Traffic Anomaly.mp4 38.43 MB
77.Security Governance.mp4 38.33 MB
610.Maximum Tolerable Downtime.mp4 37.78 MB
242.Controlling Access to Sensitive Data.mp4 37.7 MB
460.Clark-Wilson Model.mp4 36.82 MB
311.Diffie-Hellman.mp4 36.65 MB
1.Introduction.mp4 36.49 MB
24.Prudent Person Rule.mp4 36.29 MB
318.Asymmetric Mathematics.mp4 35.43 MB
250.Behavior-Based IDS.mp4 35.38 MB
548.Packet Switching.mp4 35.32 MB
206.Tickets.mp4 33.91 MB
21.Different Types of Law.mp4 33.59 MB
259.IDS Issues.mp4 33.38 MB
80.Standards.mp4 33.15 MB
411.IPSec Is a Suite of Protocols.mp4 33 MB
200.Single Sign-on Technology.mp4 32.76 MB
501.Port and Protocol Relationship.mp4 32.73 MB
670.Domain 8 Review.mp4 32.19 MB
424.Domain 3 Review.mp4 31.8 MB
395.SSL Connection Setup.mp4 31.63 MB
653.Basic Structure of BCP.mp4 31.47 MB
104.Domain 1 Review.mp4 31.44 MB
183.Provisioning Component.mp4 31.26 MB
91.Classification Program Steps.mp4 30.8 MB
461.Non-Interference Model.mp4 30.67 MB
168.Management.mp4 30.36 MB
403.Network Layer Protection.mp4 30.26 MB
587.Needs for BCP.mp4 30 MB
19.Controls.mp4 29.91 MB
117.Trusted Path.mp4 29.76 MB
359.Example of a Birthday Attack.mp4 29.74 MB
187.Identity Management Solution Components.mp4 29.68 MB
583.Wireless Technologies GÇö WAP and WTLS.mp4 29.64 MB
702.Database Models GÇö Relational Components.mp4 29.26 MB
450.Interrupts.mp4 29.24 MB
49.CostBenefit Analysis Countermeasure Criteria.mp4 29.16 MB
547.Types of Multiplexing.mp4 29.14 MB
65.Most Organizations.mp4 28.45 MB
677.Language Types.mp4 28.24 MB
20.Holistic Security.mp4 28.01 MB
436.Crime Prevention Through Environmental Design.mp4 28 MB
505.SYN Flood.mp4 27.91 MB
645.Tape Vaulting.mp4 27.8 MB
606.How to Identify the Most Critical Company Functions.mp4 27.74 MB
181.Legacy Single Sign-On.mp4 27.47 MB
3.Mainframe Days.mp4 27.24 MB
385.One-Time Pad Characteristics.mp4 26.74 MB
611.Range of Threats to Consider.mp4 26.69 MB
570.Cell Phone.mp4 26.58 MB
639.Recovery Strategies (Cont.).mp4 26.55 MB
480.Transport Layer.mp4 26.22 MB
635.Equipment Replacement.mp4 26.01 MB
448.Registers.mp4 25.76 MB
10.AIC Triad.mp4 25.73 MB
661.Types of Tests to Choose From.mp4 25.66 MB
493.Network Technologies.mp4 25.61 MB
588.911 Changed Mentalities About BCP.mp4 25.47 MB
528.Networking Device GÇö Bastion Host.mp4 25.46 MB
42.Qualitative Risk Analysis.mp4 25.44 MB
503.UDP versus TCP.mp4 25.42 MB
248.Types of IDSs.mp4 25.35 MB
559.Cable Modems and Satellites.mp4 25.27 MB
475.OSI Model.mp4 25.17 MB
260.Vulnerable IDS.mp4 25.13 MB
367.RA Roles.mp4 25.09 MB
496.Sniffers.mp4 24.76 MB
333.Symmetric Ciphers.mp4 24.75 MB
261.Domain 2 Review.mp4 24.66 MB
296.Symmetric Key Management Issue.mp4 24.39 MB
188.Federated Identity.mp4 24.22 MB
279.Key and Algorithm Relationship.mp4 24.19 MB
182.Account Management Systems.mp4 24.18 MB
92.Classification Levels.mp4 24.15 MB
235.Diameter Characteristics.mp4 24.08 MB
449.Trust Levels and Processes.mp4 23.99 MB
