本站已收录 番号和无损神作磁力链接/BT种子 

[FreeCourseSite.com] Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23

种子简介

种子名称: [FreeCourseSite.com] Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23
文件类型: 视频
文件数目: 137个文件
文件大小: 5.36 GB
收录时间: 2024-1-31 19:25
已经下载: 3
资源热度: 36
最近下载: 2024-5-15 06:42

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:2570dbe15bec901f6b4c7cf73ba5e9686622ffca&dn=[FreeCourseSite.com] Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[FreeCourseSite.com] Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23.torrent
  • 01 - Introduction/001 Introduction and download your free study guides.mp411.55MB
  • 01 - Introduction/002 Connect with me on Social media and the Udemy ratings system.mp412.13MB
  • 01 - Introduction/003 How to get the most out of my courses and the Udemy interface.mp429.24MB
  • 01 - Introduction/004 How to approach certification studying.mp426.5MB
  • 02 - Domain 1 Security Principles/001 Domain 1 - What we will be covering.mp410.44MB
  • 02 - Domain 1 Security Principles/002 The differences between Information Security, IT Security, and Cybersecurity.mp455.99MB
  • 02 - Domain 1 Security Principles/003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1.mp421.43MB
  • 02 - Domain 1 Security Principles/004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2.mp418.57MB
  • 02 - Domain 1 Security Principles/005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3.mp49.47MB
  • 02 - Domain 1 Security Principles/006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4.mp423.36MB
  • 02 - Domain 1 Security Principles/007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5.mp412.71MB
  • 02 - Domain 1 Security Principles/008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1.mp444.28MB
  • 02 - Domain 1 Security Principles/009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2.mp421.54MB
  • 02 - Domain 1 Security Principles/010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3.mp434.34MB
  • 02 - Domain 1 Security Principles/011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4.mp467.93MB
  • 02 - Domain 1 Security Principles/012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5.mp418.76MB
  • 02 - Domain 1 Security Principles/013 Privacy.mp416.11MB
  • 02 - Domain 1 Security Principles/014 Risk Management - part 1.mp412.94MB
  • 02 - Domain 1 Security Principles/015 Risk Management - part 2.mp430.33MB
  • 02 - Domain 1 Security Principles/016 Risk Management - part 3.mp426.77MB
  • 02 - Domain 1 Security Principles/017 Risk Management - part 4.mp430.8MB
  • 02 - Domain 1 Security Principles/018 Risk Management - part 5.mp447.26MB
  • 02 - Domain 1 Security Principles/019 Risk Management - part 6.mp424.03MB
  • 02 - Domain 1 Security Principles/020 Access Control Categories and Types - part 1.mp428.19MB
  • 02 - Domain 1 Security Principles/021 Access Control Categories and Types - part 2.mp439.31MB
  • 02 - Domain 1 Security Principles/022 The Ethics of your organizations and (ISC)2.mp417.73MB
  • 02 - Domain 1 Security Principles/023 Governance vs. Management.mp445.51MB
  • 02 - Domain 1 Security Principles/024 Laws and regulations - part 1.mp477.44MB
  • 02 - Domain 1 Security Principles/025 Laws and regulations - part 2.mp455.54MB
  • 02 - Domain 1 Security Principles/026 Security governance principles.mp460.3MB
  • 02 - Domain 1 Security Principles/027 What we covered in Domain 1.mp48.34MB
  • 03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/001 Domain 2 - What we will be covering.mp49.15MB
  • 03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/002 BCP - Business Continuity Planning - Part 1.mp440.19MB
  • 03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/003 BCP - Business Continuity Planning - Part 2.mp431.03MB
  • 03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/004 BCP - Business Continuity Planning - Part 3.mp445.47MB
  • 03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/005 DRP - Disaster Recovery Planning - Part 1.mp444.9MB
  • 03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/006 DRP - Disaster Recovery Planning - Part 2.mp437.65MB
  • 03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/007 DRP - Disaster Recovery Planning - Part 3.mp447.13MB
  • 03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/008 DRP - Disaster Recovery Planning - Part 4.mp464.44MB
