磁力链接

magnet:?xt=urn:btih:65AF2D40D44C1659F1274868C376666E7D7AFF41
推荐使用PIKPAK网盘下载资源,PIKPAK是目前最好用网盘,10T超大空间,不和谐任何资源,支持无限次数离线下载,视频在线观看

资源截图

API Integration

文件列表

  • comptia-caspplus003_0.zip 301.1 MB
  • 1.52 - Risk Management Documentation BCP.mp4 212.0 MB
  • 10.22 - Technical Deployment Models What is Cloud.mp4 198.6 MB
  • 5.13 - Digital Signatures.mp4 178.1 MB
  • 6.23 - Full Disk Encryption.mp4 168.9 MB
  • 10.11 - Integrate Best Practices in Enterprise Security.mp4 166.4 MB
  • 12.11 - Concepts and Vocabulary.mp4 162.9 MB
  • 11.291 - Log Analysis in Kali grep and cut.mp4 159.9 MB
  • 1.55 - Risk Management Documentation Documents.mp4 155.9 MB
  • 11.25 - Password Cracker John the Ripper.mp4 155.1 MB
  • 3.21 - Analyze Scenarios to Secure the Enterprise.mp4 154.7 MB
  • 7.23 - Concepts and Vocabulary Part 2.mp4 153.3 MB
  • 10.31 - Cloud Security Services in the Enterprise.mp4 151.4 MB
  • 6.11 - Host Concepts and Vocabulary.mp4 149.4 MB
  • 1.54 - Risk Management Documentation Downtime.mp4 148.5 MB
  • 1.42 - Risk Mitigation What are the CVSS and CVE.mp4 148.1 MB
  • 5.18 - Cryptography Concepts.mp4 147.2 MB
  • 1.41 - Risk Mitigation What is a Aggregate CIA Score.mp4 146.6 MB
  • 11.28 - Exploitation Framework Social Engineer Toolkit.mp4 145.5 MB
  • 6.15 - What is a Trusted OS.mp4 144.9 MB
  • 11.12 - Security Assessments Application Code Review.mp4 143.4 MB
  • 10.68 - Hands on With DNSSEC.mp4 142.6 MB
  • 11.16 - Software Testing Types Part 2.mp4 141.8 MB
  • 7.11 - Mobile Deployment Models.mp4 141.7 MB
  • 6.16 - Types of Security Models.mp4 141.6 MB
  • 4.31 - Authentication and Authorization Key Points.mp4 139.9 MB
  • 12.292 - Conducting Forensic Analysis with Autopsy.mp4 139.5 MB
  • 10.66 - DNSSEC Zone Transfers and TSIG Part 2.mp4 138.4 MB
  • 12.24 - Types of Evidence.mp4 138.1 MB
  • 11.23 - Protocol Analyzer Wireshark.mp4 137.3 MB
  • 1.13 - Begin at the Beginning Availability.mp4 137.1 MB
  • 4.194 - Hands On Establishing Peer Trusts.mp4 136.7 MB
  • 4.19 - Trusts Models and Kerberos.mp4 135.5 MB
  • 10.69 - Enterprise Applications Configuration Management.mp4 134.6 MB
  • 10.64 - Enterprise Applications Hands on with DNS RRs.mp4 134.1 MB
  • 4.192 - Trust Models and Kerberos Part 2.mp4 134.1 MB
  • 11.21 - Vulnerability Scanner Nikto.mp4 133.7 MB
  • 11.191 - Security Assessments Review Questions.mp4 132.9 MB
  • 12.12 - Incident Response Facilitators.mp4 131.8 MB
  • 10.55 - Data Security Review Questions.mp4 131.4 MB
  • 12.14 - e-Discovery.mp4 130.7 MB
  • 1.53 Risk Management Documentation What is a BIA.mp4 130.0 MB
  • 1.22 - Governance and Risk Management Risk Vocabulary.mp4 129.3 MB
  • 5.19 - Stream vs Block Ciphers.mp4 129.2 MB
  • 12.21 - What is COOP.mp4 128.5 MB
  • 10.71 - Integrating Assets Key Points.mp4 128.3 MB