165.Identity Management.mp4 23.95 MB
486.LAN Media Access Technologies.mp4 23.82 MB
400.E-Commerce.mp4 23.7 MB
416.Questions 2.mp4 23.67 MB
376.Components of PKI Repository and CRLs.mp4 23.63 MB
180.Password Management.mp4 23.57 MB
697.Java and Applets.mp4 23.29 MB
52.Quantitative Analysis.mp4 23.16 MB
12.Social Engineering.mp4 23.05 MB
283.Strength of a Cryptosystem.mp4 23.01 MB
136.Biometric System Types.mp4 22.95 MB
510.IPv6.mp4 22.77 MB
398.Secure Protocols (Cont.).mp4 22.76 MB
584.Instant Messaging.mp4 22.67 MB
226.Rule-Based Access Control.mp4 22.61 MB
179.Web Access.mp4 22.57 MB
150.Asynchronous Token Device.mp4 22.48 MB
625.Subscription Costs.mp4 22.42 MB
99.Unfriendly Termination.mp4 22.38 MB
681.Classes and Objects.mp4 22.33 MB
554.Frame Relay.mp4 22.31 MB
114.Administrating Access Control.mp4 22.05 MB
266.A Few More Definitions.mp4 21.98 MB
112.Detective GÇö Administrative Control.mp4 21.94 MB
294.Strength of a Stream Cipher.mp4 21.72 MB
506.Teardrop Attack.mp4 21.47 MB
388.Link versus End-to-End Encryption.mp4 21.24 MB
696.Mobile Code with Active Content.mp4 21.22 MB
656.Reconstitution Phase.mp4 21.16 MB
194.Another Danger to Be Aware ofGǪ Spyware.mp4 21.08 MB
219.MAC Enforcement Mechanism GÇö Labels.mp4 20.81 MB
331.Counter Mode.mp4 20.79 MB
622.Facility Backups.mp4 20.62 MB
285.Characteristics of Strong Algorithms.mp4 20.56 MB
230.Access Control Administration.mp4 20.53 MB
524.Mail Relay.mp4 20.49 MB
660.Life Cycle.mp4 20.49 MB
51.Controls II.mp4 20.47 MB
478.Presentation Layer.mp4 20.47 MB
623.Compatibility Issues with Offsite Facility.mp4 20.29 MB
361.Key Management.mp4 20.16 MB
491.Signal and Cable Issues.mp4 20.12 MB
495.Virtual LANs.mp4 19.91 MB
437.Construction Materials.mp4 19.82 MB
81.Data Collection for Metrics.mp4 19.65 MB
109.Access Control Characteristics.mp4 19.58 MB
539.Quality of Service (QoS).mp4 19.52 MB
273.Historical Uses.mp4 19.49 MB
386.Steganography.mp4 19.47 MB
269.Substitution Ciphers.mp4 19.42 MB
663.Training Requirements.mp4 19.41 MB
591.More Reasons to Have Plans in Place.mp4 19.35 MB
76.Information Technology Infrastructure Library.mp4 19.18 MB
476.Networking Communications.mp4 19.15 MB
408.Key Issues within IPSec.mp4 19.14 MB
481.Network Layer.mp4 19.13 MB
616.Risk Approach.mp4 19.13 MB
419.Known-Plaintext Attack.mp4 19.11 MB
699.Database Model.mp4 18.83 MB
619.Alternate Business Process Procedures.mp4 18.77 MB
280.Ways of Breaking Cryptosystems GÇö Brute Force.mp4 18.7 MB
479.OSI GÇö Session Layer.mp4 18.67 MB
276.Historical Uses of Symmetric Cryptography GÇö Running Key and Concealment.mp4 18.55 MB
509.IP Address Ranges.mp4 18.49 MB
110.Preventive Controls.mp4 18.47 MB
628.Other Offsite Approaches.mp4 18.43 MB
362.Key Usage.mp4 18.4 MB
641.Data Recovery.mp4 18.37 MB
225.RBAC Hierarchy.mp4 18.21 MB
648.Cost and Recovery Times.mp4 18.12 MB
684.Polymorphism.mp4 18.04 MB
363.M-of-N.mp4 18.02 MB
531.Firewall Types GÇö Proxy Firewalls.mp4 18 MB