  • 03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/009 Incidents Response - Part 1.mp435.9MB
  • 03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/010 Incidents Response - Part 2.mp428.47MB
  • 03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/011 Incidents Response - Part 3.mp418.5MB
  • 03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/012 Incidents Response - Part 4.mp423.22MB
  • 03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/013 Incidents Response - Part 5.mp444.03MB
  • 03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/014 What we covered in Domain 2.mp46.97MB
  • 04 - Domain 3 Access Controls Concepts/001 Domain 3 - What we will be covering.mp47.58MB
  • 04 - Domain 3 Access Controls Concepts/002 Physical Security - part 1.mp443.48MB
  • 04 - Domain 3 Access Controls Concepts/003 Physical Security - part 2.mp443.88MB
  • 04 - Domain 3 Access Controls Concepts/004 Physical Security - part 3.mp427.8MB
  • 04 - Domain 3 Access Controls Concepts/005 Physical Security - part 4.mp425.06MB
  • 04 - Domain 3 Access Controls Concepts/006 Physical Security - part 5.mp422.64MB
  • 04 - Domain 3 Access Controls Concepts/007 Logical Access Control - Part 1.mp427.12MB
  • 04 - Domain 3 Access Controls Concepts/008 Logical Access Control - Part 2.mp418.17MB
  • 04 - Domain 3 Access Controls Concepts/009 Logical Access Control - Part 3.mp478.46MB
  • 04 - Domain 3 Access Controls Concepts/010 Logical Access Control - Part 4.mp443.94MB
  • 04 - Domain 3 Access Controls Concepts/011 Logical Access Control - Part 5.mp481.13MB
  • 04 - Domain 3 Access Controls Concepts/012 What we covered in Domain 3.mp46.91MB
  • 05 - Domain 4 Network Security/001 Domain 4 - What we will be covering.mp48.24MB
  • 05 - Domain 4 Network Security/002 Network Basics and Definitions - Part 1.mp444.54MB
  • 05 - Domain 4 Network Security/003 Network Basics and Definitions - Part 2.mp438.86MB
  • 05 - Domain 4 Network Security/004 The OSI Model - Part 1.mp4100.95MB
  • 05 - Domain 4 Network Security/005 The OSI Model - Part 2.mp449.81MB
  • 05 - Domain 4 Network Security/006 The OSI Model - Part 3.mp456.88MB
  • 05 - Domain 4 Network Security/007 The TCPIP model.mp448.74MB
  • 05 - Domain 4 Network Security/008 IP addresses, port numbers, and MAC addresses - Part 1.mp445.83MB
  • 05 - Domain 4 Network Security/009 IP addresses, port numbers, and MAC addresses - Part 2.mp424.34MB
  • 05 - Domain 4 Network Security/010 IP addresses, port numbers, and MAC addresses - Part 3.mp420.89MB
  • 05 - Domain 4 Network Security/011 IP support protocols - Part 1.mp446.51MB
  • 05 - Domain 4 Network Security/012 IP support protocols - Part 2.mp433.89MB
  • 05 - Domain 4 Network Security/013 Cables - Part 1.mp422.32MB
  • 05 - Domain 4 Network Security/014 Cables - Part 2.mp445.97MB
  • 05 - Domain 4 Network Security/015 LAN topologies.mp426.23MB
  • 05 - Domain 4 Network Security/016 Wi-Fi.mp451.74MB
  • 05 - Domain 4 Network Security/017 Wireless networks - Part 1.mp420.06MB
  • 05 - Domain 4 Network Security/018 Wireless networks - Part 2.mp440.54MB
  • 05 - Domain 4 Network Security/019 VLANs and Routers - Part 1.mp441.41MB
  • 05 - Domain 4 Network Security/020 VLANs and Routers - Part 2.mp442.52MB
  • 05 - Domain 4 Network Security/021 VPNs, NAC, and third-party connectivity.mp449.27MB
  • 05 - Domain 4 Network Security/022 SDN, SD-WAN, and SDX.mp437.67MB
  • 05 - Domain 4 Network Security/023 Attacks and attackers - Part 1.mp429.25MB
  • 05 - Domain 4 Network Security/024 Attacks and attackers - Part 2.mp437.67MB
  • 05 - Domain 4 Network Security/025 Attacks and attackers - Part 3.mp464.59MB
  • 05 - Domain 4 Network Security/026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1.mp426.55MB
  • 05 - Domain 4 Network Security/027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2.mp435.91MB
  • 05 - Domain 4 Network Security/028 SIEM and SOAR systems.mp426.21MB
  • 05 - Domain 4 Network Security/029 Honeynets and Honeypots.mp410.89MB
  • 05 - Domain 4 Network Security/030 Firewalls - Part 1.mp428.95MB
  • 05 - Domain 4 Network Security/031 Firewalls - Part 2.mp434.78MB
  • 05 - Domain 4 Network Security/032 0-day attacks and exploits.mp456.09MB
  • 05 - Domain 4 Network Security/033 Vulnerability Scanning.mp416.41MB
