FileMood

Download CISSP

CISSP

Name

CISSP

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

71.4 GB

Total Files

2485

Last Seen

2025-08-08 00:51

Hash

2FCFB3F2CB41725FE17015952A82B3AEF57A88D5

/ISC2_CBT/

2013_МатМоделиВЗащитеИнформации_Грушо.mp4

156.9 MB

/.../Boson Video Training Disc1 of 3/

About the Author.txt

1.7 KB

autorun.inf

0.0 KB

cissp-eula.txt

13.8 KB

launcher.ini

2.3 KB

msvbvm60.dll

1.4 MB

nother.ico

0.8 KB

Setup.exe

614.4 KB

sidebar.txt

1.0 KB

/.../Boson Video Training Disc1 of 3/bin/

CamPlay.exe

327.7 KB

/.../Boson Video Training Disc1 of 3/sound/

RING.WAV

16.6 KB

/.../Boson Video Training Disc1 of 3/video/

Module 00 - Course_Introduction_and_Overview.avi

41.2 MB

Module 01 - Access_Control_Systems_and_Methodology.avi

167.5 MB

Module 02 - Telecommunications_and_Network_Security.avi

245.0 MB

Module 03 - Security_Management_Practices.avi

173.8 MB

/.../Boson Video Training Disc2 of 3/

autorun.inf

0.0 KB

cissp-eula.txt

13.8 KB

launcher.ini

2.0 KB

msvbvm60.dll

1.4 MB

nother.ico

0.8 KB

Setup.exe

614.4 KB

sidebar.txt

0.5 KB

/.../Boson Video Training Disc2 of 3/bin/

CamPlay.exe

327.7 KB

/.../Boson Video Training Disc2 of 3/sound/

RING.WAV

16.6 KB

/.../Boson Video Training Disc2 of 3/video/

Module 04 - Applications_and_Systems_Development.avi

170.5 MB

Module 05 - Cryptography.avi

211.5 MB

Module 06 - Security_Architecture_and_Models.avi

157.9 MB

Module 07 - Operations_Security.avi

48.3 MB

Module 08 - Business_Continuity_and_Disaster_Recovery_Planning.avi

66.7 MB

/.../Boson Video Training Disc3 of 3/

autorun.inf

0.0 KB

cissp-eula.txt

13.8 KB

launcher.ini

1.6 KB

msvbvm60.dll

1.4 MB

nother.ico

0.8 KB

Setup.exe

614.4 KB

sidebar.txt

0.6 KB

/.../Boson Video Training Disc3 of 3/bin/

CamPlay.exe

327.7 KB

chp_ciss.exe

4.7 MB

/.../Boson Video Training Disc3 of 3/sound/

RING.WAV

16.6 KB

/.../Boson Video Training Disc3 of 3/video/

Module 09 - Laws_Investigations_and_Ethics.avi

146.4 MB

Module 10 - Physical_Security.avi

96.7 MB

Module 11 - Methods_of_Attack.avi

70.9 MB

/.../CBT Nuggets (ISC)2 CISSP 2015/

01 - Welcome to CISSP.mp4

86.5 MB

02 - CIA Concepts.mp4

23.9 MB

03 - Policies.mp4

74.3 MB

04 - Risk.mp4

73.6 MB

05 - Control Types.mp4

92.6 MB

06 - Security Awareness Training.mp4

36.5 MB

07 - Ethical Hacking.mp4

69.4 MB

08 - Symmetric Cryptography.mp4

101.5 MB

09 - Asymmetric Cryptography.mp4

131.5 MB

10 - Fire.mp4

90.2 MB

11 - Physical Security.mp4

73.8 MB

12 - Electric Power.mp4

65.7 MB

13 - OSI Lower Layers.mp4

158.1 MB

14 - OSI Upper Layers.mp4

129.5 MB

15 - Firewalls.mp4

116.1 MB

16 - VPNs.mp4

145.0 MB

17 - Attacks.mp4

113.3 MB

18 - Authentication Concepts.mp4

52.9 MB

19 - Multifactor Authentication.mp4

84.4 MB

20 - Centralized Management.mp4

92.0 MB

21 - SSO and Security Threats.mp4

134.1 MB

22 - Computing System Evaluations.mp4.fb!

80.8 MB

23 - Security Model Details.mp4

63.1 MB

24 - Availability and Integrity Design.mp4

76.4 MB

25 - IDS and IPS.mp4

92.6 MB

26 - Controls for Operational Security.mp4

103.3 MB

27 - Separation of Duties.mp4

98.8 MB

28 - Backups and Media.mp4

89.8 MB

29 - DR and BC.mp4

109.9 MB

30 - Malware.mp4

75.9 MB

31 - Evidence.mp4

65.6 MB

32 - Laws and Liability.mp4

56.1 MB

33 - Incident Response.mp4

83.0 MB

34 - System and Software Security.mp4

87.5 MB

35 - Virtualization and Cloud.mp4

70.0 MB

36 - 2700x.mp4

33.1 MB

37 - Federated Identities.mp4

60.6 MB

38 - EPA.mp4

85.1 MB

39 - Monitoring and More.mp4.fb!