372.Verifying the Certificate.mp4 17.99 MB
241.Decentralized Access Control Administration.mp4 17.97 MB
175.Authoritative Sources.mp4 17.97 MB
132.Hand Geometry.mp4 17.95 MB
532.Firewall Types GÇö Circuit-Level Proxy Firewall.mp4 17.9 MB
332.Modes Summary.mp4 17.85 MB
380.Cross Certification.mp4 17.83 MB
125.Authentication Mechanisms in Use Today.mp4 17.72 MB
240.AVP.mp4 17.6 MB
675.Software Development Tools.mp4 17.58 MB
135.Crossover Error Rate.mp4 17.52 MB
552.WAN Technologies GÇö Frame Relay.mp4 17.5 MB
299.Public Key Cryptography Advantages.mp4 17.43 MB
633.Supply and Technology Recovery.mp4 17.42 MB
600.Project Sizing.mp4 17.41 MB
698.Database Systems.mp4 17.39 MB
602.BCP Risk Analysis Steps.mp4 17.37 MB
325.Encryption Modes.mp4 17.34 MB
304.When to Use Which Key.mp4 17.32 MB
222.Software and Hardware Guards.mp4 17.31 MB
29.Defining Acceptable Levels.mp4 17.31 MB
381.PKI and Trust.mp4 17.25 MB
292.Initialization Vectors.mp4 17.23 MB
545.PSTN.mp4 17.01 MB
366.PKI and Its Components.mp4 16.88 MB
74.COBIT.mp4 16.79 MB
585.Domain 7 Review.mp4 16.78 MB
433.Layered Defense Model.mp4 16.62 MB
692.COM Architecture.mp4 16.57 MB
477.Application Layer.mp4 16.53 MB
301.Confusing Names.mp4 16.4 MB
37.Data Collection GÇö Calculate Risks.mp4 16.27 MB
185.Working Together.mp4 16.24 MB
231.Remote Centralized Administration.mp4 16.24 MB
407.SAs In Use.mp4 16.21 MB
237.Mobile IP.mp4 16.17 MB
483.Physical Layer.mp4 16.13 MB
322.Double DES.mp4 16.09 MB
145.One-Time Password Authentication.mp4 16.05 MB
234.TACACS+ Characteristics.mp4 15.94 MB
646.Clustering for Fault Tolerance.mp4 15.94 MB
566.PBX Best Practices.mp4 15.89 MB
63.Security Roadmap.mp4 15.87 MB
160.Smart Card Attacks.mp4 15.79 MB
382.Historical Uses of Symmetric Cryptography.mp4 15.77 MB
149.Challenge Response Authentication.mp4 15.74 MB
581.Types of 802.11 Security.mp4 15.71 MB
603.BIA Steps.mp4 15.65 MB
540.Autonomous Systems.mp4 15.57 MB
572.OFDM.mp4 15.49 MB
352.Digital Signatures.mp4 15.31 MB
16.The Bad Guys Are Motivated.mp4 15.28 MB
565.PBX Vulnerabilities.mp4 15.26 MB
184.Profile Update.mp4 15.25 MB
373.Trusted CAGÇÖs.mp4 15.07 MB
389.End-to-End Encryption.mp4 15.03 MB
391.Email Standards.mp4 15.03 MB
190.Fake Login Tools.mp4 14.89 MB
98.Hiring and Firing Issues.mp4 14.86 MB
654.External Groups.mp4 14.85 MB
70.Industry Best Practices Standards.mp4 14.83 MB
73.New ISO Standards.mp4 14.77 MB
638.Executive Succession Planning.mp4 14.74 MB
317.El Gamal.mp4 14.73 MB
5.Security Definitions.mp4 14.69 MB
201.Security Domain.mp4 14.69 MB
326.Block Cipher Modes GÇö CBC.mp4 14.67 MB
116.Accountability and Access Control.mp4 14.62 MB
178.Web Access Management.mp4 14.6 MB
525.Protocols GÇö FTP TFTP Telnet.mp4 14.58 MB
351.Question 2.mp4 14.57 MB
6.Examples of Some Vulnerabilities that Are Not Always Obvious.mp4 14.57 MB
46.Losses.mp4 14.55 MB
674.Usual Trend of Dealing with Security.mp4 14.54 MB
374.Non-Trusted CA.mp4 14.46 MB
