Language:
LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL
Download from Usenet.nl
Lista de arquivos
01. Introduction/01_01-Welcome.mp4 6.21 MB
01. Introduction/01_02-What you should know.mp4 1.95 MB
02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 13.94 MB
02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 13.64 MB
02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 12.53 MB
02. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.04 MB
02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 9.84 MB
02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 8.83 MB
02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 7.76 MB
03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 12.86 MB
03. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.04 MB
03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.46 MB
03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.37 MB
03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.34 MB
03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 8.61 MB
03. Cybersecurity Threats/03_08-Exploring ransomware.mp4 8.01 MB
03. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 7.71 MB
04. Security Architecture/04_04-Managing user access and identity.mp4 19.71 MB
04. Security Architecture/04_05-Implementing preventative security.mp4 17.89 MB
04. Security Architecture/04_06-Monitoring and alerts.mp4 14.95 MB
04. Security Architecture/04_01-Describing security requirements.mp4 14.21 MB
04. Security Architecture/04_02-Architecting security risk.mp4 12.86 MB
04. Security Architecture/04_03-Selecting security controls.mp4 8.14 MB
05. Incident Management/05_02-Preparing for an incident.mp4 13.53 MB
05. Incident Management/05_03-Responding to an incident.mp4 10.95 MB
05. Incident Management/05_01-Managing incident response.mp4 8.11 MB
06. Conclusion/06_01-Next steps.mp4 3.44 MB
Relacionados
LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL.mp4 286.92 MB
LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL.mp4 286.92 MB
LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL.mp4 286.92 MB
LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL.mp4 286.92 MB
LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL.mp4 664.67 MB
Quem somos : Nós somos um motor de busca de recurso DHT baseado no protocolo Torrents, todos os recursos vêm de rastreador da web do DHT por 24 horas. Todos os dados é gerado automaticamente pelo programa. Nós não armazenamos qualquer arquivos de Torrents, só para indexar as informações de meta de Torrents e prestação de serviços de pesquisa e recursos.
Magnet Link É uma nova forma de partilha, cada link correspondente para um arquivo de sementes BT. Você pode baixar no link magnético para recursos através de software, tais como µTorrent
Magnet Links & Torrents © 2010-2018 Privacy policy - DMCA Policy - Contact Us
简体中文 繁體中文 हिन्दी Español العربية Русский Indonesia Portuguese Italiano Deutsch Français 日本語 Tiếng Việt 한국어 ภาษาไทย Türkçe Polski Magyar Svenska Melayu Română Nederlands Čeština