磁力链接

magnet:?xt=urn:btih:1B22BA022C8529C64FC7498E5DAF3D3E611BF334
推荐使用PIKPAK网盘下载资源,PIKPAK是目前最好用网盘,10T超大空间,不和谐任何资源,支持无限次数离线下载,视频在线观看

资源截图

API Integration

文件列表

  • learning_videos/32 - Outage Impact and Estimating Downtime Terms.mp4 94.7 MB
  • learning_videos/172 - Identifying and Communicating Security Requirements.mp4 93.0 MB
  • learning_videos/40 - Data Recovery-Storage and Backup Schemes.mp4 83.8 MB
  • learning_videos/79 - Hashing Algorithms.mp4 79.2 MB
  • learning_videos/83 - Symmetric Algorithms.mp4 74.5 MB
  • learning_videos/89 - Cryptographic Attacks.mp4 70.6 MB
  • learning_videos/176 - Web-Video Conferencing-Instant Messaging.mp4 69.2 MB
  • learning_videos/117 - Network Device Accessibility and Security.mp4 68.7 MB
  • learning_videos/86 - Public Key Infrastructure.mp4 67.7 MB
  • learning_videos/30 - Legal Compliance Part2.mp4 67.2 MB
  • learning_videos/189 - System Development Life Cycle.mp4 60.9 MB
  • learning_videos/39 - E-Discovery and Data Retention Policies.mp4 60.8 MB
  • learning_videos/81 - Cryptographic Concepts.mp4 59.9 MB
  • learning_videos/44 - Incident Response Guidelines.mp4 59.8 MB
  • learning_videos/104 - Remote Access Protocols.mp4 57.8 MB
  • learning_videos/71 - Passive Reconnaissance Tools.mp4 57.0 MB
  • learning_videos/29 - Legal Compliance Part1.mp4 55.7 MB
  • learning_videos/100 - Secure Storage Management Techniques.mp4 53.5 MB
  • learning_videos/188 - End to End Solution Ownership.mp4 53.3 MB
  • learning_videos/108 - Security Devices.mp4 52.3 MB
  • learning_videos/31 - Security Policy Business Documents.mp4 52.3 MB
  • learning_videos/114 - Availability Controls-Terms and Techniques.mp4 49.5 MB
  • learning_videos/93 - Cloud Storage.mp4 47.9 MB
  • learning_videos/88 - Des Modes.mp4 47.5 MB
  • learning_videos/182 - Remote Access and IPsec.mp4 46.9 MB
  • learning_videos/15 - Worst Case Scenario Planning.mp4 46.7 MB
  • learning_videos/52 - Situational Awareness and Vulnerability Assessments.mp4 45.7 MB
  • learning_videos/106 - Network Authentication Methods.mp4 45.2 MB
  • learning_videos/105 - IPv6 and Transport Encryption.mp4 43.9 MB
  • learning_videos/13 - Implementing Technical Controls.mp4 43.1 MB
  • learning_videos/186 - WLAN Security and Attacks.mp4 42.9 MB
  • learning_videos/109 - Network Devices.mp4 42.1 MB
  • learning_videos/144 - Software Development Methods.mp4 41.8 MB
  • learning_videos/27 - Policy Development Updates.mp4 41.2 MB
  • learning_videos/84 - Asymmetric Algorithms.mp4 41.1 MB
  • learning_videos/120 - Endpoint Security Software and Data Loss Prevention.mp4 39.7 MB
  • learning_videos/156 - Enterprise Application Integration Enablers.mp4 39.6 MB
  • learning_videos/125 - Configuring and Managing Interface Security.mp4 39.1 MB
  • learning_videos/73 - Memory Dumping and Penetration Testing.mp4 37.6 MB
  • learning_videos/34 - Incident Response Process.mp4 37.5 MB
  • learning_videos/141 - Buffer Overflow and other Application Issues.mp4 37.1 MB
  • learning_videos/123 - Standard Operating Environment and Group Policy Security.mp4 36.8 MB
  • learning_videos/161 - Biometrics.mp4 36.3 MB
  • learning_videos/46 - Media-Software and Network Analysis.mp4 35.9 MB
  • learning_videos/159 - Password Types-Management and Policies.mp4 35.4 MB
  • learning_videos/185 - WLAN Concepts-Terms-Standards.mp4 35.3 MB
  • learning_videos/17 - Return Of Investment.mp4 35.1 MB
  • learning_videos/113 - Network Security Solutions.mp4 35.1 MB
