种子简介
种子名称:
LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL
文件类型:
视频
文件数目:
27个文件
文件大小:
286.92 MB
收录时间:
2017-1-30 10:44
已经下载:
3次
资源热度:
87
最近下载:
2024-10-27 05:09
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:310530e1460946a573594bde8e8579b0c31b9e1f&dn=LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL.torrent
01. Introduction/01_01-Welcome.mp46.21MB
01. Introduction/01_02-What you should know.mp41.95MB
02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp413.94MB
02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp413.64MB
02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp412.53MB
02. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp412.04MB
02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp49.84MB
02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp48.83MB
02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp47.76MB
03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp412.86MB
03. Cybersecurity Threats/03_02-Dissecting security threats.mp411.04MB
03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp49.46MB
03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp49.37MB
03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp49.34MB
03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp48.61MB
03. Cybersecurity Threats/03_08-Exploring ransomware.mp48.01MB
03. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp47.71MB
04. Security Architecture/04_04-Managing user access and identity.mp419.71MB
04. Security Architecture/04_05-Implementing preventative security.mp417.89MB
04. Security Architecture/04_06-Monitoring and alerts.mp414.95MB
04. Security Architecture/04_01-Describing security requirements.mp414.21MB
04. Security Architecture/04_02-Architecting security risk.mp412.86MB
04. Security Architecture/04_03-Selecting security controls.mp48.14MB
05. Incident Management/05_02-Preparing for an incident.mp413.53MB
05. Incident Management/05_03-Responding to an incident.mp410.95MB
05. Incident Management/05_01-Managing incident response.mp48.11MB
06. Conclusion/06_01-Next steps.mp43.44MB