701.Benefits of OO Database Model.mp4 14.26 MB
191.Instructional Emails.mp4 14.23 MB
267.Symmetric Cryptography GÇö Use of Secret Keys.mp4 14.23 MB
668.Resulting Plan Should ContainGǪ.mp4 14.23 MB
310.Asymmetric Algorithms We Will Dive Into.mp4 14.21 MB
243.IDS.mp4 14.2 MB
66.Silo Security Structure.mp4 14.15 MB
451.Bussses.mp4 14.01 MB
48.Cost of a Countermeasure.mp4 14 MB
155.Memory Cards.mp4 14 MB
430.Planning Process.mp4 14 MB
596.BCP Policy Outlines.mp4 13.94 MB
55.Dealing with Risk.mp4 13.84 MB
652.Results from the BIA.mp4 13.77 MB
402.Secure Email Standard.mp4 13.73 MB
167.Some Current Issues.mp4 13.66 MB
688.Agenda 2.mp4 13.59 MB
429.Physical Security Program Goals.mp4 13.49 MB
217.Security Issues.mp4 13.49 MB
446.Security Architecture and Design.mp4 13.44 MB
147.One Type of Solution.mp4 13.44 MB
176.Meta Directory.mp4 13.43 MB
172.Directory Component.mp4 13.26 MB
198.How to Prevent Spyware.mp4 13.25 MB
189.Identity Theft.mp4 13.19 MB
615.Potential Disasters.mp4 13.19 MB
106.Agenda 1.mp4 13.14 MB
383.Binary Mathematical Function 2.mp4 13.12 MB
287.Types of Ciphers Used Today.mp4 13.08 MB
36.Data Collection GÇö Identify Threats.mp4 13.06 MB
264.Cryptographic Definitions.mp4 13.05 MB
423.Side Channel Attacks.mp4 13.04 MB
650.Preventative Measures.mp4 12.97 MB
253.Protocol Anomaly.mp4 12.85 MB
568.Mobile Phone Security.mp4 12.84 MB
618.Recovery Strategies.mp4 12.8 MB
284.Developing Cryptographic Solutions In-House.mp4 12.67 MB
605.Analysis.mp4 12.65 MB
594.Different BCP Model.mp4 12.6 MB
13.What Security People Are Really Thinking.mp4 12.56 MB
300.Asymmetric Algorithm Disadvantages.mp4 12.5 MB
644.Automated Backup Technologies.mp4 12.5 MB
562.Agenda 9.mp4 12.39 MB
676.Security Issues.mp4 12.38 MB
263.Services Provided by Cryptography.mp4 12.38 MB
245.Network IDS Sensors.mp4 12.38 MB
629.Security Does Not Stop.mp4 12.34 MB
224.Role-Based Access Control.mp4 12.23 MB
368.CA.mp4 12.19 MB
54.Uncertainty Analysis.mp4 12.16 MB
573.802.11n.mp4 12.13 MB
427.Wake Up Call.mp4 12.13 MB
620.Business Process Reconstruction.mp4 12.13 MB
218.Mandatory Access Control Model.mp4 12.11 MB
379.Different Uses for Certificates.mp4 12.06 MB
404.IPSec Key Management.mp4 12.01 MB
23.Due Diligence and Due Care.mp4 11.99 MB
337.Hashing Algorithms.mp4 11.94 MB
378.CRL Process.mp4 11.93 MB
216.File Permissions.mp4 11.91 MB
544.WAN Technologies Are Circuit or Packet Switched.mp4 11.88 MB
420.Chosen-Plaintext Attack.mp4 11.87 MB
72.Numbering.mp4 11.86 MB
558.WAN Technologies GÇö Cable Modem.mp4 11.84 MB
257.IDS Response Mechanisms.mp4 11.8 MB
197.New Spyware Is Being Identified Every Week.mp4 11.77 MB
593.Steps of BCP Process.mp4 11.74 MB
551.X.25.mp4 11.7 MB
158.Characteristics.mp4 11.59 MB
369.Digital Certificates.mp4 11.57 MB
123.Fraud Controls.mp4 11.53 MB
274.Vigenere Algorithm.mp4 11.49 MB
576.Wireless Technologies GÇö Service Set ID.mp4 11.45 MB
497.Networking Devices GÇö Router.mp4 11.43 MB