  • learning_videos/82 - Transport Encryption Protocol.mp4 35.1 MB
  • learning_videos/33 - Sensitive Information-Internal Security Policies.mp4 35.0 MB
  • learning_videos/146 - Browser Extensions and Other Web Development Techniques.mp4 34.2 MB
  • learning_videos/152 - Cloud and Virtualization Models.mp4 34.1 MB
  • learning_videos/126 - USB-Bluetooth-Firewire Restrictions and Security.mp4 33.5 MB
  • learning_videos/85 - Hybrid Encryption and Digital Signatures.mp4 33.0 MB
  • learning_videos/179 - Email Messaging Protocol.mp4 32.8 MB
  • learning_videos/50 - Security Practices.mp4 32.2 MB
  • learning_videos/110 - Firewalls.mp4 31.3 MB
  • learning_videos/78 - Cryptographic Benefits and Techniques.mp4 31.1 MB
  • learning_videos/36 - Employment and Termination Procedures.mp4 31.1 MB
  • learning_videos/115 - Advanced Router and Switch Configuration.mp4 30.7 MB
  • learning_videos/129 - Cloud Security Services.mp4 30.2 MB
  • learning_videos/102 - Replication and Encryption Methods.mp4 29.7 MB
  • learning_videos/183 - Mobile and Personal Device Management.mp4 29.6 MB
  • learning_videos/164 - Access Control Models and Open Authorization.mp4 29.3 MB
  • learning_videos/53 - Researching Security Implications.mp4 29.3 MB
  • learning_videos/177 - Desktop Sharing.mp4 29.0 MB
  • learning_videos/68 - Protocol Analyzer- Network Enumerator-Password Cracker.mp4 28.5 MB
  • learning_videos/21 - Security Architecture Frameworks.mp4 28.4 MB
  • learning_videos/184 - Over Air Technology Concerns.mp4 28.3 MB
  • learning_videos/16 - Calculation Tools and Attacker Motivation.mp4 28.1 MB
  • learning_videos/18 - Total Cost of Ownership and Risk Strategies.mp4 28.1 MB
  • learning_videos/180 - Telephony-VoIP and Social Media.mp4 27.5 MB
  • learning_videos/76 - Social Engineering.mp4 26.5 MB
  • learning_videos/130 - Boot Loader Protections.mp4 26.3 MB
  • learning_videos/67 - Port Scanners and Vulnerability Scanners.mp4 25.7 MB
  • learning_videos/181 - Cloud Based Collaboration.mp4 25.4 MB
  • learning_videos/98 - Storage Protocols and Fiber Channel over Ethernet (FCoE).mp4 25.3 MB
  • learning_videos/137 - Specific Application Issues.mp4 25.2 MB
  • learning_videos/148 - Securing Data Flows.mp4 25.1 MB
  • learning_videos/45 - Incident and Emergency Response.mp4 24.9 MB
  • learning_videos/154 - Secure Infrastructure Design.mp4 24.4 MB
  • learning_videos/190 - Security Implications of Software Development Methodologies.mp4 24.3 MB
  • learning_videos/24 - Security Policies.mp4 24.1 MB
  • learning_videos/127 - Full Disk Encryption.mp4 23.9 MB
  • learning_videos/139 - Input Validation.mp4 23.8 MB
  • learning_videos/122 - Log Monitoring and Host Hardening.mp4 23.8 MB
  • learning_videos/92 - Virtual Storage Types and Challenges.mp4 23.3 MB
  • learning_videos/119 - Trusted Operation Systems.mp4 23.0 MB
  • learning_videos/90 - Strength vs Performance and Cryptographic Implementations.mp4 23.0 MB
  • learning_videos/169 - OpenID-Shibboleth and WAYF.mp4 22.9 MB
  • learning_videos/145 - Monitoring Mechanisms and Client-Server Side Processing.mp4 22.5 MB
  • learning_videos/107 - 802.1x and Mesh Networks.mp4 22.1 MB
  • learning_videos/142 - Application Security Framework.mp4 22.1 MB
  • learning_videos/59 - Benchmarks and Baselines.mp4 22.1 MB
  • learning_videos/140 - Web Vulnerabilities and Input Mitigation Issues.mp4 22.0 MB
