本站已收录 番号和无损神作磁力链接/BT种子 

CISSP® - Identity and Access Management

种子简介

种子名称: CISSP® - Identity and Access Management
文件类型: 视频
文件数目: 22个文件
文件大小: 179.74 MB
收录时间: 2020-10-7 10:01
已经下载: 3
资源热度: 180
最近下载: 2024-12-14 01:31

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:bf086fef2fbfefcfab048531879e83903254fc8e&dn=CISSP® - Identity and Access Management 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

CISSP® - Identity and Access Management.torrent
  • 1. Course Overview/01. Course Overview.mp45.73MB
  • 2. Control Physical and Logical Access to Assets/02. Control Physical and Logical Access to Assets.mp48.34MB
  • 2. Control Physical and Logical Access to Assets/03. Layered Defense.mp416.5MB
  • 2. Control Physical and Logical Access to Assets/04. Controls.mp414.51MB
  • 2. Control Physical and Logical Access to Assets/05. Key Points.mp43.09MB
  • 3. Manage Identification and Authentication of People and Devices/06. Manage Identification and Authentication of People and Devices.mp46.29MB
  • 3. Manage Identification and Authentication of People and Devices/07. What You Have.mp414.08MB
  • 3. Manage Identification and Authentication of People and Devices/08. Authorization.mp46.02MB
  • 3. Manage Identification and Authentication of People and Devices/09. Single Sign On.mp48.07MB
  • 3. Manage Identification and Authentication of People and Devices/10. Kerberos.mp49.07MB
  • 3. Manage Identification and Authentication of People and Devices/11. Credential Management Systems.mp410.83MB
  • 3. Manage Identification and Authentication of People and Devices/12. Summary.mp41.85MB
  • 4. Integrate Identity as a Service/13. Integrate Identity as a Service.mp47.85MB
  • 5. Integrate Third-party Identity Services/14. Integrate Third-party Identity Services.mp45.19MB
  • 6. Implement and Manage Authorization Mechanisms/15. Implement and Manage Authorization Mechanisms.mp413.17MB
  • 6. Implement and Manage Authorization Mechanisms/16. Rule Based Access Control.mp412.72MB
  • 6. Implement and Manage Authorization Mechanisms/17. Context Dependent Access Control.mp48MB
  • 6. Implement and Manage Authorization Mechanisms/18. Summary.mp4856.57KB
  • 7. Prevent or Mitigate Access Control Attacks/19. Prevent or Mitigate Access Control Attacks.mp411.99MB
  • 7. Prevent or Mitigate Access Control Attacks/20. Summary.mp41.14MB
  • 8. Manage the Identity and Access Provisioning Lifecycle/21. Manage the Identity and Access Provisioning Lifecycle.mp413.7MB
  • 8. Manage the Identity and Access Provisioning Lifecycle/22. Summary.mp4771.35KB