313.Asymmetric Algorithm GÇö RSA.mp4 11.4 MB
569.Mobile Device Security.mp4 11.39 MB
134.Biometrics Error Types.mp4 11.39 MB
447.Central Processing Unit (CPU).mp4 11.38 MB
143.Countermeasures for Password Cracking.mp4 11.34 MB
578.802.11 Authentication.mp4 11.34 MB
103.Answer This Question.mp4 11.32 MB
139.Attack Steps.mp4 11.32 MB
67.Security Is a Process.mp4 11.28 MB
489.Cabling Types GÇö Twisted Pair.mp4 11.24 MB
356.Zero Knowledge Proof.mp4 11.24 MB
680.Object-Oriented Programming.mp4 11.23 MB
17.Open Standards.mp4 11.23 MB
138.Password Attacks.mp4 11.17 MB
282.Ways of Breaking Cryptosystems GÇö Frequency Analysis.mp4 11.13 MB
421.Chosen-Ciphertext Attack.mp4 11.05 MB
682.Functions and Messages.mp4 11.04 MB
546.Multiplexing.mp4 11.02 MB
488.Cabling Types-Coaxial.mp4 11.02 MB
507.Source Routing.mp4 10.99 MB
251.Statistical Anomaly.mp4 10.98 MB
26.Planning Stage GÇö Scope.mp4 10.95 MB
394.Secure Protocols.mp4 10.94 MB
84.Senior ManagementGÇÖs Role.mp4 10.94 MB
270.Simple Substitution Cipher Atbash.mp4 10.86 MB
346.What Services.mp4 10.8 MB
107.Access Control Mechanism Examples.mp4 10.78 MB
146.Synchronous Token.mp4 10.76 MB
31.Collecting and Analyzing Data Methods.mp4 10.71 MB
228.Access Control Matrix.mp4 10.63 MB
521.SNMP.mp4 10.62 MB
344.HMAC GÇö Sender.mp4 10.62 MB
246.Host IDS.mp4 10.59 MB
662.Test Objectives.mp4 10.58 MB
563.PSTN (Cont.).mp4 10.54 MB
262.Cryptography.mp4 10.51 MB
500.Bridges Compared to Routers.mp4 10.48 MB
174.Directory Responsibilities.mp4 10.47 MB
94.Clearly Labeled.mp4 10.47 MB
560.Network Perimeter Security.mp4 10.43 MB
630.More Options.mp4 10.41 MB
414.VPN Establishment (Cont.).mp4 10.4 MB
265.Cipher.mp4 10.32 MB
214.Access Control Models.mp4 10.31 MB
527.DHCP GÇö Dynamic Host Configuration Protocol.mp4 10.31 MB
336.Protecting the Integrity of Data.mp4 10.31 MB
101.Training Characteristics.mp4 10.27 MB
520.SNMP In Action.mp4 10.23 MB
392.You Decide.mp4 10.18 MB
309.Secret versus Session Keys.mp4 10.15 MB
82.Tying Them Together.mp4 10.1 MB
232.RADIUS.mp4 10.07 MB
34.Data Collection GÇö Assigning Values.mp4 10.06 MB
211.SESAME Steps for Authentication.mp4 10.01 MB
703.Database Integrity.mp4 10.01 MB
170.Different Identities.mp4 10 MB
124.Internal Control Tool Separation of Duties.mp4 10 MB
348.MAC Using Block Ciphers.mp4 9.97 MB
577.Authenticating to an AP.mp4 9.93 MB
412.AH and ESP Modes.mp4 9.93 MB
115.Authorization Creep.mp4 9.9 MB
203.Thin Clients.mp4 9.89 MB
405.IPSec Handshaking Process.mp4 9.83 MB
221.Software and Hardware.mp4 9.75 MB
431.Deterrence.mp4 9.71 MB
614.BIA Steps (Cont.).mp4 9.71 MB
14.Security Concepts.mp4 9.68 MB
100.Security Awareness and Training.mp4 9.61 MB
685.Module Characteristics.mp4 9.56 MB
64.Functional and Assurance Requirements.mp4 9.53 MB
297.Asymmetric Cryptography.mp4 9.52 MB
612.Thinking Outside of the Box What IfGǪ.mp4 9.46 MB
627.Choosing Site Location.mp4 9.45 MB
435.Threat Categories.mp4 9.43 MB