64.7 MB

/.../InfoSec.Institute.CISSP.Boot.Camp.Online/

CISSP Boot Camp Online - Module 01.mp4

313.6 MB

CISSP Boot Camp Online - Module 02.mp4

343.4 MB

CISSP Boot Camp Online - Module 03.mp4

196.1 MB

CISSP Boot Camp Online - Module 04.mp4

371.3 MB

CISSP Boot Camp Online - Module 05.mp4

158.6 MB

CISSP Boot Camp Online - Module 06.mp4

279.1 MB

CISSP Boot Camp Online - Module 07.mp4

181.6 MB

CISSP Boot Camp Online - Module 08.mp4

222.2 MB

CISSP Boot Camp Online - Module 09.mp4

181.4 MB

CISSP Boot Camp Online - Module 10.mp4

267.4 MB

CISSP Boot Camp Online - Module 11.mp4

134.3 MB

CISSP Boot Camp Online - Module 12.mp4

315.1 MB

CISSP Boot Camp Online - Module 13.mp4

275.2 MB

CISSP Boot Camp Online - Module 14.mp4

231.8 MB

CISSP Boot Camp Online - Module 15.mp4

70.3 MB

CISSP Boot Camp Online - Module 16.mp4

198.0 MB

CISSP Boot Camp Online - Module 17.mp4

214.9 MB

CISSP Boot Camp Online - Module 18.mp4

326.2 MB

CISSP Boot Camp Online - Module 19.mp4

227.4 MB

CISSP Boot Camp Online - Module 20.mp4

140.9 MB

CISSP Boot Camp Online - Module 21.mp4

202.8 MB

CISSP Boot Camp Online - Module 22.mp4

260.6 MB

CISSP Boot Camp Online - Module 23.mp4

226.5 MB

CISSP Boot Camp Online - Module 24.mp4

78.6 MB

Lectures and Notes Full.pdf

9.9 MB

Lectures and Notes.pdf

14.8 MB

Review Question and Answers Full.pdf

6.1 MB

Review Question and Answers.pdf

18.0 MB

/.../ITPro.tv_Certified Information Systems Security Professional/

1 - Security Governance.mp3

26.5 MB

1 - Security Governance.mp4

364.1 MB

2 - Compliance.mp3

26.0 MB

2 - Compliance.mp4

363.7 MB

3 - Code of Ethics.mp3

19.5 MB

3 - Code of Ethics.mp4

185.8 MB

4 - Business Continuity.mp3

26.7 MB

4 - Business Continuity.mp4

235.6 MB

5 - Personnel Security.mp3

25.1 MB

5 - Personnel Security.mp4

359.1 MB

6 - Risk Management.mp3

24.8 MB

6 - Risk Management.mp4

143.5 MB

7 - Risk Management Part 2.mp3

25.8 MB

7 - Risk Management Part 2.mp4

335.0 MB

8 - Risk Management Part 3.mp3

28.6 MB

8 - Risk Management Part 3.mp4

155.2 MB

9 - Threat Modeling.mp3

22.8 MB

9 - Threat Modeling.mp4

163.7 MB

10 - Acquisition Risk Strategy.mp3

24.8 MB

10 - Acquisition Risk Strategy.mp4

364.1 MB

11 - Asset Classification.mp3

24.2 MB

11 - Asset Classification.mp4

361.8 MB

12 - Protect Privacy.mp3

26.0 MB

12 - Protect Privacy.mp4

370.3 MB

12.1 - Retention and Data Security.mp3

26.3 MB

12.1 - Retention and Data Security.mp4

370.1 MB

12.2 - Data Handling Requirements.mp3

26.9 MB

12.2 - Data Handling Requirements.mp4

412.7 MB

13 - Secure Design Principles.mp3

22.7 MB

13 - Secure Design Principles.mp4

255.9 MB

14 - Security Model Concepts.mp3

24.7 MB

14 - Security Model Concepts.mp4

402.8 MB

15 - Security Model Concepts Part 2.mp3

32.0 MB

15 - Security Model Concepts Part 2.mp4

312.0 MB

15.5 - Controls and Capabilities.mp3

26.0 MB

15.5 - Controls and Capabilities.mp4

335.3 MB

16 - Assess Vulnerabilities.mp3

26.0 MB

16 - Assess Vulnerabilities.mp4

362.8 MB

17 - Assess Vulnerabilities Part 2.mp3

21.2 MB

17 - Assess Vulnerabilities Part 2.mp4

178.8 MB

18 - Assess Vulnerabilities Part 3.mp3

26.3 MB

18 - Assess Vulnerabilities Part 3.mp4

145.8 MB

19 - Assess Vulnerabilities Part 4.mp3

31.5 MB

19 - Assess Vulnerabilities Part 4.mp4

358.0 MB

19.1 - Assess Vulnerabilities Part 5.mp3

24.4 MB

19.1 - Assess Vulnerabilities Part 5.mp4

124.0 MB

19.2 - Assess Vulnerabilities Part 6.mp3

27.2 MB

19.2 - Assess Vulnerabilities Part 6.mp4

381.1 MB

20 - Apply Cryptography.mp3

25.9 MB

20 - Apply Cryptography.mp4

303.8 MB

21 - Apply Cryptography Part 2.mp3

29.2 MB

21 - Apply Cryptography Part 2.mp4

422.1 MB

22 - Physical Security.mp3

31.3 MB

22 - Physical Security.mp4

466.8 MB

40 - Secure Network Design.mp3

23.3 MB

40 - Secure Network Design.mp4

205.2 MB

41 - IP Networking and Protocols.mp3

25.8 MB

41 - IP Networking and Protocols.mp4

263.8 MB

42 - IP Networking and Protocols Part 2.mp3

27.5 MB

42 - IP Networking and Protocols Part 2.mp4

343.7 MB

43 - Securing Network Devices.mp3

25.5 MB

43 - Securing Network Devices.mp4

349.3 MB

44 - Secure Communications.mp3

26.9 MB

44 - Secure Communications.mp4

384.8 MB

45 - Secure Communications Part 2.mp3

30.2 MB

45 - Secure Communications Part 2.mp4

355.4 MB

46 - Mitigate Network Attacks.mp3

25.1 MB

46 - Mitigate Network Attacks.mp4

346.0 MB

50 - Identification and Authorization.mp3

24.7 MB

50 - Identification and Authorization.mp4

328.2 MB

51 - Manage Authentication.mp3

27.6 MB

51 - Manage Authentication.mp4

368.5 MB

52 - Manage Authentication Part 2.mp3

26.7 MB

52 - Manage Authentication Part 2.mp4

308.6 MB

53 - Manage Authentication Part 3.mp3

25.1 MB

53 - Manage Authentication Part 3.mp4

342.1 MB

60 - Assessment and Testing.mp3

27.3 MB

60 - Assessment and Testing.mp4

349.7 MB

61 - Assessment and Testing Part 2.mp3

25.1 MB

61 - Assessment and Testing Part 2.mp4

336.4 MB

62 - Assessment and Testing Part 3.mp3

25.4 MB

62 - Assessment and Testing Part 3.mp4

311.3 MB

70 - Investigations.mp3

25.2 MB

70 - Investigations.mp4

343.8 MB

71 - Secure Operations Concepts.mp3

26.4 MB

71 - Secure Operations Concepts.mp4

359.6 MB

72 - Resource Protection.mp3

15.3 MB

72 - Resource Protection.mp4

204.1 MB

73 - Incident Management.mp3

22.5 MB

73 - Incident Management.mp4

314.3 MB

74 - Preventative Measures.mp3

22.2 MB

74 - Preventative Measures.mp4

307.3 MB

75 - Recovery Strategies.mp3

27.1 MB

75 - Recovery Strategies.mp4

369.5 MB

76 - Recovery Strategies Part 2.mp3

27.2 MB

76 - Recovery Strategies Part 2.mp4

317.9 MB

77 - Personnel Security.mp3

20.2 MB

77 - Personnel Security.mp4

309.4 MB

80 - Software Dev Security.mp3

28.2 MB

80 - Software Dev Security.mp4

415.7 MB

81 - Software Dev Security Part 2.mp3

28.3 MB

81 - Software Dev Security Part 2.mp4

420.5 MB

82 - Software Dev Security Part 3.mp3

30.0 MB

82 - Software Dev Security Part 3.mp4

410.3 MB

83 - Software Dev Security Part 4.mp3

24.7 MB

83 - Software Dev Security Part 4.mp4

366.2 MB

84 - Software Dev Security Part 5.mp3

24.1 MB

84 - Software Dev Security Part 5.mp4

357.1 MB

/.../1 - Architectural Concepts and Design Requirements/

1.0 - CCSP Overview (138905476).mp4

85.8 MB

3.0 - Architecture Planning Models (138969973).mp4

291.7 MB

4.0 - Security Planning Models (138905475).mp4

511.2 MB

5.0 - Hosting Provider Considerations (138905477).mp4

614.9 MB

6.0 - Security and CSP Requirements (138905474).mp4

497.6 MB

7.0 - Risk Management and the Cloud (138969997).mp4

425.5 MB

8.0 - Cloud Deployment Examples (138969995).mp4

183.7 MB

/.../2 - Cloud Data Security/

9.0 - Legal Issues with the Cloud (138969994).mp4

627.6 MB

10.0 - Dealing with Investigations (138969990).mp4

457.0 MB

11.0 - Compliance and Audits (138969992).mp4

448.5 MB

12.0 - Data Security Lifecycle (138969991).mp4

235.2 MB

13.0 - Storage Locations and Issues (138970019).mp4

321.2 MB

14.0 - Data Loss Prevention Issues (138970017).mp4

450.6 MB

15.0 - Protecting Data within the Cloud (138970016).mp4

402.8 MB

16.0 - Data Storage within the Cloud (138970015).mp4

243.4 MB

17.0 - Portability and Interoperability (138970013).mp4

472.2 MB

/.../3 - Cloud Platform and Infrastructure Security/

18.0 - CSP and Data Security (138970014).mp4

408.3 MB

19.0 - Incident Handling (138970012).mp4

463.8 MB

20.0 - BCM, BCP and DRM (139267130).mp4

405.9 MB

21.0 - Data Center Issues (139267143).mp4

393.9 MB

22.0 - Incident Response Review (139267147).mp4

363.4 MB

23.0 - Cloud Incident Response (139267160).mp4

398.7 MB

24.0 - Cloud Incident Response Part 2 (139267156).mp4

250.0 MB

/.../4 - Cloud Application Security/

25.0 - Application Security and IdEA (139462044).mp4

350.3 MB

26.0 - Additional Application Issues (139462067).mp4

382.5 MB

/ISC2_CBT/ITProTV_CCSP/5 - Operations/

27.0 - Encryption Issues (139464048).mp4

464.6 MB

28.0 - IdEA (139464087).mp4

93.1 MB

/.../6 - Legal and Compliance/

29.0 - Virtualization (139465587).mp4

426.3 MB

30.0 - Outsourcing Security to the Cloud (139575786).mp4

359.0 MB

/.../Livelessons - SSCP (Systems Security Certified Prmactitioner) Aug-2017/

1.1 Who Is (ISC)2- - SSCP (Systemas Security Certified Practitioner).TS

17.3 MB

1.2 The Systems Security Certified Practitioner (SSCP) Certification - SSCP (Systems Security Certified Practitioner).TS

22.0 MB

1.3 SSCP Exam Overview - SSCP (Systems Security Certified Practitioner).TS

9.2 MB

1.4 (ISC)2 Code of Ethics - SSCP (Systems Security Certified Practitioner).TS

14.7 MB

2.1 The Threat Landscape - SSCP (Systems Security Certified Practitioner).TS

29.4 MB

2.2 Risks and Vulnerabilities - SSCP (Systems Security Certified Practitioner).TS

69.4 MB

2.3 Threats and Threat Agents - SSCP (Systems Security Certified Practitioner).TS

39.6 MB

2.4 Motivations and Means - SSCP (Systems Security Certified Practitioner).TS

24.0 MB

2.5 Indicators of Compromise (IOCs) - SSCP (Systems Security Certified Practitioner).TS

36.4 MB

2.6 Countermeasures and Mitigation - SSCP (Systems Security Certified Practitioner).TS

29.0 MB

2.7 The Security Triad - SSCP (Systems Security Certified Practitioner).TS

53.8 MB

2.8 The Written Security Policy - SSCP (Systems Security Certified Practitioner).TS

52.0 MB

3.1 Asset Management - SSCP (Systems Security Certified Practitioner).TS

37.1 MB

3.2 Change Management - SSCP (Systems Security Certified Practitioner).TS

28.3 MB

3.3 Configuration Management - SSCP (Systems Security Certified Practitioner).TS

18.2 MB

3.4 Security Impact Assessment - SSCP (Systems Security Certified Practitioner).TS

63.4 MB

3.5 Security Awareness and Training - SSCP (Systems Security Certified Practitioner).TS

30.8 MB

3.6 Physical Security Operations - SSCP (Systems Security Certified Practitioner).TS

64.2 MB

3.7 AUP Policy Enforcement - SSCP (Systems Security Certified Practitioner).TS

57.4 MB

4.1 Risk Management Concepts - SSCP (Systems Security Certified Practitioner).TS

107.9 MB

4.2 Handling Risk - SSCP (Systems Security Certified Practitioner).TS

23.6 MB

4.3 Qualitative Risk Assessment - SSCP (Systems Security Certified Practitioner).TS

36.8 MB

4.4 Quantitative Risk Assessment - SSCP (Systems Security Certified Practitioner).TS

59.5 MB

4.5 Risk Visibility and Reporting - SSCP (Systems Security Certified Practitioner).TS

86.6 MB

4.6 Auditing Findings for Continual Improvement - SSCP (Systems Security Certified Practitioner).TS

19.9 MB

5.1 Importance of Continuous Monitoring - SSCP (Systems Security Certified Practitioner).TS

15.5 MB

5.2 Syslog - SSCP (Systems Security Certified Practitioner).TS

108.7 MB

5.3 SNMPv3 - SSCP (Systems Security Certified Practitioner).TS

24.2 MB

5.4 NetFlow - SSCP (Systems Security Certified Practitioner).TS

16.4 MB

5.5 Security Analytics, Metrics and Trends - SSCP (Systems Security Certified Practitioner).TS

16.4 MB

5.6 Visualization - SSCP (Systems Security Certified Practitioner).TS

79.6 MB

5.7 Event Data Analysis - SSCP (Systems Security Certified Practitioner).TS

10.8 MB

5.8 Communicating Findings - SSCP (Systems Security Certified Practitioner).TS

6.2 MB

6.1 AAA Defined - SSCP (Systems Security Certified Practitioner).TS

50.4 MB

6.2 Authentication Factors - SSCP (Systems Security Certified Practitioner).TS

60.7 MB

6.3 Internetwork Trust Architectures - SSCP (Systems Security Certified Practitioner).TS

33.0 MB

6.4 Trust Relationships - SSCP (Systems Security Certified Practitioner).TS

