本站已收录 番号和无损神作磁力链接/BT种子 

Pluralsight - CISSP Security Assessment and Testing

种子简介

种子名称: Pluralsight - CISSP Security Assessment and Testing
文件类型: 视频
文件数目: 64个文件
文件大小: 183.55 MB
收录时间: 2018-3-16 09:15
已经下载: 3
资源热度: 177
最近下载: 2024-12-18 20:26

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:b0bd6513fd53e2001bd6d730068d09e51cdc3f8b&dn=Pluralsight - CISSP Security Assessment and Testing 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Pluralsight - CISSP Security Assessment and Testing.torrent
  • 03 - Assessment and Testing Strategies - Ensuring Objectives Have Been Met.mp411.35MB
  • 26 - Security Control Effectiveness Testing - Enumeration.mp410.68MB
  • 28 - Security Control Effectiveness Testing - Security Assessment Techniques.mp49.14MB
  • 01 - Course Overview - Course Overview.mp49.03MB
  • 11 - Security Control Effectiveness Testing - Vulnerability Assessment.mp48.89MB
  • 05 - Assessment and Testing Strategies - Security Assessment Foundations.mp48.68MB
  • 08 - Assessment and Testing Strategies - Assessment Types.mp46.61MB
  • 21 - Security Control Effectiveness Testing - Destructing and Non-destructive Testing.mp46.48MB
  • 46 - Test Result Analysis - Penetration Testing Report Anatomy.mp46.09MB
  • 02 - Assessment and Testing Strategies - Course Introduction.mp45.93MB
  • 04 - Assessment and Testing Strategies - Resource Constraints.mp44.73MB
  • 17 - Security Control Effectiveness Testing - Intro to Penetration Testing.mp44.72MB
  • 29 - Security Control Effectiveness Testing - Source Code Review.mp44.13MB
  • 27 - Security Control Effectiveness Testing - Identification.mp44.06MB
  • 25 - Security Control Effectiveness Testing - Scoping the Test.mp43.67MB
  • 13 - Security Control Effectiveness Testing - Identification.mp43.17MB
  • 20 - Security Control Effectiveness Testing - Selecting Target Surface.mp42.98MB
  • 07 - Assessment and Testing Strategies - Assessment Viewpoints.mp42.82MB
  • 33 - Security Process Data Collection - Management Review.mp42.77MB
  • 06 - Assessment and Testing Strategies - Security Assessment Program.mp42.69MB
  • 35 - Security Process Data Collection - Account Management.mp42.44MB
  • 42 - Test Result Analysis - Targeted Reporting.mp42.42MB
  • 12 - Security Control Effectiveness Testing - Detection.mp42.41MB
  • 34 - Security Process Data Collection - Training and Awareness.mp42.34MB
  • 14 - Security Control Effectiveness Testing - Analysis.mp42.25MB
  • 19 - Security Control Effectiveness Testing - Test Process Walkthrough.mp42.24MB
  • 10 - Security Control Effectiveness Testing - Introduction.mp42.23MB
  • 22 - Security Control Effectiveness Testing - Penetration Testing Frameworks.mp42.03MB
  • 16 - Security Control Effectiveness Testing - Mitigation.mp41.95MB
  • 18 - Security Control Effectiveness Testing - Penetration Testing.mp41.91MB
  • 45 - Test Result Analysis - Reporting Challenges.mp41.89MB
  • 39 - Test Result Analysis - Introduction.mp41.88MB
  • 48 - Third-party Assessment - Introduction.mp41.86MB
  • 58 - Information Security Continuous Monitoring - Defining Your ISCM Program Strategy.mp41.84MB
  • 31 - Security Process Data Collection - Introduction.mp41.81MB
  • 32 - Security Process Data Collection - Key Performance Risk Indicators.mp41.71MB
  • 49 - Third-party Assessment - Third-party Vendors.mp41.71MB
  • 55 - Information Security Continuous Monitoring - Introduction.mp41.67MB
  • 36 - Security Process Data Collection - Disaster Recovery and Business Continuity.mp41.58MB
  • 53 - Third-party Assessment - Audit Stages.mp41.47MB
  • 62 - Information Security Continuous Monitoring - Respond to ISCM Findings.mp41.41MB
  • 41 - Test Result Analysis - Vulnerability Assessment Dashboards.mp41.35MB
  • 64 - Information Security Continuous Monitoring - Summary.mp41.34MB
  • 59 - Information Security Continuous Monitoring - Establishing Your ISCM Program Strategy.mp41.32MB
  • 60 - Information Security Continuous Monitoring - Implementing Your ISCM Program Strategy.mp41.3MB
  • 38 - Security Process Data Collection - Summary.mp41.27MB
  • 50 - Third-party Assessment - Evaluating Guidelines.mp41.25MB
  • 52 - Third-party Assessment - SSAE16.mp41.21MB
  • 23 - Security Control Effectiveness Testing - CISSP Exam Tip.mp41.2MB
  • 61 - Information Security Continuous Monitoring - Analyzing Your ISCM Program Strategy.mp41.19MB
  • 30 - Security Control Effectiveness Testing - Summary.mp41.12MB
  • 47 - Test Result Analysis - Summary.mp41.1MB
  • 09 - Assessment and Testing Strategies - Summary.mp41.1MB
  • 37 - Security Process Data Collection - Backup Data Verification.mp41.09MB
  • 63 - Information Security Continuous Monitoring - Review Your ISCM Program Strategy.mp41.06MB
  • 56 - Information Security Continuous Monitoring - What Is ISCM.mp4972.91KB
  • 51 - Third-party Assessment - Audit Reports.mp4946.16KB
  • 54 - Third-party Assessment - Summary.mp4937.34KB
  • 43 - Test Result Analysis - Data Analysis.mp4921.15KB
  • 24 - Security Control Effectiveness Testing - Penetration Testing Process.mp4916.74KB
  • 15 - Security Control Effectiveness Testing - Reporting.mp4858.25KB
  • 57 - Information Security Continuous Monitoring - ISCM Strategy.mp4798.01KB
  • 40 - Test Result Analysis - Vulnerability Assessment.mp4419.16KB
  • 44 - Test Result Analysis - Penetration Testing Reports.mp4393.22KB