种子简介
种子名称:
Pluralsight - CISSP Security Assessment and Testing
文件类型:
视频
文件数目:
64个文件
文件大小:
183.55 MB
收录时间:
2018-3-16 09:15
已经下载:
3次
资源热度:
177
最近下载:
2024-12-18 20:26
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:b0bd6513fd53e2001bd6d730068d09e51cdc3f8b&dn=Pluralsight - CISSP Security Assessment and Testing
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Pluralsight - CISSP Security Assessment and Testing.torrent
03 - Assessment and Testing Strategies - Ensuring Objectives Have Been Met.mp411.35MB
26 - Security Control Effectiveness Testing - Enumeration.mp410.68MB
28 - Security Control Effectiveness Testing - Security Assessment Techniques.mp49.14MB
01 - Course Overview - Course Overview.mp49.03MB
11 - Security Control Effectiveness Testing - Vulnerability Assessment.mp48.89MB
05 - Assessment and Testing Strategies - Security Assessment Foundations.mp48.68MB
08 - Assessment and Testing Strategies - Assessment Types.mp46.61MB
21 - Security Control Effectiveness Testing - Destructing and Non-destructive Testing.mp46.48MB
46 - Test Result Analysis - Penetration Testing Report Anatomy.mp46.09MB
02 - Assessment and Testing Strategies - Course Introduction.mp45.93MB
04 - Assessment and Testing Strategies - Resource Constraints.mp44.73MB
17 - Security Control Effectiveness Testing - Intro to Penetration Testing.mp44.72MB
29 - Security Control Effectiveness Testing - Source Code Review.mp44.13MB
27 - Security Control Effectiveness Testing - Identification.mp44.06MB
25 - Security Control Effectiveness Testing - Scoping the Test.mp43.67MB
13 - Security Control Effectiveness Testing - Identification.mp43.17MB
20 - Security Control Effectiveness Testing - Selecting Target Surface.mp42.98MB
07 - Assessment and Testing Strategies - Assessment Viewpoints.mp42.82MB
33 - Security Process Data Collection - Management Review.mp42.77MB
06 - Assessment and Testing Strategies - Security Assessment Program.mp42.69MB
35 - Security Process Data Collection - Account Management.mp42.44MB
42 - Test Result Analysis - Targeted Reporting.mp42.42MB
12 - Security Control Effectiveness Testing - Detection.mp42.41MB
34 - Security Process Data Collection - Training and Awareness.mp42.34MB
14 - Security Control Effectiveness Testing - Analysis.mp42.25MB
19 - Security Control Effectiveness Testing - Test Process Walkthrough.mp42.24MB
10 - Security Control Effectiveness Testing - Introduction.mp42.23MB
22 - Security Control Effectiveness Testing - Penetration Testing Frameworks.mp42.03MB
16 - Security Control Effectiveness Testing - Mitigation.mp41.95MB
18 - Security Control Effectiveness Testing - Penetration Testing.mp41.91MB
45 - Test Result Analysis - Reporting Challenges.mp41.89MB
39 - Test Result Analysis - Introduction.mp41.88MB
48 - Third-party Assessment - Introduction.mp41.86MB
58 - Information Security Continuous Monitoring - Defining Your ISCM Program Strategy.mp41.84MB
31 - Security Process Data Collection - Introduction.mp41.81MB
32 - Security Process Data Collection - Key Performance Risk Indicators.mp41.71MB
49 - Third-party Assessment - Third-party Vendors.mp41.71MB
55 - Information Security Continuous Monitoring - Introduction.mp41.67MB
36 - Security Process Data Collection - Disaster Recovery and Business Continuity.mp41.58MB
53 - Third-party Assessment - Audit Stages.mp41.47MB
62 - Information Security Continuous Monitoring - Respond to ISCM Findings.mp41.41MB
41 - Test Result Analysis - Vulnerability Assessment Dashboards.mp41.35MB
64 - Information Security Continuous Monitoring - Summary.mp41.34MB
59 - Information Security Continuous Monitoring - Establishing Your ISCM Program Strategy.mp41.32MB
60 - Information Security Continuous Monitoring - Implementing Your ISCM Program Strategy.mp41.3MB
38 - Security Process Data Collection - Summary.mp41.27MB
50 - Third-party Assessment - Evaluating Guidelines.mp41.25MB
52 - Third-party Assessment - SSAE16.mp41.21MB
23 - Security Control Effectiveness Testing - CISSP Exam Tip.mp41.2MB
61 - Information Security Continuous Monitoring - Analyzing Your ISCM Program Strategy.mp41.19MB
30 - Security Control Effectiveness Testing - Summary.mp41.12MB
47 - Test Result Analysis - Summary.mp41.1MB
09 - Assessment and Testing Strategies - Summary.mp41.1MB
37 - Security Process Data Collection - Backup Data Verification.mp41.09MB
63 - Information Security Continuous Monitoring - Review Your ISCM Program Strategy.mp41.06MB
56 - Information Security Continuous Monitoring - What Is ISCM.mp4972.91KB
51 - Third-party Assessment - Audit Reports.mp4946.16KB
54 - Third-party Assessment - Summary.mp4937.34KB
43 - Test Result Analysis - Data Analysis.mp4921.15KB
24 - Security Control Effectiveness Testing - Penetration Testing Process.mp4916.74KB
15 - Security Control Effectiveness Testing - Reporting.mp4858.25KB
57 - Information Security Continuous Monitoring - ISCM Strategy.mp4798.01KB
40 - Test Result Analysis - Vulnerability Assessment.mp4419.16KB
44 - Test Result Analysis - Penetration Testing Reports.mp4393.22KB