86.8 MB

6.5 Subject-based versus Object-based - SSCP (Systems Security Certified Practitioner).TS

17.5 MB

6.6 MAC versus DAC - SSCP (Systems Security Certified Practitioner).TS

20.0 MB

6.7 Role-based and Attribute-based - SSCP (Systems Security Certified Practitioner).TS

66.2 MB

6.8 Identity Management Lifecycle - SSCP (Systems Security Certified Practitioner).TS

33.2 MB

7.1 IEEE 802.1X - SSCP (Systems Security Certified Practitioner).TS

105.8 MB

7.2 802.1AE MAC Security - SSCP (Systems Security Certified Practitioner).TS

29.2 MB

7.3 RADIUS - SSCP (Systems Security Certified Practitioner).TS

63.2 MB

7.4 TACACS+ - SSCP (Systems Security Certified Practitioner).TS

77.1 MB

7.5 Network Admission Control - SSCP (Systems Security Certified Practitioner).TS

12.5 MB

7.6 Remote-Access Teleworkers - SSCP (Systems Security Certified Practitioner).TS

77.5 MB

7.7 IPSec VPN - SSCP (Systems Security Certified Practitioner).TS

58.2 MB

7.8 SSL_TLS VPN - SSCP (Systems Security Certified Practitioner).TS

59.7 MB

8.1 Social Engineering - SSCP (Systems Security Certified Practitioner).TS

87.9 MB

8.2 Spoofing - SSCP (Systems Security Certified Practitioner).TS

57.5 MB

8.3 Denial-of-Service and DDoS - SSCP (Systems Security Certified Practitioner).TS

65.6 MB

8.4 Botnets - SSCP (Systems Security Certified Practitioner).TS

26.6 MB

8.5 ZeroDay Attacks and APTs - SSCP (Systems Security Certified Practitioner).TS

36.9 MB

8.6 Buffer Overflow and Injection - SSCP (Systems Security Certified Practitioner).TS

9.8 MB

8.7 Reflection and Amplification - SSCP (Systems Security Certified Practitioner).TS

18.7 MB

8.8 Poisoning - SSCP (Systems Security Certified Practitioner).TS

61.5 MB

8.9 Phishing, Pharming, and Spam - SSCP (Systems Security Certified Practitioner).TS

89.9 MB

8.10 Hijacking - SSCP (Systems Security Certified Practitioner).TS

29.0 MB

9.1 The OSI Model - SSCP (Systems Security Certified Practitioner).TS

84.1 MB

9.2 The TCP_IP Model - SSCP (Systems Security Certified Practitioner).TS

39.4 MB

9.3 Physical Topologies - SSCP (Systems Security Certified Practitioner).TS

73.8 MB

9.4 Logical Topologies - SSCP (Systems Security Certified Practitioner).TS

67.4 MB

9.5 Common Protocols and Services - SSCP (Systems Security Certified Practitioner).TS

90.7 MB

9.6 Physical Security - SSCP (Systems Security Certified Practitioner).TS

33.5 MB

9.7 Securing Layers 2-4 - SSCP (Systems Security Certified Practitioner).TS

47.1 MB

9.8 Securing Layers 5-7 - SSCP (Systems Security Certified Practitioner).TS

71.6 MB

10.1 Overview of Network Infrastructure Protection - SSCP (Systems Security Certified Practitioner).TS

18.6 MB

10.2 Hardening the Device Planes - SSCP (Systems Security Certified Practitioner).TS

123.9 MB

10.3 Types of Security Controls - SSCP (Systems Security Certified Practitioner).TS

21.4 MB

10.4 Categories of Security Controls - SSCP (Systems Security Certified Practitioner).TS

54.2 MB

10.5 Segmentation and Zoning - SSCP (Systems Security Certified Practitioner).TS

51.7 MB

10.6 Secure Device Management - SSCP (Systems Security Certified Practitioner).TS

63.4 MB

10.7 Device Protection Best Practices - SSCP (Systems Security Certified Practitioner).TS

15.3 MB

11.1 Security Router - SSCP (Systems Security Certified Practitioner).TS

22.1 MB

11.2 Security Switches - SSCP (Systems Security Certified Practitioner).TS

79.5 MB

11.3 Firewalls - SSCP (Systems Security Certified Practitioner).TS

43.3 MB

11.4 Proxies - SSCP (Systems Security Certified Practitioner).TS

22.7 MB

11.5 NIDS and NIPS - SSCP (Systems Security Certified Practitioner).TS

140.6 MB

11.6 VPN Gateways - SSCP (Systems Security Certified Practitioner).TS

72.4 MB

11.7 Content Security Appliances - SSCP (Systems Security Certified Practitioner).TS

65.0 MB

11.8 Traffic-shaping Devices - SSCP (Systems Security Certified Practitioner).TS

19.8 MB

12.1 Overview of Wireless Technology - SSCP (Systems Security Certified Practitioner).TS

122.4 MB

12.2 Transmission Security - SSCP (Systems Security Certified Practitioner).TS

25.4 MB

12.3 Common Wireless Attacks - SSCP (Systems Security Certified Practitioner).TS

23.0 MB

12.4 Basic Countermeasures - SSCP (Systems Security Certified Practitioner).TS

23.4 MB

12.5 Wireless Infrastructure Devices - SSCP (Systems Security Certified Practitioner).TS

110.4 MB

12.6 Protecting Wireless Endpoints - SSCP (Systems Security Certified Practitioner).TS

16.2 MB

13.1 Introduction to Cryptology - SSCP (Systems Security Certified Practitioner).TS

21.1 MB

13.2 Ciphers - SSCP (Systems Security Certified Practitioner).TS

22.0 MB

13.3 Block versus Stream Ciphers - SSCP (Systems Security Certified Practitioner).TS

25.1 MB

13.4 Encryption - SSCP (Systems Security Certified Practitioner).TS

41.5 MB

13.5 Symmetric Key Systems - SSCP (Systems Security Certified Practitioner).TS

12.6 MB

13.6 Asymmetric Key Systems - SSCP (Systems Security Certified Practitioner).TS

14.9 MB

13.7 Hashing and Integrity - SSCP (Systems Security Certified Practitioner).TS

33.6 MB

14.1 Key Management - SSCP (Systems Security Certified Practitioner).TS

27.7 MB

14.2 Digital Signatures - SSCP (Systems Security Certified Practitioner).TS

25.5 MB

14.3 Web of Trust - SSCP (Systems Security Certified Practitioner).TS

8.0 MB

14.4 Public Key Infrastructure - SSCP (Systems Security Certified Practitioner).TS

93.1 MB

14.5 X.509v3 Certificates - SSCP (Systems Security Certified Practitioner).TS

40.5 MB

14.6 CA Trusts and Certificate Chaining - SSCP (Systems Security Certified Practitioner).TS

15.3 MB

14.7 Expiration, Revocation and Suspension - SSCP (Systems Security Certified Practitioner).TS

26.4 MB

14.8 Implementation of Secure Protocols - SSCP (Systems Security Certified Practitioner).TS

12.1 MB

15.1 Viruses - SSCP (Systems Security Certified Practitioner).TS

41.6 MB

15.2 Worms - SSCP (Systems Security Certified Practitioner).TS

21.4 MB

15.3 Trojan Horse (RATs) - SSCP (Systems Security Certified Practitioner).TS

34.3 MB

15.4 Ransomware and Cryptoware - SSCP (Systems Security Certified Practitioner).TS

23.5 MB

15.5 Backdoors - SSCP (Systems Security Certified Practitioner).TS

49.6 MB

15.6 Logic Bombs - SSCP (Systems Security Certified Practitioner).TS

32.1 MB

15.7 Keyloggers - SSCP (Systems Security Certified Practitioner).TS

10.5 MB

15.8 Spyware - SSCP (Systems Security Certified Practitioner).TS

9.2 MB

15.9 Stegomalware - SSCP (Systems Security Certified Practitioner).TS

16.4 MB

16.1 Identifying Malicious Code - SSCP (Systems Security Certified Practitioner).TS

48.0 MB

16.2 Indications of Compromise (IoCs) - SSCP (Systems Security Certified Practitioner).TS

21.7 MB

16.3 Survey of Attack Tools and Kits - SSCP (Systems Security Certified Practitioner).TS

13.9 MB

16.4 Malicious Code Countermeasures - SSCP (Systems Security Certified Practitioner).TS

29.3 MB

16.5 Malicious Activity Countermeasures - SSCP (Systems Security Certified Practitioner).TS

10.3 MB

17.1 Host-based IDS (HIDS) - SSCP (Systems Security Certified Practitioner).TS

20.7 MB

17.2 Personal Security Suites - SSCP (Systems Security Certified Practitioner).TS

28.8 MB

17.3 Endpoint Encryption - SSCP (Systems Security Certified Practitioner).TS

56.4 MB

17.4 Advanced Endpoint Systems - SSCP (Systems Security Certified Practitioner).TS

34.1 MB

17.5 Virtualization and Thin Clients - SSCP (Systems Security Certified Practitioner).TS

24.2 MB

17.6 Protecting Detached Storage - SSCP (Systems Security Certified Practitioner).TS

16.5 MB

17.7 Secure Browsing - SSCP (Systems Security Certified Practitioner).TS

103.7 MB

17.8 Mobile Device Security Management - SSCP (Systems Security Certified Practitioner).TS

22.9 MB

18.1 Application Security - SSCP (Systems Security Certified Practitioner).TS

48.2 MB

18.2 Mitigating Architecture and Design Vulnerabilities - SSCP (Systems Security Certified Practitioner).TS

19.9 MB

18.3 Service Models - SSCP (Systems Security Certified Practitioner).TS

58.3 MB

18.4 Data Storage and Transmission - SSCP (Systems Security Certified Practitioner).TS

51.7 MB

18.5 Third-party and Outsourcing - SSCP (Systems Security Certified Practitioner).TS

36.3 MB

18.6 Virtualization Security Overview - SSCP (Systems Security Certified Practitioner).TS

30.4 MB

18.7 Cloud Computing Models - SSCP (Systems Security Certified Practitioner).TS

61.6 MB

18.8 Operate and Secure Virtual Environments - SSCP (Systems Security Certified Practitioner).TS

58.2 MB

18.9 Securing Big Data Systems - SSCP (Systems Security Certified Practitioner).TS

19.7 MB

18.10 Legal and Privacy Concerns - SSCP (Systems Security Certified Practitioner).TS

27.3 MB

19.1 Participating in Incident Handling - SSCP (Systems Security Certified Practitioner).TS

23.6 MB

19.2 Incident Handling Lifecycle - SSCP (Systems Security Certified Practitioner).TS

129.0 MB

19.3 Supporting Forensic Investigations - SSCP (Systems Security Certified Practitioner).TS

103.3 MB

19.4 Understanding BCPs and DRPs - SSCP (Systems Security Certified Practitioner).TS

37.8 MB

19.5 Emergency Response - SSCP (Systems Security Certified Practitioner).TS

8.2 MB

19.6 Restoration Planning - SSCP (Systems Security Certified Practitioner).TS

100.8 MB

19.7 Implementing Backups and Redundancy - SSCP (Systems Security Certified Practitioner).TS

24.2 MB

19.8 Testing and Drills - SSCP (Systems Security Certified Practitioner).TS

18.8 MB

Learning objectives - SSCP (Systems Security Certified Practitioner).TS

4.3 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_2.TS

5.0 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_3.TS

4.4 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_4.TS

4.2 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_5.TS

4.2 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_6.TS

5.7 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_7.TS

4.4 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_8.TS

5.7 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_9.TS

5.3 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_10.TS

4.9 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_11.TS

4.5 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_12.TS

4.3 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_13.TS

3.7 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_14.TS

5.0 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_15.TS

4.3 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_16.TS

3.7 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_17.TS

4.5 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_18.TS

7.3 MB

Learning objectives - SSCP (Systems Security Certified Practitioner)_19.TS

4.9 MB

Module Introduction - SSCP (Systems Security Certified Practitioner).TS

5.5 MB

Module Introduction - SSCP (Systems Security Certified Practitioner)_2.TS

4.8 MB

Module Introduction - SSCP (Systems Security Certified Practitioner)_3.TS

5.1 MB

Module Introduction - SSCP (Systems Security Certified Practitioner)_4.TS

10.4 MB

Module Introduction - SSCP (Systems Security Certified Practitioner)_5.TS

4.6 MB

Module Introduction - SSCP (Systems Security Certified Practitioner)_6.TS

9.4 MB

Module Introduction - SSCP (Systems Security Certified Practitioner)_7.TS

3.2 MB

SSCP (Systems Security Certified Practitioner)- Introduction - SSCP (Systems Security Certified Practitioner).TS

36.9 MB

SSCP (Systems Security Certified Practitioner)- Summary - SSCP (Systems Security Certified Practitioner).TS