298.Key Functions.mp4 9.43 MB
305.Encryption Steps.mp4 9.36 MB
695.Linking Through COM.mp4 9.32 MB
621.Recovery Strategies.mp4 9.3 MB
564.Private Branch Exchange.mp4 9.27 MB
683.Object-Oriented Programming Characteristic.mp4 9.25 MB
330.CFB and OFB Modes.mp4 9.25 MB
118.Fake Login Pages Look Convincing.mp4 9.22 MB
599.BCP Development Team.mp4 9.19 MB
229.Temporal Access Control.mp4 9.16 MB
122.Strong Authentication.mp4 9.16 MB
213.Models for Access.mp4 9.15 MB
637.Priorities.mp4 9.15 MB
689.Distributed Computing.mp4 9.14 MB
249.Signature-Based Example.mp4 9.11 MB
162.Side Channel Attack.mp4 9.09 MB
608.Well Of Course an Organization Knows How It Works!.mp4 9.08 MB
133.Downfalls to Biometric Use.mp4 9.04 MB
164.Microprobing.mp4 9.04 MB
28.Risk Management Tools.mp4 8.98 MB
693.Enterprise Java Beans.mp4 8.96 MB
142.Passwords Should NOT ContainGǪ.mp4 8.95 MB
490.Types of Cabling GÇö Fiber.mp4 8.93 MB
102.Security Enforcement Issues.mp4 8.92 MB
61.In Security You Never Want Any Surprises.mp4 8.87 MB
308.Digital Envelope.mp4 8.77 MB
360.Birthday Attack Issues.mp4 8.75 MB
666.Keeping It Current.mp4 8.71 MB
415.Review.mp4 8.7 MB
4.TodayGÇÖs Environment.mp4 8.69 MB
334.Data Integrity.mp4 8.67 MB
60.A Layered Approach.mp4 8.63 MB
508.Source Routing Types.mp4 8.6 MB
651.Reviewing Insurance.mp4 8.59 MB
355.Not Giving Up the Farm.mp4 8.59 MB
399.SSL and the OSI Model.mp4 8.54 MB
8.Relationships.mp4 8.52 MB
209.Kerberos Issues.mp4 8.51 MB
601.Properly Determining Scope Is Important.mp4 8.51 MB
555.WAN Technologies GÇö ATM.mp4 8.48 MB
2.Information Security and Risk Management.mp4 8.44 MB
93.Information Owner Requirements.mp4 8.42 MB
272.Simple Substitution Cipher ROT13.mp4 8.42 MB
465.Law Investigation and Ethics.mp4 8.35 MB
312.Key Agreement Schemes.mp4 8.33 MB
595.Documentation.mp4 8.31 MB
177.Directory Interactions.mp4 8.3 MB
499.Routers.mp4 8.3 MB
428.Legal Issues.mp4 8.27 MB
289.Binary Mathematical Function 1.mp4 8.27 MB
171.Identity Management Technologies.mp4 8.26 MB
686.Low Cohesion.mp4 8.22 MB
120.Identification Issues.mp4 8.19 MB
56.ManagementGÇÖs Response to Identified Risks.mp4 8.19 MB
258.Responses to Attacks.mp4 8.17 MB
126.Verification Steps.mp4 8.11 MB
255.Protocol Anomaly Issues.mp4 8.08 MB
208.Issues Pertaining to Kerberos.mp4 8.07 MB
290.Type of Symmetric Cipher GÇö Stream Cipher.mp4 8.05 MB
89.Types of Classification Levels.mp4 8.05 MB
358.Security Issues In Hashing.mp4 7.94 MB
271.Caesar Cipher Example.mp4 7.91 MB
97.Employee Position and Management.mp4 7.88 MB
59.Components of Security Program.mp4 7.85 MB
613.Biological Threats.mp4 7.76 MB
252.Statistical IDS.mp4 7.75 MB
519.Protocols GÇö SNMP.mp4 7.73 MB
288.S-Boxes Used in Block Ciphers.mp4 7.71 MB
626.Multiple Processing Centers.mp4 7.7 MB
87.Data Leakage.mp4 7.7 MB
319.Asymmetric Security.mp4 7.68 MB
18.Without Standards.mp4 7.67 MB
327.Different Modes of Block Ciphers GÇö ECB.mp4 7.59 MB
