Certified Information Systems Security Professional CISSP |
||
Name |
DOWNLOAD Copy Link | |
Total Size |
18.7 GB |
|
Total Files |
206 |
|
Last Seen |
2024-11-19 00:33 |
|
Hash |
691314CB69D688412FBDC75A6AEFAC3E6C38C7ED |
/Chapter 3 Security Architecture and Engineering/ |
|
|
336.7 MB |
001. Engineering process using secure design principles.en.srt |
23.9 KB |
|
161.4 MB |
|
24.1 KB |
|
159.0 MB |
003. Controls based upon system security requirements.en.srt |
42.9 KB |
|
148.0 MB |
004. Security capabilities of Information Systems - vocab.en.srt |
47.6 KB |
004. Security capabilities of Information Systems - vocab.mp4 |
141.3 MB |
005. Security capabilities of Information Systems - CPU.en.srt |
45.2 KB |
|
232.8 MB |
|
54.1 KB |
|
303.0 MB |
007. Assess and mitigate vulnerabilities - the basics.en.srt |
53.0 KB |
|
305.8 MB |
|
55.1 KB |
009. Spotlight on cryptographic solutions - Symmetric.en.srt |
51.1 KB |
|
214.9 MB |
010. Spotlight on cryptographic solutions - Asymmetric.en.srt |
38.4 KB |
|
159.2 MB |
011. Spotlight on cryptographic solutions - PKI & certs.en.srt |
46.3 KB |
|
181.7 MB |
|
36.7 KB |
|
188.7 MB |
|
33.2 KB |
|
151.3 MB |
|
47.0 KB |
|
163.0 MB |
015. Security principles for site and facility design.en.srt |
45.6 KB |
|
253.2 MB |
|
52.1 KB |
|
320.6 MB |
|
54.1 KB |
|
324.3 MB |
018. Security Architecture & Engineering - Key Points.en.srt |
41.4 KB |
|
107.1 MB |
/Chapter 1 Security and Risk Management/ |
|
|
27.7 MB |
|
21.6 KB |
|
75.9 MB |
|
37.7 KB |
|
199.0 MB |
004. Evaluate and apply security governance principles.en.srt |
34.9 KB |
|
173.9 MB |
|
31.1 KB |
|
151.3 MB |
006. Legal, regulatory issues for information security.en.srt |
45.9 KB |
|
250.4 MB |
|
48.0 KB |
|
259.2 MB |
|
47.7 KB |
|
159.9 MB |
009. Security policy, standards, procedures, guidelines.en.srt |
30.8 KB |
|
171.4 MB |
|
50.4 KB |
|
195.6 MB |
|
40.4 KB |
|
186.4 MB |
|
48.1 KB |
|
219.8 MB |
|
33.9 KB |
|
99.8 MB |
|
43.0 KB |
|
161.8 MB |
015. Apply Supply Chain Risk Management (SCRM) concepts.en.srt |
46.3 KB |
|
186.4 MB |
016. Security awareness, education, and training program.en.srt |
25.2 KB |
016. Security awareness, education, and training program.mp4 |
122.7 MB |
|
32.1 KB |
|
100.5 MB |
|
6.3 KB |
/Chapter 2 Asset Security/ |
|
|
37.2 KB |
|
168.7 MB |
002. Establish information, asset handling requirements.en.srt |
47.6 KB |
|
231.8 MB |
|
32.2 KB |
|
266.6 MB |
|
43.7 KB |
|
158.3 MB |
|
39.3 KB |
|
167.7 MB |
006. Data security controls and compliance requirements.en.srt |
49.9 KB |
|
158.2 MB |
|
40.5 KB |
|
116.4 MB |
/Chapter 4 Communication and Network Security/ |
|
|
44.2 KB |
|
167.4 MB |
|
49.5 KB |
|
162.4 MB |
|
50.0 KB |
|
204.4 MB |
|
35.8 KB |
|
128.9 MB |
005. Implications of converged & multilayer protocols.en.srt |
23.5 KB |
|
107.8 MB |
|
49.8 KB |
|
274.0 MB |
007. Wireless, Cellular & Content Distribution Networks.en.srt |
51.2 KB |
|
167.4 MB |
|
39.5 KB |
|
175.5 MB |
|
49.6 KB |
|
294.8 MB |
|
48.0 KB |
|
133.7 MB |
/Chapter 5 Identity and Access Management (IAM)/ |
|
|
46.7 KB |
|
216.3 MB |
|
50.5 KB |
|
141.6 MB |
|
48.2 KB |
|
213.0 MB |
|
45.7 KB |
|
241.8 MB |
|
50.0 KB |
|
321.2 MB |
006. Manage the identity, access provisioning lifecycle.en.srt |
44.3 KB |
|
164.8 MB |
|
48.3 KB |
|
166.8 MB |
|
54.7 KB |
|
230.1 MB |
009. Spotlight on Federated Identity Management (FIM).en.srt |
36.1 KB |
|
272.0 MB |
|
30.2 KB |
|
95.3 MB |
/Chapter 6 Security Assessment and Testing/ |
|
|
47.9 KB |
|
166.0 MB |
002. Spotlight on System and Org Controls Reports (SOC).en.srt |
38.1 KB |
|
150.1 MB |
|
51.8 KB |
|
197.0 MB |
|
56.0 KB |
|
189.7 MB |
|
47.2 KB |
|
174.7 MB |
|
36.3 KB |
|
152.4 MB |
|
42.3 KB |
|
118.7 MB |
/Chapter 7 Security Operations/ |
|
|
51.1 KB |
|
206.6 MB |
|
48.9 KB |
|
258.7 MB |
003. Conduct logging & monitoring activities - threat.en.srt |
43.9 KB |
|
280.7 MB |
|
43.3 KB |
|
288.6 MB |
|
18.1 KB |
|
57.9 MB |
|
48.5 KB |
|
289.7 MB |
|
33.9 KB |
|
144.0 MB |
|
52.0 KB |
|
188.0 MB |
|
35.4 KB |
|
167.7 MB |
|
35.1 KB |
|
161.3 MB |
|
48.4 KB |
|
147.5 MB |
|
37.1 KB |
|
141.1 MB |
|
33.5 KB |
|
138.5 MB |
|
26.7 KB |
|
102.9 MB |
|
52.0 KB |
|
204.6 MB |
|
37.9 KB |
|
220.5 MB |
|
39.6 KB |
|
111.2 MB |
/Chapter 8 Software Development Security/ |
|
001. Spotlight on the Software Development Life Cycle.en.srt |
51.2 KB |
|
199.7 MB |
|
31.2 KB |
|
119.2 MB |
|
51.7 KB |
|
206.8 MB |
|
48.3 KB |
|
184.5 MB |
|
39.0 KB |
|
200.9 MB |
006. Apply controls in development ecosystems - basics.en.srt |
52.5 KB |
|
197.3 MB |
|
42.2 KB |
|
169.5 MB |
|
46.2 KB |
|
172.3 MB |
|
52.5 KB |
|
204.8 MB |
|
14.0 KB |
|
231.7 MB |
011. Define, apply secure coding guidelines, standards.en.srt |
39.5 KB |
|
220.2 MB |
|
30.6 KB |
|
308.0 MB |
|
29.6 KB |
|
113.5 MB |
/Chapter 9 The CISSP Toolbox/ |
|
|
2.2 KB |
|
14.6 MB |
|
8.6 KB |
|
27.4 MB |
|
10.7 KB |
|
35.6 MB |
|
44.1 MB |
|
13.7 KB |
Total files 206 |
Copyright © 2024 FileMood.com