8.4 MB

Summary - SSCP (Systems Security Certified Practitioner).TS

2.7 MB

Summary - SSCP (Systems Security Certified Practitioner)_2.TS

3.2 MB

Summary - SSCP (Systems Security Certified Practitioner)_3.TS

2.8 MB

Summary - SSCP (Systems Security Certified Practitioner)_4.TS

2.9 MB

Summary - SSCP (Systems Security Certified Practitioner)_5.TS

3.1 MB

Summary - SSCP (Systems Security Certified Practitioner)_6.TS

4.0 MB

Summary - SSCP (Systems Security Certified Practitioner)_7.TS

3.1 MB

Summary - SSCP (Systems Security Certified Practitioner)_8.TS

4.0 MB

Summary - SSCP (Systems Security Certified Practitioner)_9.TS

3.6 MB

Summary - SSCP (Systems Security Certified Practitioner)_10.TS

3.3 MB

Summary - SSCP (Systems Security Certified Practitioner)_11.TS

3.0 MB

Summary - SSCP (Systems Security Certified Practitioner)_12.TS

3.1 MB

Summary - SSCP (Systems Security Certified Practitioner)_13.TS

2.8 MB

Summary - SSCP (Systems Security Certified Practitioner)_14.TS

3.8 MB

Summary - SSCP (Systems Security Certified Practitioner)_15.TS

3.0 MB

Summary - SSCP (Systems Security Certified Practitioner)_16.TS

2.5 MB

Summary - SSCP (Systems Security Certified Practitioner)_17.TS

3.3 MB

Summary - SSCP (Systems Security Certified Practitioner)_18.TS

5.6 MB

Summary - SSCP (Systems Security Certified Practitioner)_19.TS

3.8 MB

/.../01. CISSP Course Introduction/

0101 CISSP Course Introduction.mp4

5.4 MB

0102 CISSP Certification.mp4

22.9 MB

0103 CISSP Certification Requirements.mp4

10.1 MB

/.../02. Security Concepts/

0201 Information Assets - Part 1.mp4

18.1 MB

0202 Information Assets - Part 2.mp4

9.8 MB

0203 The CIA Triad - Part 1.mp4

24.7 MB

0204 The CIA Triad - Part 2.mp4

19.9 MB

0205 Risk - Part 1.mp4

13.6 MB

0206 Risk - Part 2.mp4

22.0 MB

0207 Threats To Data.mp4

19.4 MB

0208 Threat Of Litigation.mp4

20.8 MB

0209 Countermeasures.mp4

20.4 MB

0210 Roles And Responsibilities.mp4

16.1 MB

/.../03. Security Governance/

0301 Security Governance.mp4

19.2 MB

0302 The Security Program - Part 1.mp4

24.6 MB

0303 The Security Program - Part 2.mp4

20.3 MB

0304 Policies - Part 1.mp4

17.1 MB

0305 Policies - Part 2.mp4

15.9 MB

0306 Policies - Part 3.mp4

23.0 MB

0307 Control Frameworks.mp4

23.3 MB

0308 Compliance.mp4

21.2 MB

0309 Privacy And Legal Systems.mp4

17.2 MB

0310 Common Legal System And Export Controls.mp4

19.4 MB

0311 Trans-Border Information Flow.mp4

22.0 MB

0312 Intellectual Property Protection.mp4

13.5 MB

0313 DRM, IRM, And Licensing.mp4

18.2 MB

0314 Piracy And PCI DSS.mp4

25.5 MB

0315 Auditing, Reporting, And Metrics.mp4

21.8 MB

0316 Ethics.mp4

23.3 MB

0317 Cybercrime.mp4

26.7 MB

0318 Cybercrime Attackers.mp4

25.3 MB

0319 Prosecuting Cybercrime And Third Party Governance.mp4

24.0 MB

/.../04. Risk Management/

0401 Risk Management Project Initiation.mp4

22.4 MB

0402 Risk Management Framework NIST SP800-37.mp4

22.1 MB

0403 Assets.mp4

23.1 MB

0404 Quantitative Qualitative Value.mp4

23.5 MB

0405 Asset Classification.mp4

33.5 MB

0406 Threat Analysis.mp4

9.4 MB

0407 ALE.mp4

15.6 MB

0408 Countermeasures - Part 1.mp4

18.5 MB

0409 Countermeasures - Part 2.mp4

23.4 MB

0410 Cost Justification.mp4

22.1 MB

0411 Dealing With Risk.mp4

23.3 MB

0412 Approvals.mp4

18.4 MB

0413 Completing The Risk Management Project.mp4

20.2 MB

0414 BCP And DRP.mp4

23.0 MB

0415 BCP, DRP, BIA, And MTD.mp4

38.0 MB

0416 RPO And RTO.mp4

24.1 MB

/.../05 Personnel Security/

0501 Personnel Security.mp4

16.1 MB

0502 Separation Of Duties.mp4

20.3 MB

0503 Fraud Prevention And Detection.mp4

24.0 MB

0504 Monitoring And Enforcement.mp4

19.8 MB

0505 Pre-Hire Screening And Agreements.mp4

19.8 MB

0506 Onboarding.mp4

19.0 MB

0507 Account Provisioning.mp4

21.8 MB

0508 Monitoring And Termination.mp4

21.9 MB

0509 Termination.mp4

12.8 MB

/.../06. Security Awareness Training/

0601 Security Awareness Training.mp4

18.3 MB

0602 Security Awareness Training Topics - Part 1.mp4

25.1 MB

0603 Security Awareness Training Topics - Part 2.mp4

18.6 MB

0604 Privileged Users.mp4

23.7 MB

0605 Enforcement.mp4

10.8 MB

/.../07. Wrap Up/

0701 Wrap Up.mp4

12.0 MB

/.../01. Asset Security Introduction/

01_01-Introduction.mp4

7.5 MB

/.../02. The Information Lifecycle/

02_01-Information Lifecycle.mp4

32.1 MB

02_02-Information Assets.mp4

21.6 MB

02_03-Location Of Information Assets.mp4

21.1 MB

02_04-Access Control And CIA.mp4

25.5 MB

02_05-CIA.mp4

4.7 MB

/.../03. Roles And Responsibilities/

03_01-Senior Management.mp4

16.8 MB

03_02-Security Professional.mp4

15.1 MB

03_03-Data Owner, System Custodian, And User.mp4

21.5 MB

03_04-Third Party Service Providers.mp4

16.8 MB

/.../04. Data Classification/

04_01-Data Classification Part 1.mp4

15.3 MB

04_02-Data Classification Part 2.mp4

16.9 MB

04_03-The Data Classification Process.mp4

21.3 MB

04_04-Inventory.mp4

17.1 MB

04_05-Asset Value And Criteria.mp4

22.2 MB

04_06-Protections.mp4

16.8 MB

04_07-Labeling.mp4

16.8 MB

04_08-Technologies.mp4

24.4 MB

04_09-Monitoring And Training.mp4

19.3 MB

/.../05. Data Retention/

05_01-Data Retention Part 1.mp4

24.6 MB

05_02-Data Retention Part 2.mp4

11.7 MB

/.../06. Security Controls/

06_01-ATP Part 1.mp4

26.2 MB

06_02-ATP Part 2.mp4

22.3 MB

06_03-ATP Part 3.mp4

30.7 MB

06_04-Baselines Part 1.mp4

18.8 MB

06_05-Baselines Part 2.mp4

28.6 MB

06_06-Baselines Part 3.mp4

9.5 MB

06_07-Configuration Management Part 1.mp4

21.6 MB

06_08-Configuration Management Part 2.mp4

22.0 MB

06_09-Configuration Management Part 3.mp4

24.2 MB

06_10-Data And Media Handling.mp4

20.8 MB

06_11-Data Remanence.mp4

20.8 MB

06_12-Secure Deletion Part 1.mp4

18.5 MB

06_13-Secure Deletion Part 2.mp4

22.7 MB

/.../07. Wrap Up/

07_01-Conclusion.mp4

11.5 MB

/.../01. Security Engineering Introduction/

01_01-Introduction.mp4

20.3 MB

/.../02. Security Models/

02_01-Introduction To Security Models.mp4

18.4 MB

02_02-BellLapadula.mp4

23.1 MB

02_03-Biba.mp4

20.6 MB

02_04-Applying The Models.mp4

19.2 MB

02_05-ClarkWilson.mp4

16.9 MB

02_06-ClarkWilson BrewerNash.mp4

13.0 MB

02_07-TCB.mp4

25.5 MB

02_08-TCSEC.mp4

19.7 MB

02_09-ITSEC.mp4

10.4 MB

02_10-Common Criteria.mp4

14.3 MB

/.../03. Computer Hardware Architecture/

03_01-Overview.mp4

20.4 MB

03_02-CPU.mp4

22.9 MB

03_03-Motherboard.mp4

15.0 MB

03_04-Memory.mp4

17.8 MB

03_05-Virtual Memory.mp4

27.7 MB

03_06-Memory.mp4

19.7 MB

03_07-TPM.mp4

25.1 MB

/.../04. Operating System Architecture/

04_01-Overview.mp4

23.9 MB

04_02-Four Ring Architecture.mp4

17.3 MB

04_03-Kernel Mode.mp4

18.6 MB

04_04-Features.mp4

16.2 MB

04_05-Processes Threads And Buffers.mp4

26.2 MB

04_06-Process And Memory Management.mp4

22.7 MB

04_07-Reference Monitor.mp4

16.1 MB

04_08-System Self Protection.mp4

17.6 MB

04_09-Hardened Server.mp4

20.4 MB

/.../O'Reilly - CISSP Certification Training - Domain 3/05. Virtualization/

05_01-Virtualization Overview Part 1.mp4

23.9 MB

05_02-Virtualization Overview Part 2.mp4

22.3 MB

/.../06. Information Systems And Application Architecture/

06_01-Architecture Part 1.mp4

19.1 MB

06_02-Architecture Part 2.mp4

15.4 MB

06_03-Architecture Part 3.mp4

21.1 MB

06_04-Cloud Computing Part 1.mp4

17.5 MB

06_05-Cloud Computing Part 2.mp4

15.9 MB

06_06-IoT And Industrial Controls.mp4

15.0 MB

06_07-Application Architecture.mp4

27.4 MB

06_08-Databases Part 1.mp4

18.3 MB

06_09-Databases Part 2.mp4

15.1 MB

06_10-Database Issues Part 1.mp4

16.9 MB

06_11-Database Issues Part 2.mp4

28.4 MB

06_12-Middleware.mp4

24.6 MB

06_13-Mining Databases.mp4

16.1 MB

06_14-Web Applications.mp4

21.2 MB

06_15-Mobile Code Cookies.mp4

16.7 MB

06_16-Mobile Code XSS.mp4

19.8 MB

06_17-Mobile Code Java ActiveX.mp4

18.7 MB

06_18-Web Applications Browser Email.mp4

12.8 MB

06_19-Web Applications Input Validation.mp4

10.4 MB

06_20-Web Applications OWASP.mp4

6.6 MB

/.../07. Introduction To Cryptography/

07_01-Cryptography Part 1.mp4

15.7 MB

07_02-Cryptography Part 2.mp4

13.1 MB

07_03-Cryptographic Algorithms.mp4

11.2 MB

07_04-Strong Cryptography.mp4

16.0 MB

07_05-Cryptographic Keys.mp4

12.4 MB

07_06-Key Management.mp4

19.6 MB

/.../08. Hashing Algorithms/

08_01-Introduction To Hashing Algorithms.mp4

18.3 MB

08_02-How Hashing Works.mp4

15.7 MB

08_03-Hashing Algorithms.mp4

21.3 MB

08_04-Strong Hashing Algorithms.mp4

9.5 MB

08_05-Hashing Services.mp4

24.9 MB

/.../09. Symmetric Key Algorithms/

09_01-Symmetric Key Cryptography.mp4

20.8 MB

09_02-Symmetric Key Services.mp4

31.2 MB

09_03-Symmetric Key Algorithms.mp4

30.7 MB

09_04-Cracking Symmetric Key Algorithms.mp4

10.5 MB

09_05-Vigenere Symmetric Key Algorithm.mp4

32.1 MB

09_07-Kerckhoffs And Gilbert Vernam.mp4

16.6 MB

09_08-Hebern, Enigma, Feistel, S And T.mp4

19.4 MB

09_09-Block Ciphers And Stream Ciphers.mp4

15.5 MB

09_10-DES And 3DES.mp4

21.1 MB

09_11-AES, Block Ciphers And Variables.mp4

20.2 MB

09_12-Block Cipher Modes ECB And CBC.mp4

19.7 MB

09_13-Block Cipher Modes OFB And CFB.mp4

28.2 MB

09_14-Block Cipher Modes CTR.mp4

10.4 MB

09_15-Message Authentication Code.mp4

13.8 MB

09_16-MAC And HMAC.mp4

31.5 MB

09_17-CBCMAC And Symmetric Summary.mp4

16.4 MB

/.../10. Asymmetric Key Algorithms/

10_01-Asymmetric Key Cryptography.mp4

21.3 MB

10_02-Asymmetric Key Services.mp4

25.3 MB

10_03-Asymmetric Key Management.mp4

21.6 MB

10_04-Key Distribution And Digital Signature.mp4

23.8 MB

10_05-Digital Signature.mp4

17.9 MB

10_06-Confidentiality And Digital Signature.mp4

25.8 MB

10_08-SSL And TLS.mp4

25.5 MB

10_09-Asymmetric Key Algorithms Diffie Hellman Merkle.mp4

25.7 MB

10_10-RSA, ELGamal, ECC And DSS.mp4

24.9 MB

10_11-Asymmetric Key Cryptography Review.mp4

19.5 MB

/.../11. Cryptography In Use/

11_01-Link EndToEnd PKI.mp4

21.0 MB

11_03-PKI Part 2.mp4

14.9 MB

11_04-PGP And SMIME.mp4

16.3 MB

11_05-Set.mp4

20.4 MB

11_06-VPN, SSL, TLS And Protocols.mp4

19.1 MB

/.../12. Attacks On Cryptography/

12_01-Introduction To Attacks On Cryptography.mp4

17.5 MB

12_02-Brute Force, Dictionary, Hybrid And Rainbow.mp4

19.0 MB

12_03-Plaintext, Ciphertext And Adaptive.mp4

22.1 MB

/.../13. Physical Security/

13_01-Introduction To Physical Security.mp4

17.8 MB

13_02-Goals And Facility.mp4

19.2 MB

13_03-Perimeter Defense And Access Control.mp4

16.9 MB

13_04-Security Zones And Environment.mp4

15.6 MB

13_05-Electrical Issues.mp4

18.5 MB

13_06-Fire Safety.mp4

19.3 MB

13_07-Fire Detectors.mp4

11.8 MB

13_08-Fire Extinguishers And Sprinklers.mp4

17.6 MB

13_09-Gas Suppressants And Fire Training.mp4

16.3 MB

/.../O'Reilly - CISSP Certification Training - Domain 3/14. Conclusion/

14_01-Wrap Up.mp4

18.7 MB

/.../O'Reilly - CISSP Certification Training - Domain 4/01. Introduction/

