磁力链接

magnet:?xt=urn:btih:FFBFC4F07FE28179C744CCF730B487C571989C0E
推荐使用PIKPAK网盘下载资源,PIKPAK是目前最好用网盘,10T超大空间,不和谐任何资源,支持无限次数离线下载,视频在线观看

资源截图

API Integration

文件列表

  • 4 - Governance, Risk, and Compliance/4 - 1 - Risk Assessment.mp4 203.6 MB
  • 3 - Security Engineering and Cryptography/3 - 7 - Trustworthy Computing.mp4 192.2 MB
  • 3 - Security Engineering and Cryptography/3 - 13 - Cloud Technology - Basics.mp4 189.0 MB
  • 3 - Security Engineering and Cryptography/3 - 18 - Asymmetric Algorithms & Protocols.mp4 189.0 MB
  • 3 - Security Engineering and Cryptography/3 - 17 - Hashing & Symmetric Algorithms.mp4 185.7 MB
  • 3 - Security Engineering and Cryptography/3 - 5 - Processes.mp4 182.1 MB
  • 3 - Security Engineering and Cryptography/3 - 11 - Security Considerations - Protocols.mp4 181.6 MB
  • 3 - Security Engineering and Cryptography/3 - 14 - Cloud Technology - Advanced.mp4 176.7 MB
  • 3 - Security Engineering and Cryptography/3 - 10 - Security Considerations - ICS-SCADA.mp4 173.7 MB
  • 3 - Security Engineering and Cryptography/3 - 15 - PKI - Basics.mp4 172.6 MB
  • 3 - Security Engineering and Cryptography/3 - 16 - PKI - Advanced.mp4 170.4 MB
  • 3 - Security Engineering and Cryptography/3 - 1 - Managed Configurations.mp4 164.1 MB
  • 3 - Security Engineering and Cryptography/3 - 3 - Security Considerations.mp4 163.1 MB
  • 4 - Governance, Risk, and Compliance/4 - 5 - Risk Tracking.mp4 162.8 MB
  • 2 - Security Operations/2 - 12 - Analysis Tools.mp4 159.1 MB
  • 2 - Security Operations/2 - 2 - Indicators of Compromise & Response.mp4 155.0 MB
  • 2 - Security Operations/2 - 11 - File Carving & Binary Analysis.mp4 154.0 MB
  • 1 - Security Architecture/1 - 18 - Impact of Emerging Technologies.mp4 153.6 MB
  • 2 - Security Operations/2 - 4 - Vulnerability Assessment - Methods & Tools.mp4 153.2 MB
  • 2 - Security Operations/2 - 7 - Analyze Vulnerabilities - Attacks.mp4 152.9 MB
  • 3 - Security Engineering and Cryptography/3 - 4 - Hardening Techniques.mp4 152.8 MB
  • 2 - Security Operations/2 - 5 - Analyze Vulnerabilities - Vulnerabilities.mp4 152.1 MB
  • 4 - Governance, Risk, and Compliance/4 - 11 - Regulations Accreditations & Standards.mp4 151.1 MB
  • 4 - Governance, Risk, and Compliance/4 - 10 - Data Considerations.mp4 146.5 MB
  • 4 - Governance, Risk, and Compliance/4 - 2 - Risk Handling Techniques.mp4 145.6 MB
  • 4 - Governance, Risk, and Compliance/4 - 18 - Testing Plans.mp4 145.1 MB
  • 2 - Security Operations/2 - 8 - Use Processes to Reduce Risk.mp4 142.5 MB
  • 1 - Security Architecture/1 - 4 - Services & Segmentation - Scenarios.mp4 142.5 MB
  • 1 - Security Architecture/1 - 2 - Services - Discussion.mp4 140.5 MB
  • 1 - Security Architecture/1 - 13 - Securing Enterprise Architecture.mp4 140.3 MB
  • 2 - Security Operations/2 - 13 - Live Collection Tools.mp4 139.6 MB
  • 1 - Security Architecture/1 - 8 - Infrastructure Design - Discussion.mp4 139.3 MB
  • 2 - Security Operations/2 - 1 - Perform Threat Management.mp4 138.2 MB
  • 2 - Security Operations/2 - 6 - Analyze Vulnerabilities - Vulnerable Systems.mp4 138.1 MB
  • 3 - Security Engineering and Cryptography/3 - 9 - Security Considerations - Embedded.mp4 134.4 MB
  • 2 - Security Operations/2 - 9 - Triage & Incident Response.mp4 133.9 MB
  • 4 - Governance, Risk, and Compliance/4 - 3 - Risk Types.mp4 133.6 MB
  • 1 - Security Architecture/1 - 10 - Baselines & Templates & Software Assurance.mp4 133.3 MB
  • 3 - Security Engineering and Cryptography/3 - 21 - Troubleshoot Cryptography - Misconfigurations.mp4 133.2 MB
  • 4 - Governance, Risk, and Compliance/4 - 6 - Policies and Security Practices.mp4 132.5 MB