  • 1.31 - Assess Risks What is a Security Framework.mp4 128.0 MB
  • 10.67 - DNSSEC Zone Transfers and TSIG Part 3.mp4 128.0 MB
  • 1.32 - Assess Risks ESA Framework Assessment Process.mp4 127.8 MB
  • 10.51 - Data Security Owners Processors and Sovereignty.mp4 126.9 MB
  • 1.21 - Governance and Risk Management Overview.mp4 126.2 MB
  • 12.23 - Evidence Collection and Handling.mp4 125.8 MB
  • 8.51 - Implementing Network Security - Key Points.mp4 125.8 MB
  • 11.26 - Using a Fuzzer in Kali Linux.mp4 125.7 MB
  • 1.24 - Governance and Risk Management Risk Analysis.mp4 125.0 MB
  • 10.42 - Secure Design Vocabulary and Concepts Part 2.mp4 124.1 MB
  • 11.13 - Going Deeper Vulnerability Scanning.mp4 123.8 MB
  • 5.12 - Hashing.mp4 123.1 MB
  • 10.41 - Secure Design Vocabulary and Concepts.mp4 122.1 MB
  • 12.13 - Incident Response Facilitators Part 2.mp4 121.8 MB
  • 12.22 - CSIRTs and Common Tools.mp4 121.2 MB
  • 7.12 - MDM Concepts and Vocabulary.mp4 120.8 MB
  • 10.62 - Enterprise Applications Directory Svcs DNS.mp4 120.8 MB
  • 11.27 - HTTP Interceptor Burp Suite.mp4 120.6 MB
  • 4.21 - Advanced Identity Concepts and Vocabulary.mp4 120.3 MB
  • 10.65 - DNSSEC Zone Transfers and TSIGs.mp4 119.9 MB
  • 6.17 - Bell-LaPadula.mp4 118.1 MB
  • 1.51 - Risk Management Documentation Best Practices.mp4 118.1 MB
  • 12.31 - Responding to Incidents Key Points.mp4 118.0 MB
  • 10.61 - Enterprise Applications What are They.mp4 117.9 MB
  • 10.63 - Enterprise Applications Directory Svsc DNS Pt.2.mp4 116.2 MB
  • 6.22 - Peripherals.mp4 116.1 MB
  • 11.293 - Reverse Engineering strace.mp4 115.7 MB
  • 11.11 - Security Assessments Types.mp4 114.9 MB
  • 9.32 - What is Session.mp4 113.9 MB
  • 11.22 - Port Scanner Zenmap.mp4 113.1 MB
  • 4.12 - Authentication Factors and Controls.mp4 112.3 MB
  • 6.31 - Virtualization Concepts and Vocabulary.mp4 111.4 MB
  • 1.35 - Assess Risks Guidelines for Assessing Risk.mp4 111.2 MB
  • 1.34 - Assess Risks Risk Determination.mp4 110.5 MB
  • 6.24 - Hands on Hardening Windows Hosts, AppLocker.mp4 109.1 MB
  • 11.24 - Network Enumerator Zenmap.mp4 108.2 MB
  • 12.28 - Forensic Analysis of Compromised Systems.mp4 107.6 MB
  • 9.51 - Implementing Security in the SDLC Key Points.mp4 107.0 MB
  • 6.18 - Biba.mp4 106.9 MB
  • 9.31 - What is SQL Injection.mp4 106.6 MB
  • 4.11 - Authentication and Access Control.mp4 106.4 MB
  • 6.51 - Implementing Security Controls Hosts Key Points.mp4 106.4 MB
  • 11.14 - Going Deeper Testing Software.mp4 106.3 MB
  • 7.22 - Concepts and Vocabulary.mp4 106.0 MB
  • 4.22 - Identity Federation Methods.mp4 105.6 MB
  • 10.43 - Secure Design Review Questions.mp4 105.3 MB
  • 10.53 - Data Security Data Remanence.mp4 105.2 MB
  • 6.192 - Role-Based Access Control RBAC.mp4 105.1 MB
  • 7.31 - Security Controls for Mobile Devices Key Points.mp4 104.8 MB
