zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL
magnet:?xt=urn:btih:310530e1460946a573594bde8e8579b0c31b9e1f&dn=LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL
磁力链接详情
文件列表详情
310530e1460946a573594bde8e8579b0c31b9e1f
infohash:
27
文件数量
286.92 MB
文件大小
2017-1-30 10:44
创建日期
2024-12-23 04:40
最后访问
相关分词
LYNDA
FOUNDATIONS
OF
CYBERSECURITY
TUTORIAL
01. Introduction/01_01-Welcome.mp4 6.21 MB
01. Introduction/01_02-What you should know.mp4 1.95 MB
02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 13.94 MB
02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 13.64 MB
02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 12.53 MB
02. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.04 MB
02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 9.84 MB
02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 8.83 MB
02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 7.76 MB
03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 12.86 MB
03. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.04 MB
03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.46 MB
03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.37 MB
03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.34 MB
03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 8.61 MB
03. Cybersecurity Threats/03_08-Exploring ransomware.mp4 8.01 MB
03. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 7.71 MB
04. Security Architecture/04_04-Managing user access and identity.mp4 19.71 MB
04. Security Architecture/04_05-Implementing preventative security.mp4 17.89 MB
04. Security Architecture/04_06-Monitoring and alerts.mp4 14.95 MB
04. Security Architecture/04_01-Describing security requirements.mp4 14.21 MB
04. Security Architecture/04_02-Architecting security risk.mp4 12.86 MB
04. Security Architecture/04_03-Selecting security controls.mp4 8.14 MB
05. Incident Management/05_02-Preparing for an incident.mp4 13.53 MB
05. Incident Management/05_03-Responding to an incident.mp4 10.95 MB
05. Incident Management/05_01-Managing incident response.mp4 8.11 MB
06. Conclusion/06_01-Next steps.mp4 3.44 MB
其他位置