01_01-CISSP Introduction.mp4

28.3 MB

/.../02. The Open Systems Interconnection Model/

02_01-Introduction To The OSI Model.mp4

20.2 MB

02_02-OSI Layers 7 And 6.mp4

15.2 MB

02_03-OSI Layer 5.mp4

19.3 MB

02_04-OSI Layer 4.mp4

18.9 MB

02_06-OSI Layer 4 Port Numbers.mp4

27.4 MB

02_07-OSI Layer 3.mp4

26.9 MB

02_08-OSI Layer 3 IPv4 Header And Addressing.mp4

21.6 MB

02_09-OSI Layer 3 IPv4 Addressing.mp4

27.0 MB

02_10-OSI Layer 3 IPv6 Addressing.mp4

20.1 MB

02_11-OSI Layer 3 IPv6 IPconfig RIRs.mp4

18.8 MB

02_12-OSI Layer 3 Routing Decision.mp4

12.5 MB

02_13-OSI Layer 2 Part 1.mp4

16.9 MB

02_14-OSI Layer 2 Part 2.mp4

23.7 MB

02_15-OSI Layer 2 MAC Addresses And ARP.mp4

26.2 MB

02_16-OSI Layer 2 ARP Cache Poisoning And Error Detection.mp4

25.8 MB

02_17-OSI Layer 1 And IEEE 802.mp4

19.9 MB

/.../03. Transmission Media And Technologies/

03_01-Transmission Media And Technologies.mp4

21.4 MB

03_02-Media And Fiber Optic Cable.mp4

20.0 MB

03_03-Media Coax UTP STP.mp4

20.0 MB

03_04-Media UTP STP.mp4

19.1 MB

03_05-Media Wireless.mp4

12.0 MB

03_06-Modulation And Encoding.mp4

14.9 MB

03_07-Modulation Encoding And Multiplexing.mp4

18.1 MB

03_08-Network Topologies.mp4

17.4 MB

03_09-Network Types And Sizes.mp4

20.0 MB

03_10-Transmission Types.mp4

22.3 MB

03_11-Circuit Switching.mp4

15.3 MB

03_12-Packet Switching.mp4

20.9 MB

03_13-Media Access Polling.mp4

15.6 MB

03_14-Media Access Token Passing.mp4

19.5 MB

03_15-Media Access CSMA CA.mp4

25.0 MB

03_16-Media Access CSMA CD.mp4

22.3 MB

/.../04. Network Infrastructures And Application Architecture/

04_01-Network Infrastructure And App Architecture.mp4

19.3 MB

04_02-Mainframes.mp4

9.6 MB

04_03-Endpoint Systems.mp4

23.0 MB

04_04-Network Services.mp4

29.1 MB

04_05-Segments Subnets And Domains Part 1.mp4

17.1 MB

04_06-Segments Subnets And Domains Part 2.mp4

19.5 MB

04_07-Layer 1 Devices.mp4

13.7 MB

04_08-Layer 2 Devices Part 1.mp4

20.6 MB

04_09-Layer 2 Devices Part 2.mp4

20.2 MB

04_10-Layer 3 Devices Introduction.mp4

21.9 MB

04_11-Layer 3 Dynamic Routing Protocols.mp4

21.3 MB

04_12-Firewalls Generations 1 And 2.mp4

25.5 MB

04_13-Firewalls Generations 3, 4, And 5.mp4

19.7 MB

04_14-Firewall Security.mp4

23.9 MB

04_15-DHCP.mp4

22.1 MB

04_16-Name Resolution Services.mp4

17.9 MB

04_17-DNS Part 1.mp4

17.5 MB

04_18-DNS Part 2.mp4

23.2 MB

04_19-DNS Part 3.mp4

22.3 MB

04_20-Authentication Services.mp4

24.3 MB

04_21-SAN And SDN.mp4

15.7 MB

04_22-Network Access Control.mp4

19.5 MB

/.../05. Wireless Networking/

05_01-Wireless Networking Part 1.mp4

23.4 MB

05_02-Wireless Networking Part 2.mp4

20.5 MB

05_03-Wireless Security.mp4

19.6 MB

05_04-Wireless Security 802.11i.mp4

25.5 MB

05_05-Wireless Security Review.mp4

20.9 MB

05_06-MIMO And Attacks On Wireless Networks.mp4

19.9 MB

/.../O'Reilly - CISSP Certification Training - Domain 4/06. Protocols/

06_01-IGMP.mp4

18.6 MB

06_02-ICMP.mp4

22.1 MB

06_03-NAT And PAT.mp4

29.3 MB

06_04-Telnet, SSH, FTP, And SNMP.mp4

19.8 MB

06_05-Email Protocols.mp4

18.0 MB

06_06-IM, HTTP, And HTTPS.mp4

17.9 MB

06_07-File And Print And QoS.mp4

9.6 MB

06_08-VPN, SSH, And PPTP.mp4

12.8 MB

06_09-IPsec VPN.mp4

18.1 MB

06_10-IPsec VPN IKE, SA, SPI, And DH.mp4

18.5 MB

06_11-IPsec VPN AH, ESP, Transport Tunnel.mp4

19.9 MB

06_12-VPN L2TP, SSTP, SSL, TLS.mp4

19.5 MB

06_13-SCADA DNP3 Ports.mp4

13.0 MB

/.../07. Network Technologies/

07_01-PAN And LAN.mp4

17.5 MB

07_02-MAN.mp4

19.9 MB

07_03-MAN, SONET, And WAN.mp4

17.9 MB

07_04-WAN ISDN, PBX, X.25, FR.mp4

19.7 MB

07_05-WAN ATM, MPLS, VOIP.mp4

21.3 MB

07_06-WAN VoIP Satellite.mp4

15.0 MB

/.../08. Attacks On Networks/

08_01-Untargeted And Targeted.mp4

23.0 MB

08_02-Vectors And DoS.mp4

18.5 MB

08_03-DoS And DDoS.mp4

21.9 MB

08_04-APT.mp4

10.9 MB

08_05-Info Theft And Cellular.mp4

24.4 MB

/.../09. Wrap Up/

09_01-Wrap Up.mp4

6.3 MB

/.../01. Identity And Access Management/

01_01-About The Instructor.mp4

14.8 MB

/.../02. Introduction And Key Terms/

02_01-Key Terms Part 1.mp4

19.5 MB

02_02-Key Terms Part 2.mp4

18.2 MB

/.../03. Identification And Authentication/

03_01-Provisioning Part 1.mp4

21.1 MB

03_02-Provisioning Part 2.mp4

17.8 MB

03_03-Provisioning Part 3.mp4

25.4 MB

03_04-Identification And Authentication Mechanisms.mp4

24.7 MB

03_05-Something You Know Part 1.mp4

19.1 MB

03_06-Something You Know Part 2.mp4

22.0 MB

03_07-Something You Know Part 3.mp4

21.2 MB

03_08-Password Management.mp4

21.7 MB

03_09-Attacks On Passwords Part 1.mp4

25.9 MB

03_10-Attacks On Passwords Part 2.mp4

21.0 MB

03_11-Authentication Protocols.mp4

19.9 MB

03_12-Something You Have.mp4

19.0 MB

03_13-Memory Card Smart Card.mp4

17.1 MB

03_14-Token Devices.mp4

16.4 MB

03_15-Challenge Response Token Devices.mp4

9.3 MB

03_16-X.509 Digital Certificates.mp4

14.9 MB

03_17-Something You Are.mp4

17.1 MB

03_18-Biometrics Part 1.mp4

19.6 MB

03_19-Biometrics Part 2.mp4

16.0 MB

03_20-Errors In Biometrics.mp4

15.6 MB

03_21-Multifactor And Mutual Authentication.mp4

16.4 MB

/.../04. Single SignOn And Federated Identity Management/

04_01-SSO And Federated Identity Management.mp4

21.4 MB

04_02-X.500 Directory Services Part 1.mp4

18.4 MB

04_03-X.500 Directory Services Part 2.mp4

21.2 MB

04_04-Kerberos Part 1.mp4

21.2 MB

04_05-Kerberos Part 2.mp4

27.1 MB

04_06-Kerberos Part 3.mp4

17.9 MB

04_07-Sesame.mp4

15.3 MB

04_08-Federated Identity Management X.500.mp4

22.7 MB

04_09-Federated Identity Management SAML, OpenID, And IDaaS.mp4

23.4 MB

/.../O'Reilly - CISSP Certification Training - Domain 5/05. Authorization/

05_01-Authorization And Access Controls.mp4

28.8 MB

05_02-Access Control Types Part 1.mp4

17.9 MB

05_03-Access Control Types Part 2.mp4

27.3 MB

05_04-Access Control Types Part 3.mp4

21.8 MB

05_05-Obscurity Layers Authorization Lifecycle.mp4

20.3 MB

05_06-Access Control Models MAC Part 1.mp4

24.6 MB

05_07-Access Control Models MAC Part 2.mp4

15.2 MB

05_08-Access Control Models DAC Part 1.mp4

22.2 MB

05_09-Access Control Models DAC Part 2.mp4

23.2 MB

05_10-Access Control Matrix.mp4

12.3 MB

05_11-Access Control Models RBAC.mp4

20.9 MB

05_12-Access Control Models Rule Based.mp4

17.1 MB

05_13-Centralized And Decentralized Access Control Models Part 1.mp4

23.0 MB

05_14-Centralized And Decentralized Access Control Models Part 2.mp4

7.3 MB

05_15-Distributed Hybrid Access Control Models.mp4

8.7 MB

05_16-Controlling Remote Access Radius Part 1.mp4

21.0 MB

05_17-Controlling Remote Access Radius Part 2.mp4

31.1 MB

05_18-Controlling Remote Access TACACS Diameter.mp4

20.7 MB

05_19-Credential Management Content Context.mp4

21.4 MB

05_20-Additional Access Controls.mp4

23.7 MB

05_21-Attacks On Authorization.mp4

8.9 MB

/.../O'Reilly - CISSP Certification Training - Domain 5/06. Conclusion/

06_01-Wrap Up.mp4

14.0 MB

/.../01.Security Assessment And Testing/

0101.Introduction.mp4

44.2 MB

/.../02.Security Control Testing Strategies/

0201.Security Control Testing Strategies Overview .mp4

40.4 MB

0202.The Security Assessment.mp4

27.2 MB

0203.Vulnerability Testing - Part 1.mp4

35.5 MB

0204.Vulnerability Testing - Part 2.mp4

31.5 MB

0205.Vulnerability Testing - Part 3.mp4

46.8 MB

0206.Penetration Testing.mp4

39.2 MB

0207.Passive Reconnaissance.mp4

44.9 MB

0208.Active Reconnaissance.mp4

33.6 MB

0209.Exploit And Entrench.mp4

44.2 MB

0210.Covering Tracks. Pillage. Pivot. Post Test.mp4

48.4 MB

0211.Social Engineering - Part 1.mp4

35.2 MB

0212.Social Engineering - Part 2.mp4

41.5 MB

0213.Secure Code Review.mp4

33.7 MB

0214.Application Testing.mp4

47.5 MB

0215.Testing Users. Internal. External.mp4

44.2 MB

/.../03.Collecting Security Process Data/

0301.Collecting Security Process Data.mp4

48.8 MB

/.../O'Reilly - CISSP Certification Training - Domain 6/04.Auditing/

0401.Auditing.mp4

40.6 MB

/.../05.Wrap Up/

0501.Conclusion.mp4

32.4 MB

/.../O'Reilly - CISSP Certification Training - Domain 7/

0101 Introduction.mp4

23.4 MB

0201 Change Management.mp4

24.0 MB

0202 Physical, Virtual, And Cloud.mp4

27.5 MB

0203 Infrastructure And Firewalls.mp4

21.7 MB

0204 Security Components.mp4

29.3 MB

0205 Services, Servers, WS, And VOIP.mp4

24.2 MB

0206 Apps, Protocols, And Users.mp4

25.4 MB

0207 Asset Inventory.mp4

21.3 MB

0208 Planning.mp4

21.7 MB

0209 Acquisition.mp4

26.0 MB

0210 Deployment.mp4

23.7 MB

0301 Maintenance.mp4

19.8 MB

0302 Repairs And AV.mp4

25.1 MB

0303 Logging.mp4

25.5 MB

0304 Remote Log Repository.mp4

27.5 MB

0305 Auditing.mp4

10.5 MB

0306 IDS And IPS.mp4

19.2 MB

0307 NIDS.mp4

26.3 MB

0308 NIDS, NIPS, And HIPS.mp4

23.1 MB

0309 DLP.mp4

21.4 MB

0310 Honeypot, Honeynet, And Honeytoken.mp4

23.7 MB

0311 SIEM And Inspections.mp4

17.7 MB

0312 Monitoring Users.mp4

23.9 MB

0313 Configuration And Performance Testing.mp4

26.5 MB

0314 Vulnerability And Penetration Testing.mp4

27.3 MB

0315 Reports And Decommissioning.mp4

22.8 MB

0401 Incident Response Introduction.mp4

12.9 MB

0402 Escalation Process.mp4

14.7 MB

0403 Litigation And Criminal Act.mp4

16.1 MB

0404 Preparation.mp4

18.1 MB

0405 Detection And Containment.mp4

26.4 MB

0406 Eradication.mp4

14.4 MB

0407 Recovery And Incident Review.mp4

13.9 MB

0501 Investigations.mp4

22.3 MB

0502 Evidence - Part 1.mp4

18.7 MB

0503 Evidence - Part 2.mp4

15.5 MB

0504 Digital Forensics.mp4

29.0 MB

0505 Legal Proceedings And EDiscovery.mp4

26.7 MB

0601 BCP And DRP Introduction.mp4

17.3 MB

0602 BCP And DRP Timelines.mp4

38.2 MB

0603 BCP And DRP Details.mp4

24.6 MB

0604 DRP Planning And BIA.mp4

22.5 MB

0605 DRP Plan Development.mp4

18.0 MB

0606 DR Teams And Plan Testing.mp4

23.8 MB

0607 DRP Approval Initiation And Termination.mp4

21.2 MB

0608 Maintaining The Plans.mp4

13.6 MB

0701 Recovery Strategies.mp4

21.8 MB

0702 Alternate Facilities - Part 1.mp4

21.1 MB

0703 Alternate Facilities - Part 2.mp4

19.6 MB

0704 Network Recovery.mp4

21.8 MB

0705 Raid 0 1.mp4

21.5 MB

0706 Raid 2 3 4 5 And Parity.mp4

20.3 MB

0707 Full Backup.mp4

19.3 MB

0708 INC Diff Backups.mp4

20.7 MB

0709 Backups Electronic Vaulting And Shadow Copies.mp4

26.9 MB

0710 Journaling, RPO, And RTO.mp4

24.2 MB

0711 Recovery Of Services And Personnel.mp4

28.2 MB

0801 Physical Security And Safety.mp4

21.4 MB

0901 Wrap Up.mp4

13.6 MB

/.../O'Reilly - CISSP Certification Training - Domain 8/

0101 Application Architecture Introduction.mp4

30.1 MB

0102 Application Architecture Review.mp4

26.7 MB

0201 The Software Development Lifecycle.mp4

20.8 MB

0202 CMM, SDL, And OWASP.mp4

25.7 MB

0203 Waterfall, Spiral, And Prototyping.mp4

19.4 MB

0204 Agile Development Platforms And DevOps.mp4

21.2 MB