  • 2.11 - Collaboration GRC and Controls.mp4 104.3 MB
  • 3.11 - Research and Analysis Industry Trends.mp4 103.7 MB
  • 8.32 - Network Authentication.mp4 102.9 MB
  • 8.44 - Network Device Configurations.mp4 102.6 MB
  • 8.11 - IDSs vs IPSs casp.mp4 102.6 MB
  • 5.15 - Hands on Configuring a Blockchain.mp4 102.1 MB
  • 9.17 - What about Validation and Acceptance Testing.mp4 102.0 MB
  • 3.31 - Using Research and Analysis Key Points.mp4 101.0 MB
  • 11.17 - Logs Memory and Debugging.mp4 101.0 MB
  • 4.15 - Deep Dive RADIUS.mp4 99.6 MB
  • 6.32 - Common VM Vulnerabilities.mp4 99.3 MB
  • 11.18 - Social Engineering.mp4 99.0 MB
  • 10.21 - Technical Deployment Models What is a Model.mp4 98.8 MB
  • 2.12 - Collaboration What is an SCA.mp4 98.8 MB
  • 9.42 - Input Validation Fuzzing Application Sandboxing.mp4 98.2 MB
  • 1.12 - Begin at the Beginning Integrity.mp4 98.2 MB
  • 1.11 - Begin at the Beginning Confidentiality.mp4 97.6 MB
  • 5.17 - Public Key Infrastructure PKI Concepts.mp4 97.6 MB
  • 6.193 - Other Access Control Models.mp4 97.1 MB
  • 6.194 - Endpoint Security.mp4 97.0 MB
  • 8.13 - Network Security Concepts and Vocabulary.mp4 96.9 MB
  • 7.21 - Storage.mp4 96.7 MB
  • 4.17 - What is Authorization OAuth2.0.mp4 96.7 MB
  • 8.21 - SoC, BASs, ICS and SCADA.mp4 96.2 MB
  • 12.29 - What is the Order of Volatility.mp4 96.1 MB
  • 11.31 - Conducting Security Assessments Key Points.mp4 95.7 MB
  • 9.35 - What about Clickjacking and Cookie Hijacking.mp4 94.8 MB
  • 8.42 - VLANS and Network Data Flow.mp4 93.1 MB
  • 8.33 - Network Topologies and SDN.mp4 92.1 MB
  • 8.31 - Remote Access and IPv6.mp4 91.9 MB
  • 4.195 - Authentication and Authorization Review Questions.mp4 91.6 MB
  • 11.291 - OpenSCAP.mp4 91.2 MB
  • 5.31 - Implementing Cryptographic Techniques Key Points.mp4 90.9 MB
  • 6.21 - Hardening Hosts Concepts and Vocabulary.mp4 90.8 MB
  • 5.14 - Blockchain and Bitcoin.mp4 90.5 MB
  • 5.11 - Encryption.mp4 90.1 MB
  • 3.13 - Research and Analysis Requirements for Contracts.mp4 89.6 MB
  • 8.46 - Hands on Implementing Network Monitoring ntopng.mp4 88.4 MB
  • 6.12 - Product Evaluation Models TCSEC.mp4 87.8 MB
  • 10.692 - Enterprise Applications Review Questions.mp4 86.9 MB
  • 5.21 - Implement Cryptography.mp4 86.6 MB
  • 2.21 - Collaboration Solutions.mp4 86.5 MB
  • 6.191 - Access Control Concepts.mp4 85.5 MB
  • 1.43 - Risk Mitigation Risk Responses.mp4 85.5 MB
  • 4.18 - What is XACML.mp4 85.3 MB
  • 12.26 - Principles of Criminalistics.mp4 85.1 MB
  • 3.12 - Research and Analysis Artificial Intelligence.mp4 84.0 MB
  • 5.16 - Public Key Infrastructure PKI Design.mp4 83.6 MB
  • 11.19 - OSINT Self Assessments and Teaming.mp4 83.5 MB
  • 12.15 - Incident Response Review Questions.mp4 82.8 MB
  • 9.13 - What are the SDLC Phases.mp4 82.6 MB