694.J2EE Platform Example.mp4 7.55 MB
121.Authentication Mechanisms Characteristics.mp4 7.49 MB
281.Brute Force Components.mp4 7.47 MB
418.Attacks on Cryptosystems.mp4 7.44 MB
152.Cryptographic Keys.mp4 7.4 MB
700.Object-Oriented Database.mp4 7.38 MB
466.Examples of Computer Crimes.mp4 7.33 MB
343.MAC.mp4 7.24 MB
153.Passphrase Authentication.mp4 7.21 MB
586.Business Continuity.mp4 7.2 MB
413.IPSec Modes of Operation.mp4 7.18 MB
57.Risk Acceptance.mp4 7.16 MB
502.TCPIP Suite.mp4 7.1 MB
141.Rainbow Table.mp4 7.07 MB
338.Data Integrity Mechanisms.mp4 7.05 MB
417.Attack Types.mp4 7 MB
632.Recovery Strategies (Cont.).mp4 6.99 MB
233.RADIUS Characteristics.mp4 6.99 MB
406.VPN Establishment.mp4 6.98 MB
278.Transposition Ciphers.mp4 6.96 MB
530.Rule Set Example.mp4 6.95 MB
643.Recovering Data.mp4 6.94 MB
247.Combination.mp4 6.92 MB
387.Digital Watermarking.mp4 6.88 MB
342.More Protection In Data Integrity.mp4 6.86 MB
27.Planning Stage GÇö Analysis Method.mp4 6.83 MB
324.Modes of 3DES.mp4 6.82 MB
604.Information from Different Sources.mp4 6.79 MB
517.A Way Hackers Use ICMP.mp4 6.73 MB
71.Pieces and Parts.mp4 6.68 MB
45.Risk Types.mp4 6.65 MB
95.Testing Classification Program.mp4 6.61 MB
86.Information Classification.mp4 6.61 MB
244.IDS Steps.mp4 6.56 MB
238.Diameter Architecture.mp4 6.55 MB
40.Qualitative Analysis Steps.mp4 6.54 MB
523.POP3 and SMTP.mp4 6.54 MB
364.Key Types.mp4 6.54 MB
307.ReceiverGÇÖs Private Key Is Used to Decrypt the Symmetric Key.mp4 6.49 MB
192.Knowing What You Are Disposing of Is Important.mp4 6.48 MB
210.SESAME as a Single Sign-on Technology.mp4 6.48 MB
393.Non-Hierarchical.mp4 6.46 MB
514.How ARP Works.mp4 6.46 MB
642.Backup Redundancy.mp4 6.41 MB
574.Wireless Technologies GÇö Access Point (Cont.).mp4 6.37 MB
516.ICMP Packets.mp4 6.3 MB
47.CostBenefit Analysis.mp4 6.29 MB
30.Acceptable Risk Level.mp4 6.28 MB
268.Scytale Cipher.mp4 6.27 MB
526.Protocols GÇö RARP and BootP.mp4 6.24 MB
624.Tertiary Sites.mp4 6.17 MB
690.Distributed Computing GÇö ORBs.mp4 6.15 MB
58.Risk Analysis Process Summary.mp4 6.14 MB
35.Asset Value.mp4 6.07 MB
295.Out-of-Band Transmission.mp4 6.03 MB
353.U.S. Government Standard.mp4 5.97 MB
212.Combo.mp4 5.95 MB
204.Example.mp4 5.94 MB
50.Calculating CostBenefit.mp4 5.93 MB
339.Hashing Strength.mp4 5.92 MB
314.Factoring Large Numbers.mp4 5.92 MB
634.VoIP.mp4 5.91 MB
671.Application Security.mp4 5.87 MB
678.Turn Into Machine Code.mp4 5.84 MB
515.ARP Poisoning.mp4 5.83 MB
161.Software Attack.mp4 5.76 MB
321.Block Cipher.mp4 5.7 MB
409.Configuration of SA Parameters.mp4 5.62 MB
315.RSA Operations.mp4 5.55 MB
659.Termination of BCP.mp4 5.55 MB
302.Symmetric versus Asymmetric.mp4 5.53 MB
561.Complexity Only Increases.mp4 5.49 MB
649.Recovery Solutions.mp4 5.49 MB
518.Ping Steps.mp4 5.48 MB
202.Domains of Trust.mp4 5.38 MB
215.ACL Access.mp4 5.35 MB
522.SNMP Output.mp4 5.3 MB
328.ECB versus CBC.mp4 5.27 MB
33.Data Collection GÇö Identify Assets.mp4 5.26 MB