  • 1 - Security Architecture/1 - 14 - Authentication & Authorization - Discussion.mp4 131.8 MB
  • 1 - Security Architecture/1 - 12 - Security in the Development Lifecycle.mp4 131.7 MB
  • 1 - Security Architecture/1 - 17 - Cryptography & PKI.mp4 131.6 MB
  • 2 - Security Operations/2 - 3 - Vulnerability Management Activities.mp4 131.3 MB
  • 1 - Security Architecture/1 - 16 - Secure Cloud & Virtualization.mp4 131.3 MB
  • 4 - Governance, Risk, and Compliance/4 - 4 - Risk Management Life Cycle.mp4 130.8 MB
  • 3 - Security Engineering and Cryptography/3 - 6 - Mandatory Access Control.mp4 128.1 MB
  • 4 - Governance, Risk, and Compliance/4 - 8 - Performing Vendor Assessments.mp4 127.8 MB
  • 4 - Governance, Risk, and Compliance/4 - 14 - Business Impact Analysis (BIA).mp4 122.6 MB
  • 2 - Security Operations/2 - 10 - Forensic Concepts.mp4 119.9 MB
  • 1 - Security Architecture/1 - 6 - Merging of Networks.mp4 118.2 MB
  • 1 - Security Architecture/1 - 9 - Infrastructure Design - Scenarios.mp4 117.1 MB
  • 1 - Security Architecture/1 - 3 - Segmentation - Discussion.mp4 117.0 MB
  • 1 - Security Architecture/1 - 5 - Deperimeterization_Zero Trust.mp4 116.2 MB
  • 1 - Security Architecture/1 - 15 - Authentication & Authorization - Scenarios.mp4 110.1 MB
  • 4 - Governance, Risk, and Compliance/4 - 9 - Technical Considerations.mp4 107.5 MB
  • 1 - Security Architecture/1 - 7 - Software-defined Networking (SDN).mp4 105.9 MB
  • 4 - Governance, Risk, and Compliance/4 - 12 - Legal Considerations.mp4 92.9 MB
  • 4 - Governance, Risk, and Compliance/4 - 17 - Incident Response Plan.mp4 91.8 MB
  • 3 - Security Engineering and Cryptography/3 - 19 - Troubleshoot Cryptography - Keys.mp4 91.1 MB
  • 4 - Governance, Risk, and Compliance/4 - 19 - Governance, Risk & Compliance - Key Points.mp4 86.3 MB
  • 4 - Governance, Risk, and Compliance/4 - 16 - Disaster Recovery & Business Continuity Planning.mp4 81.8 MB
  • 2 - Security Operations/2 - 14 - Security Operations - Key Points.mp4 81.7 MB
  • 4 - Governance, Risk, and Compliance/4 - 7 - Shared Responsibility Model - Cloud.mp4 81.4 MB
  • 3 - Security Engineering and Cryptography/3 - 2 - Deployment Scenarios.mp4 78.9 MB
  • 4 - Governance, Risk, and Compliance/4 - 13 - Contract and Agreement Types.mp4 77.6 MB
  • 1 - Security Architecture/1 - 19 - Security Architecture - Key Points.mp4 76.5 MB
  • 3 - Security Engineering and Cryptography/3 - 20 - Security Engineering & Cryptography - Key Points.mp4 66.2 MB
  • 3 - Security Engineering and Cryptography/3 - 12 - Security Considerations - Sectors.mp4 62.8 MB
  • 3 - Security Engineering and Cryptography/3 - 8 - Compensating Controls.mp4 61.3 MB
  • 1 - Security Architecture/1 - 11 - Integrating Enterprise Applications.mp4 57.8 MB
  • 4 - Governance, Risk, and Compliance/4 - 15 - Privacy Impact Assessment.mp4 55.2 MB
  • 1 - Security Architecture/1 - 1 - Overview.mp4 33.9 MB
  • CASP004 ADISH/Risk Management Life Cycle – 4-1-4.pptx 1.8 MB
  • CASP004 ADISH/Services & Segmentation Scenarios – 1-1-3.pptx 1.2 MB
  • CASP004 ADISH/Infrastructure Design Scenarios – 1-2-2.pptx 1.1 MB
  • CASP004 ADISH/Authentication & Authorization – Scenarios - 1-5-2.pptx 1.1 MB
  • CASP004 ADISH/PKI - Certificate Authorities.jpg 112.7 kB
  • CASP004 ADISH/Cloud Shared Responsibility Model.jpg 86.0 kB
  • CASP004 ADISH/Domain 3 - Crypto Definitions.docx 76.0 kB
  • CASP004 ADISH/CompTIA-SecurityPlus-Acronyms.pdf 53.3 kB
  • CASP004 ADISH/CompTIA CASP+ 004 Glossary.txt 48.1 kB
  • CASP004 ADISH/Risk Register.xlsx 13.3 kB
  • CASP004 ADISH/IPSEC Primer.txt 11.8 kB
  • CASP004 ADISH/CompTIA CASP+ Acronym List.txt 11.7 kB

温馨提示

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!