0301 Risks Within Software.mp4

31.2 MB

0302 Buffer Overflow And Injection.mp4

28.9 MB

0401 Development Environment, Version Control, And Security Controls.mp4

20.6 MB

0402 Stack Canary, NX Memory, And Garbage Collection.mp4

24.4 MB

0403 Sandboxing.mp4

12.4 MB

0404 Input, Process, And Output Controls.mp4

25.3 MB

0405 Software Development Controls Summary.mp4

20.9 MB

0501 Code And Software Testing.mp4

19.5 MB

0502 Web Application Testing.mp4

23.6 MB

0601 Wrap Up.mp4

13.5 MB

/.../Pearson Certification - CISSP Video Course/

1.Introduction.mp4

38.3 MB

2.Information Security and Risk Management.mp4

8.8 MB

3.Mainframe Days.mp4

28.6 MB

4.TodayGÇÖs Environment.mp4

9.1 MB

5.Security Definitions.mp4

15.4 MB

6.Examples of Some Vulnerabilities that Are Not Always Obvious.mp4

15.3 MB

8.Relationships.mp4

8.9 MB

10.AIC Triad.mp4

27.0 MB

12.Social Engineering.mp4

24.2 MB

13.What Security People Are Really Thinking.mp4

13.2 MB

14.Security Concepts.mp4

10.1 MB

16.The Bad Guys Are Motivated.mp4

16.0 MB

17.Open Standards.mp4

11.8 MB

18.Without Standards.mp4

8.0 MB

19.Controls.mp4

31.4 MB

20.Holistic Security.mp4

29.4 MB

21.Different Types of Law.mp4

35.2 MB

23.Due Diligence and Due Care.mp4

12.6 MB

24.Prudent Person Rule.mp4

38.1 MB

25.Risk Management.mp4

55.4 MB

26.Planning Stage GÇö Scope.mp4

11.5 MB

27.Planning Stage GÇö Analysis Method.mp4

7.2 MB

28.Risk Management Tools.mp4

9.4 MB

29.Defining Acceptable Levels.mp4

18.1 MB

30.Acceptable Risk Level.mp4

6.6 MB

31.Collecting and Analyzing Data Methods.mp4

11.2 MB

33.Data Collection GÇö Identify Assets.mp4

5.5 MB

34.Data Collection GÇö Assigning Values.mp4

10.5 MB

35.Asset Value.mp4

6.4 MB

36.Data Collection GÇö Identify Threats.mp4

13.7 MB

37.Data Collection GÇö Calculate Risks.mp4

17.1 MB

38.Scenario Based GÇö Qualitative.mp4

3.7 MB

39.Risk Approach.mp4

2.5 MB

40.Qualitative Analysis Steps.mp4

6.9 MB

42.Qualitative Risk Analysis.mp4

26.7 MB

43.ARO Values.mp4

62.7 MB

45.Risk Types.mp4

7.0 MB

46.Losses.mp4

15.3 MB

47.CostBenefit Analysis.mp4

6.6 MB

48.Cost of a Countermeasure.mp4

14.7 MB

49.CostBenefit Analysis Countermeasure Criteria.mp4

30.6 MB

50.Calculating CostBenefit.mp4

6.2 MB

51.Controls II.mp4

21.5 MB

52.Quantitative Analysis.mp4

24.3 MB

54.Uncertainty Analysis.mp4

12.7 MB

55.Dealing with Risk.mp4

14.5 MB

56.ManagementGÇÖs Response to Identified Risks.mp4

8.6 MB

57.Risk Acceptance.mp4

7.5 MB

58.Risk Analysis Process Summary.mp4

6.4 MB

59.Components of Security Program.mp4

8.2 MB

60.A Layered Approach.mp4

9.0 MB

61.In Security You Never Want Any Surprises.mp4

9.3 MB

62.Building Foundation.mp4

4.3 MB

63.Security Roadmap.mp4

16.6 MB

64.Functional and Assurance Requirements.mp4

10.0 MB

65.Most Organizations.mp4

29.8 MB

66.Silo Security Structure.mp4

14.8 MB

67.Security Is a Process.mp4

11.8 MB

68.Approach to Security Management.mp4

5.3 MB

69.Result of Battling Management.mp4

4.7 MB

70.Industry Best Practices Standards.mp4

15.5 MB

71.Pieces and Parts.mp4

7.0 MB

72.Numbering.mp4

12.4 MB

73.New ISO Standards.mp4

15.5 MB

74.COBIT.mp4

17.6 MB

75.Measurements.mp4

3.5 MB

76.Information Technology Infrastructure Library.mp4

20.1 MB

77.Security Governance.mp4

40.2 MB

78.Security Program Components.mp4

4.7 MB

79.Policy Framework.mp4

47.5 MB

80.Standards.mp4

34.8 MB

81.Data Collection for Metrics.mp4

20.6 MB

82.Tying Them Together.mp4

10.6 MB

83.Entity Relationships.mp4

708.3 KB

84.Senior ManagementGÇÖs Role.mp4

11.5 MB

85.Security Roles.mp4

42.8 MB

86.Information Classification.mp4

6.9 MB

87.Data Leakage.mp4

8.1 MB

89.Types of Classification Levels.mp4

8.4 MB

90.Data Protection Levels.mp4

4.4 MB

91.Classification Program Steps.mp4

32.3 MB

92.Classification Levels.mp4

25.3 MB

93.Information Owner Requirements.mp4

8.8 MB

94.Clearly Labeled.mp4

11.0 MB

95.Testing Classification Program.mp4

6.9 MB

96.Employee Management.mp4

3.0 MB

97.Employee Position and Management.mp4

8.3 MB

98.Hiring and Firing Issues.mp4

15.6 MB

99.Unfriendly Termination.mp4

23.5 MB

100.Security Awareness and Training.mp4

10.1 MB

101.Training Characteristics.mp4

10.8 MB

102.Security Enforcement Issues.mp4

9.4 MB

103.Answer This Question.mp4

11.9 MB

104.Domain 1 Review.mp4

33.0 MB

105.Access Control.mp4

3.3 MB

106.Agenda 1.mp4

13.8 MB

107.Access Control Mechanism Examples.mp4

11.3 MB

108.Technical Controls.mp4

4.5 MB

109.Access Control Characteristics.mp4

20.5 MB

110.Preventive Controls.mp4

19.4 MB

111.Control Combinations.mp4

2.6 MB

112.Detective GÇö Administrative Control.mp4

23.0 MB

113.Detective Examples.mp4

3.9 MB

114.Administrating Access Control.mp4

23.1 MB

115.Authorization Creep.mp4

10.4 MB

116.Accountability and Access Control.mp4

15.3 MB

117.Trusted Path.mp4

31.2 MB

118.Fake Login Pages Look Convincing.mp4

9.7 MB

120.Identification Issues.mp4

8.6 MB

121.Authentication Mechanisms Characteristics.mp4

7.9 MB

122.Strong Authentication.mp4

9.6 MB

123.Fraud Controls.mp4

12.1 MB

124.Internal Control Tool Separation of Duties.mp4

10.5 MB

125.Authentication Mechanisms in Use Today.mp4

18.6 MB

126.Verification Steps.mp4

8.5 MB

127.What a Person Is.mp4

3.8 MB

130.Iris Sampling.mp4

4.9 MB

131.Finger Scan.mp4

3.8 MB

132.Hand Geometry.mp4

18.8 MB

133.Downfalls to Biometric Use.mp4

9.5 MB

134.Biometrics Error Types.mp4

11.9 MB

135.Crossover Error Rate.mp4

18.4 MB

136.Biometric System Types.mp4

24.1 MB

137.Passwords.mp4

52.2 MB

138.Password Attacks.mp4

11.7 MB

139.Attack Steps.mp4

11.9 MB

140.Many Tools to Break Your Password.mp4

5.2 MB

141.Rainbow Table.mp4

7.4 MB

142.Passwords Should NOT ContainGǪ.mp4

9.4 MB

143.Countermeasures for Password Cracking.mp4

11.9 MB

144.Cognitive Passwords.mp4

4.6 MB

145.One-Time Password Authentication.mp4

16.8 MB

146.Synchronous Token.mp4

11.3 MB

147.One Type of Solution.mp4

14.1 MB

148.Administrator Configures.mp4

907.1 KB

149.Challenge Response Authentication.mp4

16.5 MB

150.Asynchronous Token Device.mp4

23.6 MB

151.Challenge Response Authentication.mp4

1.5 MB

152.Cryptographic Keys.mp4

7.8 MB

153.Passphrase Authentication.mp4

7.6 MB

154.Key Protection.mp4

2.3 MB

155.Memory Cards.mp4

14.7 MB

156.Memory Card Characteristics.mp4

4.4 MB

157.Smart Card.mp4

4.7 MB

158.Characteristics.mp4

12.2 MB

159.Card Types.mp4

4.1 MB

160.Smart Card Attacks.mp4

16.6 MB

161.Software Attack.mp4

6.0 MB

162.Side Channel Attack.mp4

9.5 MB

163.Side Channel Data Collection.mp4

4.9 MB

164.Microprobing.mp4

9.5 MB

165.Identity Management.mp4

25.1 MB

167.Some Current Issues.mp4

14.3 MB

168.Management.mp4

31.8 MB

169.Typical Chaos.mp4

3.7 MB

170.Different Identities.mp4

10.5 MB

171.Identity Management Technologies.mp4

8.7 MB

172.Directory Component.mp4

13.9 MB

173.Enterprise Directory.mp4

4.0 MB

174.Directory Responsibilities.mp4

11.0 MB

175.Authoritative Sources.mp4

18.8 MB

176.Meta Directory.mp4

14.1 MB

177.Directory Interactions.mp4

8.7 MB

178.Web Access Management.mp4

15.3 MB

179.Web Access.mp4

23.7 MB

180.Password Management.mp4

24.7 MB

181.Legacy Single Sign-On.mp4

28.8 MB

182.Account Management Systems.mp4

25.4 MB

183.Provisioning Component.mp4

32.8 MB

184.Profile Update.mp4

16.0 MB

185.Working Together.mp4

17.0 MB

186.Enterprise Directory.mp4

4.4 MB

187.Identity Management Solution Components.mp4

31.1 MB

188.Federated Identity.mp4

25.4 MB

189.Identity Theft.mp4

13.8 MB

190.Fake Login Tools.mp4

15.6 MB

191.Instructional Emails.mp4

14.9 MB

192.Knowing What You Are Disposing of Is Important.mp4

6.8 MB

193.Other Examples.mp4

5.0 MB

194.Another Danger to Be Aware ofGǪ Spyware.mp4

22.1 MB

197.New Spyware Is Being Identified Every Week.mp4

12.3 MB

198.How to Prevent Spyware.mp4

13.9 MB

199.Different Technologies.mp4

4.2 MB

200.Single Sign-on Technology.mp4

34.4 MB

201.Security Domain.mp4

15.4 MB

202.Domains of Trust.mp4

5.6 MB

203.Thin Clients.mp4

10.4 MB

204.Example.mp4

6.2 MB

205.Kerberos as a Single Sign-on Technology.mp4

65.2 MB

206.Tickets.mp4

35.6 MB

208.Issues Pertaining to Kerberos.mp4

8.5 MB

209.Kerberos Issues.mp4

8.9 MB

210.SESAME as a Single Sign-on Technology.mp4

6.8 MB

211.SESAME Steps for Authentication.mp4

10.5 MB

212.Combo.mp4

6.2 MB

213.Models for Access.mp4

9.6 MB

214.Access Control Models.mp4

10.8 MB

215.ACL Access.mp4

5.6 MB

216.File Permissions.mp4

12.5 MB

217.Security Issues.mp4

14.1 MB

218.Mandatory Access Control Model.mp4

12.7 MB

219.MAC Enforcement Mechanism GÇö Labels.mp4

21.8 MB

220.Formal Model.mp4

3.9 MB

221.Software and Hardware.mp4

10.2 MB

222.Software and Hardware Guards.mp4

18.2 MB

223.MAC versus DAC.mp4

4.7 MB

224.Role-Based Access Control.mp4

12.8 MB

225.RBAC Hierarchy.mp4

19.1 MB

226.Rule-Based Access Control.mp4

23.7 MB

227.Firewall Example.mp4

1.4 MB

228.Access Control Matrix.mp4

11.1 MB

229.Temporal Access Control.mp4

9.6 MB

230.Access Control Administration.mp4

21.5 MB

231.Remote Centralized Administration.mp4

17.0 MB

232.RADIUS.mp4

10.6 MB

233.RADIUS Characteristics.mp4

7.3 MB

234.TACACS+ Characteristics.mp4

16.7 MB

235.Diameter Characteristics.mp4

25.2 MB

236.Diameter Protocol.mp4

5.5 MB

237.Mobile IP.mp4

17.0 MB

238.Diameter Architecture.mp4

6.9 MB

239.Two Pieces.mp4

5.4 MB

240.AVP.mp4

18.5 MB

241.Decentralized Access Control Administration.mp4

18.8 MB

242.Controlling Access to Sensitive Data.mp4

39.5 MB

243.IDS.mp4

14.9 MB

244.IDS Steps.mp4

6.9 MB

245.Network IDS Sensors.mp4

13.0 MB

246.Host IDS.mp4

11.1 MB

247.Combination.mp4

7.3 MB

248.Types of IDSs.mp4

26.6 MB

249.Signature-Based Example.mp4

9.6 MB

250.Behavior-Based IDS.mp4

37.1 MB

251.Statistical Anomaly.mp4

11.5 MB

252.Statistical IDS.mp4

8.1 MB

253.Protocol Anomaly.mp4

13.5 MB

255.Protocol Anomaly Issues.mp4

8.5 MB

256.Traffic Anomaly.mp4

40.3 MB

257.IDS Response Mechanisms.mp4

12.4 MB

258.Responses to Attacks.mp4

8.6 MB

259.IDS Issues.mp4

35.0 MB

260.Vulnerable IDS.mp4

26.4 MB

261.Domain 2 Review.mp4

25.9 MB

262.Cryptography.mp4

11.0 MB

263.Services Provided by Cryptography.mp4

13.0 MB

264.Cryptographic Definitions.mp4

13.7 MB

265.Cipher.mp4

10.8 MB

266.A Few More Definitions.mp4

23.0 MB

267.Symmetric Cryptography GÇö Use of Secret Keys.mp4

14.9 MB

268.Scytale Cipher.mp4

6.6 MB

269.Substitution Ciphers.mp4

20.4 MB

270.Simple Substitution Cipher Atbash.mp4

11.4 MB

271.Caesar Cipher Example.mp4

8.3 MB

272.Simple Substitution Cipher ROT13.mp4

8.8 MB

273.Historical Uses.mp4

20.4 MB

274.Vigenere Algorithm.mp4

12.0 MB

275.Enigma Machine.mp4

53.5 MB

276.Historical Uses of Symmetric Cryptography GÇö Running Key and Concealment.mp4