  • learning_videos/62 - Metrics Collection and Trend Data.mp4 21.6 MB
  • learning_videos/60 - Prototyping and Testing Multiple Solutions.mp4 21.4 MB
  • learning_videos/101 - LUN Masking_Mapping and HBA Allocation.mp4 21.2 MB
  • learning_videos/96 - Storage Area Networks (SANs) and (VSANs).mp4 21.1 MB
  • learning_videos/128 - Virtualization Security.mp4 21.0 MB
  • learning_videos/168 - Federation and Security Assertion Markup Language (SAML).mp4 21.0 MB
  • learning_videos/28 - Developing Processes and Procedures.mp4 20.8 MB
  • learning_videos/69 - Fuzzers and HTTP Interceptors.mp4 20.6 MB
  • learning_videos/64 - Security Solutions Business Needs.mp4 20.2 MB
  • learning_videos/167 - Attestation and Identity Propagation.mp4 20.1 MB
  • learning_videos/20 - Identifying Vulnerabilities and Threats.mp4 20.0 MB
  • learning_videos/165 - Extensible Access Control Markup Language (XACML).mp4 20.0 MB
  • learning_videos/35 - Forensic Tasks.mp4 19.9 MB
  • learning_videos/55 - Threat Actors.mp4 19.9 MB
  • learning_videos/12 - Information Life Cycle and Steak-Holder Input.mp4 19.9 MB
  • learning_videos/95 - Data Archiving.mp4 19.8 MB
  • learning_videos/178 - Presence Guidelines.mp4 19.6 MB
  • learning_videos/111 - Wireless Controllers.mp4 19.4 MB
  • learning_videos/94 - Data Warehousing.mp4 18.9 MB
  • learning_videos/158 - Authentication and Identity Management.mp4 18.8 MB
  • learning_videos/11 - Business Classifications.mp4 18.8 MB
  • learning_videos/07 - Internal and External Influences.mp4 18.8 MB
  • learning_videos/132 - Virtual Desktop Infrastructure.mp4 18.8 MB
  • learning_videos/37 - Network Auditing.mp4 18.6 MB
  • learning_videos/72 - Vulnerability Assessments and Malware Sandboxing.mp4 18.5 MB
  • learning_videos/149 - Standards Concepts.mp4 18.3 MB
  • learning_videos/70 - Exploitation Tools.mp4 18.2 MB
  • learning_videos/74 - Reconnaissance and Fingerprinting.mp4 17.9 MB
  • learning_videos/80 - Message Authentication Code.mp4 17.4 MB
  • learning_videos/14 - Determine Aggregate CIA Score.mp4 17.3 MB
  • learning_videos/22 - Business Continuity Planning.mp4 17.1 MB
  • learning_videos/112 - Router Security and Port Numbers.mp4 17.0 MB
  • learning_videos/162 - Dual-Multi Factor and Certificate Authentication.mp4 16.8 MB
  • learning_videos/150 - Interoperability Issues.mp4 16.8 MB
  • learning_videos/63 - Security Controls-Reverse Engineering and Deconstructing.mp4 16.4 MB
  • learning_videos/134 - Virtual TPM.mp4 16.3 MB
  • learning_videos/41 - Data Owner and Data Handling.mp4 16.1 MB
  • learning_videos/87 - Digital Certificate Classes and Cypher Types.mp4 16.1 MB
  • learning_videos/99 - Storage Network File Systems.mp4 15.8 MB
  • learning_videos/75 - Code Review.mp4 15.6 MB
  • learning_videos/06 - Third Party Information Security and Providers.mp4 15.6 MB
  • learning_videos/23 - IT Governance.mp4 14.6 MB
  • learning_videos/19 - Risk Management Process.mp4 14.1 MB
  • learning_videos/42 - Disposal Terms and Concepts.mp4 13.9 MB
  • learning_videos/138 - Session Management.mp4 13.6 MB
  • learning_videos/43 - Data Breach and Data Analysis.mp4 13.3 MB
  • learning_videos/191 - Asset Management.mp4 13.3 MB
  • learning_videos/97 - Network Attached Storage (NAS).mp4 13.2 MB
  • learning_videos/65 - Lesson Learned- After Action Report.mp4 12.9 MB
  • learning_videos/10 - CIA Triad.mp4 12.6 MB
  • learning_videos/04 - Business Model Strategies.mp4 12.6 MB