236.Diameter Protocol.mp4 5.25 MB
239.Two Pieces.mp4 5.19 MB
691.Common Object Request Broker Architecture.mp4 5.16 MB
631.Rolling Hot Site.mp4 5.15 MB
68.Approach to Security Management.mp4 5.01 MB
140.Many Tools to Break Your Password.mp4 5 MB
390.Encryption Location.mp4 4.99 MB
667.Change Control.mp4 4.99 MB
323.Evolution of DES.mp4 4.94 MB
669.Phases of the BCP.mp4 4.91 MB
512.Protocols GÇö ARP.mp4 4.84 MB
426.Different Types of Threats.mp4 4.83 MB
345.Another Look.mp4 4.8 MB
640.Co-Location.mp4 4.77 MB
341.Weakness In Using Only Hash Algorithms.mp4 4.75 MB
193.Other Examples.mp4 4.75 MB
357.Message Integrity Controls.mp4 4.75 MB
347.CBC-MAC.mp4 4.72 MB
163.Side Channel Data Collection.mp4 4.66 MB
504.TCP Segment.mp4 4.64 MB
130.Iris Sampling.mp4 4.63 MB
687.Coupling.mp4 4.63 MB
422.Adaptive Attacks.mp4 4.6 MB
607.Interdependencies.mp4 4.6 MB
69.Result of Battling Management.mp4 4.5 MB
78.Security Program Components.mp4 4.48 MB
704.Different Modeling Approaches.mp4 4.48 MB
157.Smart Card.mp4 4.46 MB
223.MAC versus DAC.mp4 4.43 MB
144.Cognitive Passwords.mp4 4.4 MB
550.WAN Technologies GÇö X.25.mp4 4.4 MB
592.BCP Is a Core Component of Every Security Program.mp4 4.39 MB
108.Technical Controls.mp4 4.34 MB
316.RSA Key Size.mp4 4.25 MB
90.Data Protection Levels.mp4 4.21 MB
186.Enterprise Directory.mp4 4.19 MB
291.Symmetric Characteristics.mp4 4.19 MB
156.Memory Card Characteristics.mp4 4.18 MB
62.Building Foundation.mp4 4.11 MB
384.One-Time Pad in Action.mp4 4.08 MB
410.IPSec Configuration Options.mp4 4.05 MB
199.Different Technologies.mp4 4.03 MB
679.New and Old.mp4 4.03 MB
397.Validating Certificate.mp4 3.91 MB
159.Card Types.mp4 3.89 MB
575.Architectures.mp4 3.87 MB
556.Cell Switching.mp4 3.86 MB
173.Enterprise Directory.mp4 3.82 MB
370.Certificate.mp4 3.78 MB
371.Signing the Certificate.mp4 3.76 MB
113.Detective Examples.mp4 3.73 MB
553.WAN Example.mp4 3.7 MB
220.Formal Model.mp4 3.69 MB
131.Finger Scan.mp4 3.64 MB
340.Question 1.mp4 3.63 MB
127.What a Person Is.mp4 3.61 MB
513.IP to MAC Mapping.mp4 3.6 MB
169.Typical Chaos.mp4 3.57 MB
335.Hashing Steps.mp4 3.54 MB
396.Example GÇö SSL.mp4 3.52 MB
38.Scenario Based GÇö Qualitative.mp4 3.49 MB
498.Hops.mp4 3.47 MB
474.Telecommunications and Networking.mp4 3.33 MB
75.Measurements.mp4 3.33 MB
354.What IsGǪ.mp4 3.31 MB
434.Weak Link In the Chain.mp4 3.31 MB
105.Access Control.mp4 3.15 MB
306.ReceiverGÇÖs Public Key Is Used to Encrypt the Symmetric Key.mp4 3.11 MB
96.Employee Management.mp4 2.9 MB
111.Control Combinations.mp4 2.47 MB
432.Delay.mp4 2.46 MB
277.Agenda 1.mp4 2.42 MB
39.Risk Approach.mp4 2.35 MB
154.Key Protection.mp4 2.21 MB
425.Physical Security.mp4 1.8 MB
549.WAN Technologies GÇö Packet Switched.mp4 1.59 MB
151.Challenge Response Authentication.mp4 1.39 MB
227.Firewall Example.mp4 1.35 MB
148.Administrator Configures.mp4 885.81 KB
83.Entity Relationships.mp4 691.74 KB
511.Protocols.mp4 624.4 KB
其他位置