19.5 MB

277.Agenda 1.mp4

2.5 MB

278.Transposition Ciphers.mp4

7.3 MB

279.Key and Algorithm Relationship.mp4

25.4 MB

280.Ways of Breaking Cryptosystems GÇö Brute Force.mp4

19.6 MB

281.Brute Force Components.mp4

7.8 MB

282.Ways of Breaking Cryptosystems GÇö Frequency Analysis.mp4

11.7 MB

283.Strength of a Cryptosystem.mp4

24.1 MB

284.Developing Cryptographic Solutions In-House.mp4

13.3 MB

285.Characteristics of Strong Algorithms.mp4

21.6 MB

287.Types of Ciphers Used Today.mp4

13.7 MB

288.S-Boxes Used in Block Ciphers.mp4

8.1 MB

289.Binary Mathematical Function 1.mp4

8.7 MB

290.Type of Symmetric Cipher GÇö Stream Cipher.mp4

8.4 MB

291.Symmetric Characteristics.mp4

4.4 MB

292.Initialization Vectors.mp4

18.1 MB

293.Security Holes.mp4

53.4 MB

294.Strength of a Stream Cipher.mp4

22.8 MB

295.Out-of-Band Transmission.mp4

6.3 MB

296.Symmetric Key Management Issue.mp4

25.6 MB

297.Asymmetric Cryptography.mp4

10.0 MB

298.Key Functions.mp4

9.9 MB

299.Public Key Cryptography Advantages.mp4

18.3 MB

300.Asymmetric Algorithm Disadvantages.mp4

13.1 MB

301.Confusing Names.mp4

17.2 MB

302.Symmetric versus Asymmetric.mp4

5.8 MB

303.Questions 1.mp4

48.1 MB

304.When to Use Which Key.mp4

18.2 MB

305.Encryption Steps.mp4

9.8 MB

306.ReceiverGÇÖs Public Key Is Used to Encrypt the Symmetric Key.mp4

3.3 MB

307.ReceiverGÇÖs Private Key Is Used to Decrypt the Symmetric Key.mp4

6.8 MB

308.Digital Envelope.mp4

9.2 MB

309.Secret versus Session Keys.mp4

10.6 MB

310.Asymmetric Algorithms We Will Dive Into.mp4

14.9 MB

311.Diffie-Hellman.mp4

38.4 MB

312.Key Agreement Schemes.mp4

8.7 MB

313.Asymmetric Algorithm GÇö RSA.mp4

12.0 MB

314.Factoring Large Numbers.mp4

6.2 MB

315.RSA Operations.mp4

5.8 MB

316.RSA Key Size.mp4

4.5 MB

317.El Gamal.mp4

15.4 MB

318.Asymmetric Mathematics.mp4

37.2 MB

319.Asymmetric Security.mp4

8.1 MB

320.Mathematics.mp4

69.2 MB

321.Block Cipher.mp4

6.0 MB

322.Double DES.mp4

16.9 MB

323.Evolution of DES.mp4

5.2 MB

324.Modes of 3DES.mp4

7.1 MB

325.Encryption Modes.mp4

18.2 MB

326.Block Cipher Modes GÇö CBC.mp4

15.4 MB

327.Different Modes of Block Ciphers GÇö ECB.mp4

8.0 MB

328.ECB versus CBC.mp4

5.5 MB

329.Block Cipher Modes GÇö CFB and OFB.mp4

43.0 MB

330.CFB and OFB Modes.mp4

9.7 MB

331.Counter Mode.mp4

21.8 MB

332.Modes Summary.mp4

18.7 MB

333.Symmetric Ciphers.mp4

25.9 MB

334.Data Integrity.mp4

9.1 MB

335.Hashing Steps.mp4

3.7 MB

336.Protecting the Integrity of Data.mp4

10.8 MB

337.Hashing Algorithms.mp4

12.5 MB

338.Data Integrity Mechanisms.mp4

7.4 MB

339.Hashing Strength.mp4

6.2 MB

340.Question 1.mp4

3.8 MB

341.Weakness In Using Only Hash Algorithms.mp4

5.0 MB

342.More Protection In Data Integrity.mp4

7.2 MB

343.MAC.mp4

7.6 MB

344.HMAC GÇö Sender.mp4

11.1 MB

345.Another Look.mp4

5.0 MB

346.What Services.mp4

11.3 MB

347.CBC-MAC.mp4

5.0 MB

348.MAC Using Block Ciphers.mp4

10.5 MB

351.Question 2.mp4

15.3 MB

352.Digital Signatures.mp4

16.1 MB

353.U.S. Government Standard.mp4

6.3 MB

354.What IsGǪ.mp4

3.5 MB

355.Not Giving Up the Farm.mp4

9.0 MB

356.Zero Knowledge Proof.mp4

11.8 MB

357.Message Integrity Controls.mp4

5.0 MB

358.Security Issues In Hashing.mp4

8.3 MB

359.Example of a Birthday Attack.mp4

31.2 MB

360.Birthday Attack Issues.mp4

9.2 MB

361.Key Management.mp4

21.1 MB

362.Key Usage.mp4

19.3 MB

363.M-of-N.mp4

18.9 MB

364.Key Types.mp4

6.9 MB

366.PKI and Its Components.mp4

17.7 MB

367.RA Roles.mp4

26.3 MB

368.CA.mp4

12.8 MB

369.Digital Certificates.mp4

12.1 MB

370.Certificate.mp4

4.0 MB

371.Signing the Certificate.mp4

3.9 MB

372.Verifying the Certificate.mp4

18.9 MB

373.Trusted CAGÇÖs.mp4

15.8 MB

374.Non-Trusted CA.mp4

15.2 MB

376.Components of PKI Repository and CRLs.mp4

24.8 MB

378.CRL Process.mp4

12.5 MB

379.Different Uses for Certificates.mp4

12.6 MB

380.Cross Certification.mp4

18.7 MB

381.PKI and Trust.mp4

18.1 MB

382.Historical Uses of Symmetric Cryptography.mp4

16.5 MB

383.Binary Mathematical Function 2.mp4

13.8 MB

384.One-Time Pad in Action.mp4

4.3 MB

385.One-Time Pad Characteristics.mp4

28.0 MB

386.Steganography.mp4

20.4 MB

387.Digital Watermarking.mp4

7.2 MB

388.Link versus End-to-End Encryption.mp4

22.3 MB

389.End-to-End Encryption.mp4

15.8 MB

390.Encryption Location.mp4

5.2 MB

391.Email Standards.mp4

15.8 MB

392.You Decide.mp4

10.7 MB

393.Non-Hierarchical.mp4

6.8 MB

394.Secure Protocols.mp4

11.5 MB

395.SSL Connection Setup.mp4

33.2 MB

396.Example GÇö SSL.mp4

3.7 MB

397.Validating Certificate.mp4

4.1 MB

398.Secure Protocols (Cont.).mp4

23.9 MB

399.SSL and the OSI Model.mp4

9.0 MB

400.E-Commerce.mp4

24.9 MB

402.Secure Email Standard.mp4

14.4 MB

403.Network Layer Protection.mp4

31.7 MB

404.IPSec Key Management.mp4

12.6 MB

405.IPSec Handshaking Process.mp4

10.3 MB

406.VPN Establishment.mp4

7.3 MB

407.SAs In Use.mp4

17.0 MB

408.Key Issues within IPSec.mp4

20.1 MB

409.Configuration of SA Parameters.mp4

5.9 MB

410.IPSec Configuration Options.mp4

4.2 MB

411.IPSec Is a Suite of Protocols.mp4

34.6 MB

412.AH and ESP Modes.mp4

10.4 MB

413.IPSec Modes of Operation.mp4

7.5 MB

414.VPN Establishment (Cont.).mp4

10.9 MB

415.Review.mp4

9.1 MB

416.Questions 2.mp4

24.8 MB

417.Attack Types.mp4

7.3 MB

418.Attacks on Cryptosystems.mp4

7.8 MB

419.Known-Plaintext Attack.mp4

20.0 MB

420.Chosen-Plaintext Attack.mp4

12.5 MB

421.Chosen-Ciphertext Attack.mp4

11.6 MB

422.Adaptive Attacks.mp4

4.8 MB

423.Side Channel Attacks.mp4

13.7 MB

424.Domain 3 Review.mp4

33.3 MB

425.Physical Security.mp4

1.9 MB

426.Different Types of Threats.mp4

5.1 MB

427.Wake Up Call.mp4

12.7 MB

428.Legal Issues.mp4

8.7 MB

429.Physical Security Program Goals.mp4

14.1 MB

430.Planning Process.mp4

14.7 MB

431.Deterrence.mp4

10.2 MB

432.Delay.mp4

2.6 MB

433.Layered Defense Model.mp4

17.4 MB

434.Weak Link In the Chain.mp4

3.5 MB

435.Threat Categories.mp4

9.9 MB

436.Crime Prevention Through Environmental Design.mp4

29.4 MB

437.Construction Materials.mp4

20.8 MB

438.Security Zones.mp4

58.5 MB

439.Entrance Protection.mp4

74.6 MB

440.Perimeter Security GÇö Security Guards.mp4

52.6 MB

441.Types of Physical Intrusion Detection Systems.mp4

42.0 MB

442.Alarm Systems.mp4

64.2 MB

443.Electrical Power.mp4

61.2 MB

444.Fire Prevention.mp4

116.3 MB

445.Domain 4 Review.mp4

84.3 MB

446.Security Architecture and Design.mp4

14.1 MB

447.Central Processing Unit (CPU).mp4

11.9 MB

448.Registers.mp4

27.0 MB

449.Trust Levels and Processes.mp4

25.2 MB

450.Interrupts.mp4

30.7 MB

451.Bussses.mp4

14.7 MB

452.Multiprocessing and Multitasking.mp4

61.4 MB

453.Memory Types.mp4

122.2 MB

454.CPU and OS.mp4

195.4 MB

455.Trusted Computing Base.mp4

123.9 MB

456.Security Levels.mp4

40.7 MB

457.Enterprise Architecture.mp4

164.8 MB

458.Access Control Models.mp4

52.5 MB

459.Bell-LaPadula.mp4

126.2 MB

460.Clark-Wilson Model.mp4

38.6 MB

461.Non-Interference Model.mp4

32.2 MB

462.Access Control Matrix Model.mp4

47.5 MB

463.Trusted Computer System Evaluation Criteria (TCSEC).mp4

127.2 MB

464.Domain 5 Review.mp4

212.7 MB

465.Law Investigation and Ethics.mp4

8.8 MB

466.Examples of Computer Crimes.mp4

7.7 MB

468.A Few Attack Types.mp4

40.4 MB

469.Privacy of Sensitive Data.mp4

57.5 MB

470.Different Types of Laws.mp4

46.0 MB

471.Computer Crime and Its Barriers.mp4

118.5 MB

472.Preparing for a Crime Before It Happens.mp4

198.4 MB

473.Domain 6 Review.mp4

101.9 MB

474.Telecommunications and Networking.mp4

3.5 MB

475.OSI Model.mp4

26.4 MB

476.Networking Communications.mp4

20.1 MB

477.Application Layer.mp4

17.3 MB

478.Presentation Layer.mp4

21.5 MB

479.OSI GÇö Session Layer.mp4

19.6 MB

480.Transport Layer.mp4

27.5 MB

481.Network Layer.mp4

20.1 MB

482.Data Link Layer.mp4

44.9 MB

483.Physical Layer.mp4

16.9 MB

484.Layers Working Together.mp4

58.7 MB

485.Network Topologies.mp4

61.9 MB

486.LAN Media Access Technologies.mp4

25.0 MB

487.Media Access Technologies.mp4

117.0 MB

488.Cabling Types-Coaxial.mp4

11.6 MB

489.Cabling Types GÇö Twisted Pair.mp4

11.8 MB

490.Types of Cabling GÇö Fiber.mp4

9.4 MB

491.Signal and Cable Issues.mp4

21.1 MB

492.Transmission Types.mp4

94.5 MB

493.Network Technologies.mp4

26.9 MB

494.Networking Devices.mp4

52.0 MB

495.Virtual LANs.mp4

20.9 MB

496.Sniffers.mp4

26.0 MB

497.Networking Devices GÇö Router.mp4

12.0 MB

498.Hops.mp4

3.6 MB

499.Routers.mp4

8.7 MB

500.Bridges Compared to Routers.mp4

11.0 MB

501.Port and Protocol Relationship.mp4

34.3 MB

502.TCPIP Suite.mp4

7.4 MB

503.UDP versus TCP.mp4

26.7 MB

504.TCP Segment.mp4

4.9 MB

505.SYN Flood.mp4

29.3 MB

506.Teardrop Attack.mp4

22.5 MB

507.Source Routing.mp4

11.5 MB

508.Source Routing Types.mp4

9.0 MB

509.IP Address Ranges.mp4

19.4 MB

510.IPv6.mp4

23.9 MB

511.Protocols.mp4

639.4 KB

512.Protocols GÇö ARP.mp4

5.1 MB

513.IP to MAC Mapping.mp4

3.8 MB

514.How ARP Works.mp4

6.8 MB

515.ARP Poisoning.mp4

6.1 MB

516.ICMP Packets.mp4

6.6 MB

517.A Way Hackers Use ICMP.mp4

7.1 MB

518.Ping Steps.mp4

5.7 MB

519.Protocols GÇö SNMP.mp4

8.1 MB

520.SNMP In Action.mp4

10.7 MB

521.SNMP.mp4

11.1 MB

522.SNMP Output.mp4

5.6 MB

523.POP3 and SMTP.mp4

6.9 MB

524.Mail Relay.mp4

21.5 MB

525.Protocols GÇö FTP TFTP Telnet.mp4

15.3 MB

526.Protocols GÇö RARP and BootP.mp4

6.5 MB

527.DHCP GÇö Dynamic Host Configuration Protocol.mp4

10.8 MB

528.Networking Device GÇö Bastion Host.mp4

26.7 MB

529.Network Devices GÇö Firewalls.mp4

59.9 MB

530.Rule Set Example.mp4

7.3 MB

531.Firewall Types GÇö Proxy Firewalls.mp4

18.9 MB

532.Firewall Types GÇö Circuit-Level Proxy Firewall.mp4

18.8 MB

533.Circuit-Level Proxy.mp4

58.4 MB

534.Dedicated Proxy Servers.mp4

183.0 MB

535.Dial-Up Protocols and Authentication Protocols.mp4

45.9 MB

536.Authentication Protocols.mp4

79.2 MB

537.Virtual Private Network Technologies.mp4

145.6 MB

538.SDLC and HDLC.mp4

46.9 MB

539.Quality of Service (QoS).mp4

20.5 MB

540.Autonomous Systems.mp4

16.3 MB

541.Routing Protocols.mp4

90.4 MB

542.Routing Protocol Attacks.mp4

130.6 MB

543.Network Service GÇö NAT.mp4

53.9 MB

544.WAN Technologies Are Circuit or Packet Switched.mp4

12.5 MB

545.PSTN.mp4

17.8 MB

546.Multiplexing.mp4

11.6 MB

547.Types of Multiplexing.mp4

30.6 MB

548.Packet Switching.mp4

37.0 MB

549.WAN Technologies GÇö Packet Switched.mp4

1.7 MB

550.WAN Technologies GÇö X.25.mp4

4.6 MB

551.X.25.mp4

12.3 MB

552.WAN Technologies GÇö Frame Relay.mp4

18.4 MB

553.WAN Example.mp4

3.9 MB

554.Frame Relay.mp4

23.4 MB

555.WAN Technologies GÇö ATM.mp4

8.9 MB

556.Cell Switching.mp4

4.0 MB

557.Wide Area Network Technologies.mp4

46.6 MB

558.WAN Technologies GÇö Cable Modem.mp4

12.4 MB

559.Cable Modems and Satellites.mp4

26.5 MB

560.Network Perimeter Security.mp4

10.9 MB

561.Complexity Only Increases.mp4

5.8 MB

562.Agenda 9.mp4

13.0 MB

563.PSTN (Cont.).mp4

11.1 MB

564.Private Branch Exchange.mp4

9.7 MB

565.PBX Vulnerabilities.mp4

16.0 MB

566.PBX Best Practices.mp4

16.7 MB

567.IP Telephony.mp4

121.2 MB

568.Mobile Phone Security.mp4

13.5 MB

569.Mobile Device Security.mp4

11.9 MB

570.Cell Phone.mp4

27.9 MB

571.Wireless Technologies.mp4

127.3 MB

572.OFDM.mp4

16.2 MB

573.802.11n.mp4

12.7 MB

574.Wireless Technologies GÇö Access Point (Cont.).mp4

6.7 MB

575.Architectures.mp4

4.1 MB

576.Wireless Technologies GÇö Service Set ID.mp4

12.0 MB

577.Authenticating to an AP.mp4

10.4 MB

578.802.11 Authentication.mp4

11.9 MB

579.Wireless Technologies GÇö WEP Woes.mp4

57.5 MB

580.802.11 Security Solutions.mp4

53.8 MB

581.Types of 802.11 Security.mp4

16.5 MB

582.Wireless EAP.mp4

152.0 MB

583.Wireless Technologies GÇö WAP and WTLS.mp4

31.1 MB

584.Instant Messaging.mp4

23.8 MB

585.Domain 7 Review.mp4

17.6 MB

586.Business Continuity.mp4

7.6 MB

587.Needs for BCP.mp4

31.5 MB

588.911 Changed Mentalities About BCP.mp4

26.7 MB

591.More Reasons to Have Plans in Place.mp4

20.3 MB

592.BCP Is a Core Component of Every Security Program.mp4

4.6 MB

593.Steps of BCP Process.mp4

12.3 MB

594.Different BCP Model.mp4

13.2 MB

595.Documentation.mp4

8.7 MB

596.BCP Policy Outlines.mp4

14.6 MB

599.BCP Development Team.mp4

9.6 MB

600.Project Sizing.mp4

18.3 MB

601.Properly Determining Scope Is Important.mp4

8.9 MB

602.BCP Risk Analysis Steps.mp4

18.2 MB

603.BIA Steps.mp4

16.4 MB

604.Information from Different Sources.mp4

7.1 MB

605.Analysis.mp4

13.3 MB

606.How to Identify the Most Critical Company Functions.mp4

29.1 MB

607.Interdependencies.mp4

4.8 MB

608.Well Of Course an Organization Knows How It Works!.mp4

9.5 MB

609.Business Silos.mp4

50.7 MB

610.Maximum Tolerable Downtime.mp4

39.6 MB

611.Range of Threats to Consider.mp4

28.0 MB

612.Thinking Outside of the Box What IfGǪ.mp4

9.9 MB

613.Biological Threats.mp4

8.1 MB

614.BIA Steps (Cont.).mp4

10.2 MB

615.Potential Disasters.mp4

13.8 MB

616.Risk Approach.mp4

20.1 MB

618.Recovery Strategies.mp4

13.4 MB

619.Alternate Business Process Procedures.mp4

19.7 MB

620.Business Process Reconstruction.mp4

12.7 MB

621.Recovery Strategies.mp4

9.8 MB

622.Facility Backups.mp4

21.6 MB

623.Compatibility Issues with Offsite Facility.mp4

21.3 MB

624.Tertiary Sites.mp4

6.5 MB

625.Subscription Costs.mp4

23.5 MB

626.Multiple Processing Centers.mp4

8.1 MB

627.Choosing Site Location.mp4

9.9 MB

628.Other Offsite Approaches.mp4

19.3 MB

629.Security Does Not Stop.mp4

12.9 MB

630.More Options.mp4

10.9 MB

631.Rolling Hot Site.mp4

5.4 MB

632.Recovery Strategies (Cont.).mp4

7.3 MB

633.Supply and Technology Recovery.mp4

18.3 MB

634.VoIP.mp4

6.2 MB

635.Equipment Replacement.mp4

27.3 MB

637.Priorities.mp4

9.6 MB

638.Executive Succession Planning.mp4

15.5 MB

639.Recovery Strategies (Cont.).mp4

27.8 MB

640.Co-Location.mp4

5.0 MB

641.Data Recovery.mp4

19.3 MB

642.Backup Redundancy.mp4

6.7 MB

643.Recovering Data.mp4

7.3 MB

644.Automated Backup Technologies.mp4

13.1 MB

645.Tape Vaulting.mp4

29.2 MB

646.Clustering for Fault Tolerance.mp4

16.7 MB

647.Disk or Database Shadowing.mp4

43.9 MB

648.Cost and Recovery Times.mp4

19.0 MB

649.Recovery Solutions.mp4

5.8 MB

650.Preventative Measures.mp4

13.6 MB

651.Reviewing Insurance.mp4

9.0 MB

652.Results from the BIA.mp4

14.4 MB

653.Basic Structure of BCP.mp4

33.0 MB

654.External Groups.mp4

15.6 MB

655.Activation Phase.mp4

63.8 MB

656.Reconstitution Phase.mp4

22.2 MB

659.Termination of BCP.mp4

5.8 MB

660.Life Cycle.mp4

21.5 MB

661.Types of Tests to Choose From.mp4

26.9 MB

662.Test Objectives.mp4

11.1 MB

663.Training Requirements.mp4

20.4 MB

666.Keeping It Current.mp4

9.1 MB

667.Change Control.mp4

5.2 MB

668.Resulting Plan Should ContainGǪ.mp4

14.9 MB

669.Phases of the BCP.mp4

5.2 MB

670.Domain 8 Review.mp4

33.8 MB

671.Application Security.mp4

6.2 MB

674.Usual Trend of Dealing with Security.mp4

15.2 MB

675.Software Development Tools.mp4

18.4 MB

676.Security Issues.mp4

13.0 MB

677.Language Types.mp4

29.6 MB

678.Turn Into Machine Code.mp4

6.1 MB

679.New and Old.mp4

4.2 MB

680.Object-Oriented Programming.mp4

11.8 MB

681.Classes and Objects.mp4

23.4 MB

682.Functions and Messages.mp4

11.6 MB

683.Object-Oriented Programming Characteristic.mp4

9.7 MB

684.Polymorphism.mp4

18.9 MB

685.Module Characteristics.mp4

10.0 MB

686.Low Cohesion.mp4

8.6 MB

687.Coupling.mp4

4.9 MB

688.Agenda 2.mp4

14.2 MB

689.Distributed Computing.mp4

9.6 MB

690.Distributed Computing GÇö ORBs.mp4

6.4 MB

691.Common Object Request Broker Architecture.mp4

5.4 MB

692.COM Architecture.mp4

17.4 MB

693.Enterprise Java Beans.mp4

9.4 MB

694.J2EE Platform Example.mp4

7.9 MB

695.Linking Through COM.mp4

9.8 MB

696.Mobile Code with Active Content.mp4

22.3 MB

697.Java and Applets.mp4

24.4 MB

698.Database Systems.mp4

18.2 MB

699.Database Model.mp4

19.7 MB

700.Object-Oriented Database.mp4

7.7 MB

701.Benefits of OO Database Model.mp4

15.0 MB

702.Database Models GÇö Relational Components.mp4

30.7 MB

703.Database Integrity.mp4

10.5 MB

704.Different Modeling Approaches.mp4

4.7 MB

705.Database Access Methods.mp4

53.5 MB

Downloaded From PirateBB.org - Business Materials & E-Learning Video Tutorials Download.txt