  • learning_videos/170 - Advanced Trust Models.mp4 12.4 MB
  • learning_videos/54 - Global Industry Security Response.mp4 12.2 MB
  • learning_videos/131 - Virtual Host Vulnerabilities.mp4 11.9 MB
  • learning_videos/143 - Web Service Security and Secure Coding Standards.mp4 11.8 MB
  • learning_videos/136 - Web Application Security Design.mp4 11.3 MB
  • learning_videos/116 - Data Flow Enforcement of Applications and Networks.mp4 11.3 MB
  • learning_videos/47 - Order of Volatility.mp4 10.9 MB
  • learning_videos/03 - Risk Management.mp4 10.7 MB
  • learning_videos/56 - Contract Security Requirements.mp4 10.7 MB
  • learning_videos/49 - Performing Ongoing Research.mp4 10.5 MB
  • learning_videos/160 - Authentication Factors.mp4 10.2 MB
  • learning_videos/163 - Single Sign On Issues.mp4 9.7 MB
  • learning_videos/173 - Security Controls Recommendations.mp4 9.6 MB
  • learning_videos/61 - Cost_Benefit Analysis.mp4 9.6 MB
  • learning_videos/57 - Contract Documents.mp4 9.5 MB
  • learning_videos/121 - Host Based Firewalls.mp4 9.1 MB
  • learning_videos/51 - Evolution of Technology.mp4 8.6 MB
  • learning_videos/166 - Service Provisioning Markup Language (SPML).mp4 8.5 MB
  • learning_videos/08 - Impact of De-Perimeterization.mp4 8.4 MB
  • learning_videos/151 - In House Commercial and Customized Applications.mp4 8.4 MB
  • learning_videos/155 - Storage Integration Security.mp4 7.5 MB
  • learning_videos/153 - Logical and Physical Deployment Diagrams.mp4 7.3 MB
  • learning_videos/124 - Command Shell Restrictions.mp4 7.2 MB
  • learning_videos/135 - Application Vulnerabilities and Security Controls.mp4 7.1 MB
  • learning_videos/66 - Assessment Tools and Methods.mp4 6.9 MB
  • learning_videos/48 - Industry Trends Overview.mp4 6.8 MB
  • learning_videos/05 - Integrating Diverse Industries.mp4 6.2 MB
  • learning_videos/118 - Security Controls for Hosts.mp4 6.2 MB
  • learning_videos/91 - Enterprise Storage.mp4 6.2 MB
  • learning_videos/103 - Network and Security Components-Concepts-Security Architectures.mp4 6.1 MB
  • learning_videos/175 - Secure Communication and Collaboration.mp4 5.9 MB
  • learning_videos/25 - Security-Privacy Policies and Procedures Part1.mp4 5.8 MB
  • learning_videos/187 - Security Across the Technology Life Cycle.mp4 5.6 MB
  • learning_videos/174 - Secure Solutions Collaboration.mp4 5.5 MB
  • learning_videos/77 - Social Cryptographic Concepts and Techniques.mp4 5.4 MB
  • learning_videos/58 - Securing the Enterprise Overview.mp4 5.4 MB
  • learning_videos/01 - Course Introduction.mp4 5.1 MB
  • learning_videos/157 - Authentication and Authorization Technologies.mp4 4.9 MB
  • learning_videos/147 - Host-Storage-Network and Application Integration.mp4 4.8 MB
  • learning_videos/02 - Business Influences and Associated Security Risks.mp4 4.7 MB
  • learning_videos/171 - Business Unit Collaboration.mp4 4.7 MB
  • learning_videos/38 - Incident Response and Recovery Procedures.mp4 4.2 MB
  • learning_videos/09 - Risk Mitigation Planning - Strategies and Controls.mp4 3.8 MB
  • learning_videos/133 - Terminal Services.mp4 3.8 MB
  • learning_videos/26 - Security-Privacy Policies and Procedures Part2.mp4 3.6 MB
  • learning_videos/192 - Course End.mp4 2.1 MB
  • Приватные видеокурсы.pdf 356.7 kB
  • Packt – CompTIA Advanced Security Practitioner (CASP) description.pdf 214.4 kB
  • Это очень важно!.txt 769 Bytes

温馨提示

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!