zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Pluralsight - CISSP Security Assessment and Testing
magnet:?xt=urn:btih:b0bd6513fd53e2001bd6d730068d09e51cdc3f8b&dn=Pluralsight - CISSP Security Assessment and Testing
磁力链接详情
文件列表详情
b0bd6513fd53e2001bd6d730068d09e51cdc3f8b
infohash:
64
文件数量
183.55 MB
文件大小
2018-3-16 09:15
创建日期
2024-12-23 00:50
最后访问
相关分词
Pluralsight
-
CISSP
Security
Assessment
and
Testing
03 - Assessment and Testing Strategies - Ensuring Objectives Have Been Met.mp4 11.35 MB
26 - Security Control Effectiveness Testing - Enumeration.mp4 10.68 MB
28 - Security Control Effectiveness Testing - Security Assessment Techniques.mp4 9.14 MB
01 - Course Overview - Course Overview.mp4 9.03 MB
11 - Security Control Effectiveness Testing - Vulnerability Assessment.mp4 8.89 MB
05 - Assessment and Testing Strategies - Security Assessment Foundations.mp4 8.68 MB
08 - Assessment and Testing Strategies - Assessment Types.mp4 6.61 MB
21 - Security Control Effectiveness Testing - Destructing and Non-destructive Testing.mp4 6.48 MB
46 - Test Result Analysis - Penetration Testing Report Anatomy.mp4 6.09 MB
02 - Assessment and Testing Strategies - Course Introduction.mp4 5.93 MB
04 - Assessment and Testing Strategies - Resource Constraints.mp4 4.73 MB
17 - Security Control Effectiveness Testing - Intro to Penetration Testing.mp4 4.72 MB
29 - Security Control Effectiveness Testing - Source Code Review.mp4 4.13 MB
27 - Security Control Effectiveness Testing - Identification.mp4 4.06 MB
25 - Security Control Effectiveness Testing - Scoping the Test.mp4 3.67 MB
13 - Security Control Effectiveness Testing - Identification.mp4 3.17 MB
20 - Security Control Effectiveness Testing - Selecting Target Surface.mp4 2.98 MB
07 - Assessment and Testing Strategies - Assessment Viewpoints.mp4 2.82 MB
33 - Security Process Data Collection - Management Review.mp4 2.77 MB
06 - Assessment and Testing Strategies - Security Assessment Program.mp4 2.69 MB
35 - Security Process Data Collection - Account Management.mp4 2.44 MB
42 - Test Result Analysis - Targeted Reporting.mp4 2.42 MB
12 - Security Control Effectiveness Testing - Detection.mp4 2.41 MB
34 - Security Process Data Collection - Training and Awareness.mp4 2.34 MB
14 - Security Control Effectiveness Testing - Analysis.mp4 2.25 MB
19 - Security Control Effectiveness Testing - Test Process Walkthrough.mp4 2.24 MB
10 - Security Control Effectiveness Testing - Introduction.mp4 2.23 MB
22 - Security Control Effectiveness Testing - Penetration Testing Frameworks.mp4 2.03 MB
16 - Security Control Effectiveness Testing - Mitigation.mp4 1.95 MB
18 - Security Control Effectiveness Testing - Penetration Testing.mp4 1.91 MB
45 - Test Result Analysis - Reporting Challenges.mp4 1.89 MB
39 - Test Result Analysis - Introduction.mp4 1.88 MB
48 - Third-party Assessment - Introduction.mp4 1.86 MB
58 - Information Security Continuous Monitoring - Defining Your ISCM Program Strategy.mp4 1.84 MB
31 - Security Process Data Collection - Introduction.mp4 1.81 MB
32 - Security Process Data Collection - Key Performance Risk Indicators.mp4 1.71 MB
49 - Third-party Assessment - Third-party Vendors.mp4 1.71 MB
55 - Information Security Continuous Monitoring - Introduction.mp4 1.67 MB
36 - Security Process Data Collection - Disaster Recovery and Business Continuity.mp4 1.58 MB
53 - Third-party Assessment - Audit Stages.mp4 1.47 MB
62 - Information Security Continuous Monitoring - Respond to ISCM Findings.mp4 1.41 MB
41 - Test Result Analysis - Vulnerability Assessment Dashboards.mp4 1.35 MB
64 - Information Security Continuous Monitoring - Summary.mp4 1.34 MB
59 - Information Security Continuous Monitoring - Establishing Your ISCM Program Strategy.mp4 1.32 MB
60 - Information Security Continuous Monitoring - Implementing Your ISCM Program Strategy.mp4 1.3 MB
38 - Security Process Data Collection - Summary.mp4 1.27 MB
50 - Third-party Assessment - Evaluating Guidelines.mp4 1.25 MB
52 - Third-party Assessment - SSAE16.mp4 1.21 MB
23 - Security Control Effectiveness Testing - CISSP Exam Tip.mp4 1.2 MB
61 - Information Security Continuous Monitoring - Analyzing Your ISCM Program Strategy.mp4 1.19 MB
30 - Security Control Effectiveness Testing - Summary.mp4 1.12 MB
47 - Test Result Analysis - Summary.mp4 1.1 MB
09 - Assessment and Testing Strategies - Summary.mp4 1.1 MB
37 - Security Process Data Collection - Backup Data Verification.mp4 1.09 MB
63 - Information Security Continuous Monitoring - Review Your ISCM Program Strategy.mp4 1.06 MB
56 - Information Security Continuous Monitoring - What Is ISCM.mp4 972.91 KB
51 - Third-party Assessment - Audit Reports.mp4 946.16 KB
54 - Third-party Assessment - Summary.mp4 937.34 KB
43 - Test Result Analysis - Data Analysis.mp4 921.15 KB
24 - Security Control Effectiveness Testing - Penetration Testing Process.mp4 916.74 KB
15 - Security Control Effectiveness Testing - Reporting.mp4 858.25 KB
57 - Information Security Continuous Monitoring - ISCM Strategy.mp4 798.01 KB
40 - Test Result Analysis - Vulnerability Assessment.mp4 419.16 KB
44 - Test Result Analysis - Penetration Testing Reports.mp4 393.22 KB
其他位置