本站已收录 番号和无损神作磁力链接/BT种子 

[ TutPig.com ] Linkedin - Certified Information Security Manager (CISM) Cert Prep - 2 Information Security Risk Management

种子简介

种子名称: [ TutPig.com ] Linkedin - Certified Information Security Manager (CISM) Cert Prep - 2 Information Security Risk Management
文件类型: 视频
文件数目: 61个文件
文件大小: 781.59 MB
收录时间: 2022-12-13 01:00
已经下载: 3
资源热度: 178
最近下载: 2024-5-15 14:01

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:1625160dd873a1df1a9b7b96d3c6116cc52a0651&dn=[ TutPig.com ] Linkedin - Certified Information Security Manager (CISM) Cert Prep - 2 Information Security Risk Management 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[ TutPig.com ] Linkedin - Certified Information Security Manager (CISM) Cert Prep - 2 Information Security Risk Management.torrent
  • ~Get Your Files Here !/01 - Introduction/01 - Information security risk management.mp413.21MB
  • ~Get Your Files Here !/01 - Introduction/02 - What you need to know.mp41.99MB
  • ~Get Your Files Here !/01 - Introduction/03 - Study resources.mp413.42MB
  • ~Get Your Files Here !/02 - 1. Risk Assessment/01 - Risk assessment.mp413.71MB
  • ~Get Your Files Here !/02 - 1. Risk Assessment/02 - Quantitative risk assessment.mp420.06MB
  • ~Get Your Files Here !/02 - 1. Risk Assessment/03 - Information classification.mp412.48MB
  • ~Get Your Files Here !/03 - 2. Risk Management/01 - Risk treatment options.mp417.17MB
  • ~Get Your Files Here !/03 - 2. Risk Management/02 - Security control selection and implementation.mp420.06MB
  • ~Get Your Files Here !/03 - 2. Risk Management/03 - Ongoing risk management.mp48.8MB
  • ~Get Your Files Here !/03 - 2. Risk Management/04 - Risk management frameworks.mp410.93MB
  • ~Get Your Files Here !/03 - 2. Risk Management/05 - Risk visibility and reporting.mp421.23MB
  • ~Get Your Files Here !/04 - 3. Malware/01 - Comparing viruses, worms, and Trojans.mp423.3MB
  • ~Get Your Files Here !/04 - 3. Malware/02 - Malware payloads.mp420.49MB
  • ~Get Your Files Here !/04 - 3. Malware/03 - Understanding backdoors and logic bombs.mp415.59MB
  • ~Get Your Files Here !/04 - 3. Malware/04 - Botnets.mp49.28MB
  • ~Get Your Files Here !/04 - 3. Malware/05 - Advanced persistent threats.mp410.58MB
  • ~Get Your Files Here !/05 - 4. Understanding Attackers/01 - Cybersecurity adversaries.mp416.92MB
  • ~Get Your Files Here !/05 - 4. Understanding Attackers/02 - Preventing insider threats.mp49.82MB
  • ~Get Your Files Here !/05 - 4. Understanding Attackers/03 - Threat intelligence.mp411.11MB
  • ~Get Your Files Here !/06 - 5. Attack Types/01 - Denial of service attacks.mp415.65MB
  • ~Get Your Files Here !/06 - 5. Attack Types/02 - Eavesdropping attacks.mp413.55MB
  • ~Get Your Files Here !/06 - 5. Attack Types/03 - DNS attacks.mp412.59MB
  • ~Get Your Files Here !/06 - 5. Attack Types/04 - Layer 2 attacks.mp47.1MB
  • ~Get Your Files Here !/06 - 5. Attack Types/05 - Network address spoofing.mp412.03MB
  • ~Get Your Files Here !/06 - 5. Attack Types/06 - Password attacks.mp432.82MB
  • ~Get Your Files Here !/06 - 5. Attack Types/07 - Password spraying and credential stuffing.mp46.12MB
  • ~Get Your Files Here !/06 - 5. Attack Types/08 - Watering hole attacks.mp412MB
  • ~Get Your Files Here !/07 - 6. Social Engineering Attacks/01 - Social engineering.mp416.91MB
  • ~Get Your Files Here !/07 - 6. Social Engineering Attacks/02 - Impersonation attacks.mp415.11MB
  • ~Get Your Files Here !/07 - 6. Social Engineering Attacks/03 - Physical social engineering.mp411.07MB
  • ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/01 - What is vulnerability management.mp416.64MB
  • ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/02 - Identify scan targets.mp413.74MB
  • ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/03 - Scan configuration.mp415.49MB
  • ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/04 - Scan perspective.mp412.75MB
  • ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/05 - Security Content Automation Protocol (SCAP).mp46.99MB
  • ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/06 - Common Vulnerability Scoring System (CVSS).mp410.33MB
  • ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/07 - Analyzing scan reports.mp416.16MB
  • ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/08 - Correlating scan results.mp47.95MB
  • ~Get Your Files Here !/09 - 8. Awareness and Training/01 - Security awareness training.mp419.83MB
  • ~Get Your Files Here !/09 - 8. Awareness and Training/02 - Compliance training.mp413.28MB
  • ~Get Your Files Here !/09 - 8. Awareness and Training/03 - User habits.mp49.51MB
  • ~Get Your Files Here !/09 - 8. Awareness and Training/04 - Measuring compliance and security posture.mp47.73MB
  • ~Get Your Files Here !/09 - 8. Awareness and Training/05 - Awareness program reviews.mp43.19MB
  • ~Get Your Files Here !/10 - 9. Business Continuity/01 - Business continuity planning.mp48.03MB
  • ~Get Your Files Here !/10 - 9. Business Continuity/02 - Business continuity controls.mp411.09MB
  • ~Get Your Files Here !/10 - 9. Business Continuity/03 - High availability and fault tolerance.mp414.59MB
  • ~Get Your Files Here !/11 - 10. Disaster Recovery/01 - Disaster recovery planning.mp414.07MB
  • ~Get Your Files Here !/11 - 10. Disaster Recovery/02 - Backups.mp411.13MB
  • ~Get Your Files Here !/11 - 10. Disaster Recovery/03 - Restoring backups.mp47.25MB
  • ~Get Your Files Here !/11 - 10. Disaster Recovery/04 - Disaster recovery sites.mp412.52MB
  • ~Get Your Files Here !/11 - 10. Disaster Recovery/05 - Testing BCDR plans.mp410.96MB
  • ~Get Your Files Here !/12 - 11. Supply Chain Risk/01 - Managing vendor relationships.mp412.4MB
  • ~Get Your Files Here !/12 - 11. Supply Chain Risk/02 - Vendor agreements.mp415.62MB
  • ~Get Your Files Here !/12 - 11. Supply Chain Risk/03 - Vendor information management.mp46.13MB
  • ~Get Your Files Here !/12 - 11. Supply Chain Risk/04 - Audits and assessments.mp418.81MB
  • ~Get Your Files Here !/12 - 11. Supply Chain Risk/05 - Cloud audits.mp413.23MB
  • ~Get Your Files Here !/13 - 12. Compliance/01 - Legal and compliance risks.mp47.41MB
  • ~Get Your Files Here !/13 - 12. Compliance/02 - Privacy compliance.mp48.84MB
  • ~Get Your Files Here !/13 - 12. Compliance/03 - Data breaches.mp46.96MB
  • ~Get Your Files Here !/13 - 12. Compliance/04 - Intellectual property.mp417.15MB
  • ~Get Your Files Here !/14 - Conclusion/01 - Continuing your studies.mp46.71MB