  • 7.13 - MDM Concepts and Vocabulary Part 2.mp4 81.9 MB
  • 8.14 - Hands-On Deploy Network Security Platform OPNsense.mp4 81.2 MB
  • 8.41 - Network Security Controls Concepts Vocabulary.mp4 81.2 MB
  • 1.23 - Governance and Risk Management Risk Management.mp4 80.7 MB
  • 9.34 - Cross-Site Request Forgery XSRF CSRF Attack.mp4 79.5 MB
  • 6.41 - Boot Loader Concepts and Vocabulary.mp4 79.0 MB
  • 8.45 - NAC and Alerting.mp4 78.7 MB
  • 10.52 - Data Security Data Flow Security.mp4 78.2 MB
  • 9.43 - WS-Security DAM and Software Assurance Tech.mp4 77.9 MB
  • 6.14 - Product Evaluation Models Common Criteria.mp4 77.7 MB
  • 10.54 - Data Security Provisioning and Deprovisioning.mp4 76.4 MB
  • 4.13 - Authentication Types.mp4 76.1 MB
  • 11.15 - Software Testing Types.mp4 75.2 MB
  • 9.25 - Memory Leaks.mp4 72.7 MB
  • 1.61 - IT Governance and Risk Management Key Points.mp4 72.4 MB
  • 6.19 - Clark-Wilson and Others.mp4 71.0 MB
  • 9.11 - What is the Systems Development Life Cycle SDLC.mp4 70.9 MB
  • 12.25 - Five Rules of Evidence 5.mp4 70.7 MB
  • 8.35 - Advanced Network Design Review Questions.mp4 70.5 MB
  • 9.24 - Overflows and Canaries.mp4 68.5 MB
  • 8.34 - Optimizing Resource Placement.mp4 67.7 MB
  • 6.13 - Product Evaluation Models ITSEC.mp4 66.1 MB
  • 6.33 - Hands on Creating Securing VM using Virtualbox.mp4 64.1 MB
  • 12.27 - Investigation Process.mp4 63.8 MB
  • 9.22 - Error Exception Handling Try Catch Statements.mp4 62.3 MB
  • 4.23 - Advanced Identity Review Questions.mp4 61.8 MB
  • 1.33 - Assess Risks System Specific Risk Analysis.mp4 61.7 MB
  • 4.193 - Directory Services and LDAP.mp4 60.2 MB
  • 8.43 - DPI and HTTPS Inspection.mp4 59.7 MB
  • 9.12 - Development Methodologies.mp4 59.5 MB
  • 0.1 - So You Want To Setup a Lab.mp4 59.5 MB
  • 9.18 - SDLC Review Questions.mp4 56.3 MB
  • 9.16 - Common Software Development Methods.mp4 55.9 MB
  • 9.33 - What is a Cross-Site Scripting XSS Attack.mp4 54.1 MB
  • 4.16 - Deep Dive 802.1X.mp4 52.9 MB
  • 8.12 - What is a SIEM system.mp4 52.8 MB
  • 9.23 - What is Privilege Escalation.mp4 52.7 MB
  • 9.15 - Common Software Development Approaches.mp4 52.4 MB
  • 6.195 - Host Review Questions.mp4 52.0 MB
  • 4.14 - Centralized Remote Authentication Services.mp4 51.3 MB
  • 9.21 - Secure vs Insecure Direct Object References.mp4 47.8 MB
  • 8.22 - Network-Enabled Devices Review Questions.mp4 47.6 MB
  • 9.26 - Races and Exhaustion.mp4 47.1 MB
  • 9.41 - What is security by.mp4 46.0 MB
  • 6.42 - Hands-on Protecting Boot Loaders.mp4 42.8 MB
  • 9.14 - Security Requirements Traceability Matrix SRTM.mp4 35.9 MB
  • 2.31 - Leveraging Collaboration Key Points.mp4 35.2 MB
  • Overview.mp4 13.1 MB
  • CASP (CAS-003) Exam Objectives.pdf 195.8 kB
  • CASP+.xlsx 12.6 kB

温馨提示

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!