  • 05 - Domain 4 Network Security/034 Virtualization, Cloud, and Distributed Computing - Part 1.mp429.24MB
  • 05 - Domain 4 Network Security/035 Virtualization, Cloud, and Distributed Computing - Part 2.mp426.52MB
  • 05 - Domain 4 Network Security/036 Virtualization, Cloud, and Distributed Computing - Part 3.mp421.58MB
  • 05 - Domain 4 Network Security/037 Virtualization, Cloud, and Distributed Computing - Part 4.mp458.58MB
  • 05 - Domain 4 Network Security/038 Virtualization, Cloud, and Distributed Computing - Part 5.mp487.42MB
  • 05 - Domain 4 Network Security/039 The Internet of Things (IoT).mp419.93MB
  • 05 - Domain 4 Network Security/040 Asset tracking and hardware hardening.mp424.47MB
  • 05 - Domain 4 Network Security/041 Electricity.mp458.2MB
  • 05 - Domain 4 Network Security/042 Backups - Part 1.mp433.52MB
  • 05 - Domain 4 Network Security/043 Backups - Part 2.mp430.14MB
  • 05 - Domain 4 Network Security/044 Fault tolerance, redundancy, and resiliency - Part 1.mp419.65MB
  • 05 - Domain 4 Network Security/045 Fault tolerance, redundancy, and resiliency - Part 2.mp422.04MB
  • 05 - Domain 4 Network Security/046 Fault tolerance, redundancy, and resiliency - Part 3.mp423.09MB
  • 05 - Domain 4 Network Security/047 Fire suppression - Part 1.mp418.61MB
  • 05 - Domain 4 Network Security/048 Fire suppression - Part 2.mp430.38MB
  • 05 - Domain 4 Network Security/049 Secure design principles - Part 1.mp457.32MB
  • 05 - Domain 4 Network Security/050 Secure design principles - Part 2.mp436.04MB
  • 05 - Domain 4 Network Security/051 What we covered in Domain 4.mp47.43MB
  • 06 - Domain 5 Security Operations/001 Domain 5 - What we will be covering.mp46.41MB
  • 06 - Domain 5 Security Operations/002 Configuration Management.mp415.25MB
  • 06 - Domain 5 Security Operations/003 Patch Management.mp428.32MB
  • 06 - Domain 5 Security Operations/004 Change Management.mp442.65MB
  • 06 - Domain 5 Security Operations/005 Cryptography - Part 1.mp431.71MB
  • 06 - Domain 5 Security Operations/006 Cryptography - Part 2.mp451.12MB
  • 06 - Domain 5 Security Operations/007 Cryptography - Part 3.mp432.74MB
  • 06 - Domain 5 Security Operations/008 Hashing.mp419MB
  • 06 - Domain 5 Security Operations/009 Attacks on our cryptography.mp427.86MB
  • 06 - Domain 5 Security Operations/010 Data handling, data storage and data retention - Part 1.mp456.9MB
  • 06 - Domain 5 Security Operations/011 Data handling, data storage and data retention - Part 2.mp439.16MB
  • 06 - Domain 5 Security Operations/012 Data handling, data storage and data retention - Part 3.mp428.28MB
  • 06 - Domain 5 Security Operations/013 Administrative (Directive) Controls.mp487.94MB
  • 06 - Domain 5 Security Operations/014 Training and awareness.mp428.09MB
  • 06 - Domain 5 Security Operations/015 Social Engineering attacks - Part 1.mp431.51MB
  • 06 - Domain 5 Security Operations/016 Social Engineering attacks - Part 2.mp441.6MB
  • 06 - Domain 5 Security Operations/017 What we covered in Domain 5.mp48.47MB
  • 07 - Domain recaps/001 Domain 1 recap Certified in Cybersecurity (CC).mp4120.29MB
  • 07 - Domain recaps/002 Domain 2 recap Certified in Cybersecurity (CC).mp487.58MB
  • 07 - Domain recaps/003 Domain 3 recap Certified in Cybersecurity (CC).mp488.62MB
  • 07 - Domain recaps/004 Domain 4 recap Certified in Cybersecurity (CC).mp4408.01MB
  • 07 - Domain recaps/005 Domain 5 recap Certified in Cybersecurity (CC).mp4161.52MB
  • 08 - The study process, material, tips, tricks and practice tests!/001 Why you should want to get Certified in Cybersecurity.mp418.05MB
  • 08 - The study process, material, tips, tricks and practice tests!/002 Scheduling your exam and what to expect.mp442.74MB
  • 08 - The study process, material, tips, tricks and practice tests!/003 What to expect on exam day and after.mp433.22MB
  • 08 - The study process, material, tips, tricks and practice tests!/004 I passed the exam now what.mp420.3MB
  • 08 - The study process, material, tips, tricks and practice tests!/005 I failed the exam now what.mp424.49MB
  • 08 - The study process, material, tips, tricks and practice tests!/006 How to approach practice questions.mp4118.51MB
  • 08 - The study process, material, tips, tricks and practice tests!/007 How to design your career and certification path.mp474.37MB