种子简介
种子名称:
[FreeTutorials.Eu] [UDEMY] Cyber Security and Information Security Fundamentals - [FTU]
文件类型:
视频
文件数目:
63个文件
文件大小:
2.03 GB
收录时间:
2019-2-12 00:47
已经下载:
3次
资源热度:
177
最近下载:
2025-1-28 04:01
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:45f66083539e6b153e221895f0ec7c1139ac83b2&dn=[FreeTutorials.Eu] [UDEMY] Cyber Security and Information Security Fundamentals - [FTU]
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[FreeTutorials.Eu] [UDEMY] Cyber Security and Information Security Fundamentals - [FTU].torrent
1. Introduction/10. Compliance and Ethics.mp421.25MB
1. Introduction/11. Industry Specific Laws.mp431.52MB
1. Introduction/12. Computer Crimes.mp417.76MB
1. Introduction/13. Software Licensing.mp423.96MB
1. Introduction/14. Data Breaches and Ethics.mp415.68MB
1. Introduction/15. Security Policy Framework.mp418.31MB
1. Introduction/16. Common Policies and Key Principles.mp427.13MB
1. Introduction/17. Business Continuity Planning.mp413.56MB
1. Introduction/18. Business Continuity Controls and Key Technical Concepts.mp428.66MB
1. Introduction/19. RAID Technology.mp423.88MB
1. Introduction/1. Introduction.mp433.25MB
1. Introduction/20. Risk Management.mp422.69MB
1. Introduction/21. Risk Assessment Techniques.mp423.23MB
1. Introduction/22. Quantitative Risk Factors.mp431.42MB
1. Introduction/23. Risk Management Strategies.mp425.61MB
1. Introduction/24. Security Controls.mp423.69MB
1. Introduction/25. Understanding Data Security.mp419.46MB
1. Introduction/26. Data Security Policies.mp426.04MB
1. Introduction/27. Data Security Roles.mp418.84MB
1. Introduction/28. Data Privacy.mp430.52MB
1. Introduction/29. Developing Security Baselines.mp422.82MB
1. Introduction/2. Understanding Information Security.mp426.06MB
1. Introduction/30. Leveraging Industry Standards.mp445.8MB
1. Introduction/31. Customizing Security Standards.mp422.93MB
1. Introduction/32. Understanding Encryption.mp428.65MB
1. Introduction/33. Secure Design Principles.mp456.29MB
1. Introduction/34. Security Models.mp443.98MB
1. Introduction/35. Security Requirements.mp474.68MB
1. Introduction/36. Virtualization.mp463.48MB
1. Introduction/37. Cloud Computing Models.mp448.98MB
1. Introduction/38. Public Cloud Tiers.mp456.3MB
1. Introduction/39. Memory Protection.mp462.11MB
1. Introduction/3. Hashing.mp432.85MB
1. Introduction/40. Interface Protection.mp485.17MB
1. Introduction/41. High Availability and Fault Tolerance.mp447.99MB
1. Introduction/42. OWASP Top 10.mp440.41MB
1. Introduction/43. SQL Injection Prevention.mp426.83MB
1. Introduction/44. Cross-Site Scripting Prevention.mp431.69MB
1. Introduction/45. Cross-Site Request Forgery.mp421.49MB
1. Introduction/46. Understanding Encryption.mp428.66MB
1. Introduction/47. Symmetric and Asymmetric Cryptography.mp447.79MB
1. Introduction/48. Cryptography Goals.mp415.95MB
1. Introduction/49. Codes and Ciphers.mp423.21MB
1. Introduction/4. Digital Signatures and Digital Certificates.mp418.63MB
1. Introduction/50. Key Lifecycle Management.mp481.71MB
1. Introduction/51. Data Encryption Standards (DES).mp424.69MB
1. Introduction/52. Triple DES (3DES).mp432.28MB
1. Introduction/53. AES, Blowfish, and Twofish.mp461.15MB
1. Introduction/54. RC4.mp417.86MB
1. Introduction/55. RSA Encryption.mp460.9MB
1. Introduction/56. Elliptic-Curve Cryptography and Quantum Cryptography.mp423.03MB
1. Introduction/57. Key Exchange.mp422.75MB
1. Introduction/58. Diffie-Hellman Key Exchange.mp454.29MB
1. Introduction/59. Key Escrow.mp442.91MB
1. Introduction/5. Availability.mp418.86MB
1. Introduction/60. Trust Models.mp422.76MB
1. Introduction/61. Public Key Infrastructure (PKI) and Digital Certificates.mp439.24MB
1. Introduction/62. Hash Functions.mp432.84MB
1. Introduction/63. Digital Signatures and Digital Certificates.mp418.65MB
1. Introduction/6. Security Governance.mp415.81MB
1. Introduction/7. Organizational Processes.mp418.01MB
1. Introduction/8. Security Roles and Responsibilities.mp414.68MB
1. Introduction/9. Control Frameworks.mp432.17MB