0.4 KB

/ISC2_eBooks/

(ISC)¤ CISSP Certified Information Systems Security Professional Official Study Guide.epub

5.1 MB

(ISC)¤ CISSP Certified Information Systems Security Professional Official Study Guide.mobi

11.1 MB

(ISC)¤ CISSP Certified Information Systems Security Professional Official Study Guide.pdf

10.0 MB

1.Official (ISC)¤ CISSP Study Guide- 7th Edition.pdf

7.1 MB

11hr.pdf

8.1 MB

1466580585.pdf

3.1 MB

1482262479CCFP.pdf

29.6 MB

[1st Edition] Daniel Carter - CCSP Certified Cloud Security Professional Practice Exams (March 2018, McGraw-Hill Education).pdf

2.6 MB

[CISSP] Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide (2018, Sybex).pdf

20.2 MB

AIO_7th.pdf

85.1 MB

briefmenow-CISSP (v.5) update August 5th, 2017.rar

332.8 KB

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide.pdf

4.0 MB

CCSP Certified Cloud Security Professional All-in-One Exam Guide.pdf

224.6 MB

CCSP Official (ISC)2 Practice Tests_rana123.pdf

1.2 MB

CISSP (ISC)2 Certified Informat - James M. Stewart Sybex Wiley Edition 7.pdf

7.1 MB

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide 7th Edition 2015 .pdf

7.1 MB

CISSP 7th.pdf

7.1 MB

CISSP 8th edition 2018.pdf

12.0 MB

cissp 21 day.pdf

12.7 MB

CISSP All-in-One Exam Guide, 6th Edition.pdf

61.6 MB

CISSP All-in-One Exam Guide, Eighth Edition.pdf

65.0 MB

CISSP Cert Guide 2nd edition.pdf

17.5 MB

CISSP Ch1 SixthEd.pptx

95.5 KB

CISSP Ch2 SixthEd.pptx

305.0 KB

CISSP Ch3 SixthEd.pptx

1.9 MB

CISSP Ch4 SixthEd.pptx

760.9 KB

CISSP Ch5 SixthEd.pptx

1.8 MB

CISSP Ch6 SixthEd.pptx

3.6 MB

CISSP Ch7 SxthEd.pptx

2.3 MB

CISSP Ch8 SixthEd.pptx

580.2 KB

CISSP Ch9 SixthEd.pptx

280.1 KB

CISSP Ch10 SixthEd.pptx

652.9 KB

CISSP Ch11 SixthEd.pptx

654.3 KB

CISSP Exam Prep Questions_ Domain 5 - Identity and Access Management - Richard Anderson.pdf

371.7 KB

CISSP Official (ISC)2 Practice Tests.pdf

5.9 MB

CISSP Practice Exams, Fifth Edition Technet24.pdf

12.0 MB

CISSP Study Guide 3ed [2016]-Eric Conrad.pdf

31.5 MB

CISSP Study Guide, 3rd Edition by Eric Conrad 2016.doc

17.5 MB

CISSP.All-in-One.Exam.Guide.7th.Edition-Shon Harris.pdf

85.6 MB

cissp.pdf

4.9 MB

CISSP_exam_guide_7th_edition_by_Shon_Harris.pdf

85.0 MB

cissp_rus_v11.pdf

14.4 MB

Cloud Computing Security Risk Assessment.pdf

1.6 MB

Conrad, Eric_ Feldman, Joshua_ Misenar, Seth-CISSP Study Guide, Third Edition-Syngress_Elsevier (2016).pdf

31.5 MB

csaguide.v3.0.pdf

4.0 MB

CSSLPCertification All-in-One Exam Guide.pdf

3.8 MB

Eleventh Hour - Eric Conrad-3rd Edition.pdf

5.5 MB

Eric Conrad - CISSP Study Guide - 2010.pdf

13.2 MB

Eric Conrad - CISSP Study Guide, 2nd Edition - 2012.pdf

17.3 MB

hogben-cloudcomputing.pdf

2.1 MB

ISC2_CISSP_Certified_Information.pdf

7.6 MB

ISC2_CISSP_Official_Guide_4th_Edition.pdf

32.4 MB

Official (ISC)2 Guide to the CISSP CBK - Fourth Edition 2015.pdf

32.4 MB

Official CISSP-7th edition.txt

0.5 KB

Official ISC2 Guide to the CISSP CBK, Second Edition.pdf

18.6 MB

Official-ISC-2-Guide-to-the-ISSAP-CBK.pdf

3.6 MB

Shon Harris - CISSP All-in-One Exam Guide, 6th Edition - 2013.pdf

61.6 MB

SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide.pdf

9.1 MB

SSCP Exam Outline-Nov 1 2018.pdf

256.3 KB

SSCP Systems Security Certified Practitioner All-in-One Exam Guide 3rd Edition.epub

9.8 MB

Steven Hernandez - Official (ISC)2 Guide to the CISSP CBK, 3rd Edition - 2012.epub

15.9 MB

Sunflower CISSP - Crash Cram.pdf

2.7 MB

Sybex - ISC2-SSCP Systems Security Certified Practitioner Official Practice Tests Technet24.pdf

13.4 MB

Sybex CISSP Official Study Guide Seventh Edition.pdf.fb!

39.8 MB

Sybex.The.Official.ISC.2.Guide.to.the.SSCP.CBK.4th.Edition.1119278635_Technet24.pdf

88.1 MB

The Official (ISC)2 Guide to the CCSP CBK, 2nd Edition (2016).epub

2.9 MB

The Official (ISC)2 Guide to the CCSP CBK.pdf

71.3 MB

Харрис Ш. - CISSP. Руководство для подготовки к экзамену - 2011.pdf

12.4 MB

/.../414 Sans MGT Training Program for CISSP Certification (2006)/

SANS.MGT414.1.Course.Book.pdf

383.4 KB

SANS.MGT414.2-3.Course.Book.pdf

714.5 KB

SANS.MGT414.4-5.Course.Book.pdf

509.0 KB

SANS.MGT414.6-7.Course.Book.pdf

314.5 KB

SANS.MGT414.8-9.Course.Book.pdf

510.1 KB

SANS.MGT414.10.Course.Book.pdf

391.1 KB

SANS.MGT414.Domain.01.Answer.Key.pdf

22.8 KB

SANS.MGT414.Domain.01.Quiz.pdf

63.0 KB

SANS.MGT414.Domain.02.Answer.Key.pdf

22.8 KB

SANS.MGT414.Domain.02.Quiz.pdf

75.9 KB

SANS.MGT414.Domain.03.Answer.Key.pdf

23.4 KB

SANS.MGT414.Domain.03.Quiz.pdf

69.2 KB

SANS.MGT414.Domain.04.Answer.Key.pdf

22.7 KB

SANS.MGT414.Domain.04.Quiz.pdf

60.3 KB

SANS.MGT414.Domain.05.Answer.Key.pdf

22.8 KB

SANS.MGT414.Domain.05.Quiz.pdf

67.4 KB

SANS.MGT414.Domain.06.Answer.Key.pdf

22.8 KB

SANS.MGT414.Domain.06.Quiz.pdf

61.5 KB

SANS.MGT414.Domain.07.Answer.Key.pdf

22.8 KB

SANS.MGT414.Domain.07.Quiz.pdf

62.6 KB

SANS.MGT414.Domain.08.Answer.Key.pdf

22.9 KB

SANS.MGT414.Domain.08.Quiz.pdf

84.5 KB

SANS.MGT414.Domain.09.Answer.Key.pdf

22.7 KB

SANS.MGT414.Domain.09.Quiz.pdf

62.9 KB

SANS.MGT414.Domain.10.Answer.Key.pdf

23.4 KB

SANS.MGT414.Domain.10.Quiz.pdf

60.5 KB

/ISC2_eBooks/ISOSecurity/

ISO-IEC_27001-2013 Requirements (original).pdf

469.9 KB

ISO-IEC_27002-2013 Code of practice for IS management (original).pdf

948.3 KB

/ISC2_Tests/

2_5255901816855462665.pdf

1.8 MB

ACTUALTESTS.CISSP.CISSP.Exam.Q.and.A.05.09.05-1.pdf

560.8 KB

ACTUALTESTS.CISSP.CISSP.Exam.Q.and.A.05.09.05-2.pdf

411.9 KB

ACTUALTESTS.CISSP.CISSP.Exam.Q.and.A.05.09.05-3.pdf

488.9 KB

Asset Security.rar

517.8 KB

cccure_scenario_based_questions_part_1_of_2_final.pdf

1.7 MB

cccure_scenario_based_questions_part_2_of_2_final.pdf

1.5 MB

CCSP Official (ISC)2 Practice Tests_rana123.pdf

1.2 MB

CISSP Official (ISC)2 Practice Tests.pdf

5.9 MB

CISSP.pdf

6.0 MB

CISSP.xlsx

1.1 MB

CISSP_Actualtests_04_12_05.pdf

1.4 MB

CISSP_Actualtests_12_09_04.pdf

1.3 MB

CISSP_Cert Kingdom update1.rar

4.0 MB

CISSP_update1.pdf

1.6 MB

Communication and Network Security.rar

2.1 MB

ExactPapers.ISC.CISSP.Exam.Q.And.A.05.2005.pdf

1.3 MB

ExactPapers.ISC2.CISSP.Exam.Q.And.A.Part1.10-2004-DDU.pdf

940.8 KB

ExactPapers.ISC2.CISSP.Exam.Q.And.A.Part2.10-2004-DDU.pdf

66.0 KB

ExactPapers.ISC2.CISSP.Exam.Q.And.A.Part3.10-2004-DDU.pdf

51.4 KB

Fravo.CISSP.Exam.Q.And.A.v6.0.pdf

1.0 MB

gratisexam.com-ISC.Actualtests.CCSP.v2019-04-14.by.Don.258q.pdf

408.8 KB

gratisexam.com-ISC.Actualtests.CISSP-ISSAP.v2015-03-13.by.Adella.237q.pdf

202.4 KB

gratisexam.com-ISC.Actualtests.CISSP-ISSAP.v2018-10-21.by.Austin.132q.pdf

4.0 KB

gratisexam.com-ISC.Actualtests.CISSP.v2015-04-01.by.Therese.893q.pdf

5.0 MB

gratisexam.com-ISC.Actualtests.SSCP.v2015-7-1.by.Dacey.243q.pdf

222.5 KB

gratisexam.com-ISC.Braindumps.CISSP-2018.v2018-10-16.by.Oliver.55q.pdf

74.0 KB

gratisexam.com-ISC.Braindumps.CISSP-ISSMP.v2015-03-19.by.Clarissa.200q (1).pdf

193.0 KB

gratisexam.com-ISC.Braindumps.CISSP-ISSMP.v2015-03-19.by.Clarissa.200q.pdf

193.0 KB

gratisexam.com-ISC.Braindumps.CISSP.v2014-05-15.by.Margot.85q.pdf

127.3 KB

gratisexam.com-ISC.Braindumps.CISSP.v2015-04-04.by.Phyllis.784q.pdf

4.7 MB

gratisexam.com-ISC.BrainDumps.CISSP.v2015-10-28.by.Test.2047q.pdf

3.4 MB

gratisexam.com-ISC.Braindumps.SSCP.v2015-10-1.by.Dacia.260q.pdf

185.6 KB

gratisexam.com-ISC.Braindumps.SSCP.v2018-10-01.by.Ethan.500q.pdf

2.1 MB

gratisexam.com-ISC.Certkiller.CISSP-ISSEP.v2015-03-12.by.Era.213q.pdf

179.6 KB

gratisexam.com-ISC.Certkiller.CISSP-ISSMP.v2018-05-11.by.Sean.130q.pdf

151.8 KB

gratisexam.com-ISC.Examsheets.CISSP.v2014-04-26.by.Bridget.75q.pdf

115.0 KB

gratisexam.com-ISC.Pass4sure.CISSP-2018.v2019-01-28.by.Peter.87q.pdf

236.1 KB

gratisexam.com-ISC.Passguide.CISSP-ISSAP.v2018-07-19.by.Barbara.125q.pdf

143.3 KB

gratisexam.com-ISC.Passguide.CISSP-ISSEP.v2018-08-03.by.Michelle.115q.pdf

132.9 KB

gratisexam.com-ISC.passguide.CISSP.v2015-03-30.by.Herminia.999q.pdf

5.3 MB

gratisexam.com-ISC.PracticeTest.CISSP-ISSMP.v2016-05-21.by.Aaron.62q.pdf

127.7 KB

gratisexam.com-ISC.PracticeTest.SSCP.v2017-06-27.by.Katherine.448q.pdf

2.1 MB

gratisexam.com-ISC.Real-exams.CISSP-ISSAP.v2019-02-20.by.William.137q.pdf

144.8 KB

gratisexam.com-ISC.Selftestengine.CISSP-ISSMP.v2015-03-13.by.Gayle.218q.pdf

267.9 KB

gratisexam.com-ISC.Selftesttraining.CISSP-ISSEP.v2018-11-27.by.Alex.118q.pdf

135.7 KB

gratisexam.com-ISC.Test-inside.CISSP-ISSEP.v2019-03-11.by.Eric.123q.pdf

129.0 KB

gratisexam.com-ISC.Test-king.CISSP.v2019-02-10.by.Alex.724q.pdf

1.9 MB

gratisexam.com-ISC.Test4prep.CISSP.v2018-11-11.by.Ben.715q.pdf

1.8 MB

gratisexam.com-ISC.Testking.CISSP-2018.v2018-11-08.by.Andrew.64q.pdf

85.0 KB

gratisexam.com-ISC.Testking.SSCP.v2017-06-12.by.Kwan.450q.pdf

2.1 MB

gratisexam.com-ISC.Testkings.CISSP-ISSMP.v2018-11-27.by.Olivia.132q.pdf

157.1 KB

gratisexam.com-ISC.Testkings.CISSP.v2015-05-22.by.Imogene.1020q.pdf

3.5 MB

gratisexam.com-ISC.Train4sure.CISSP-ISSMP.v2019-03-13.by.Daan.135q.pdf

151.2 KB

gratisexam.com-ISC.Train4sure.SSCP.v2018-12-19.by.Marcus.525q.pdf

2.1 MB

gratisexam.com-ISC.Train4sure.SSCP.v2019-03-19.by.Monika.560q.pdf

1.9 MB

gratisexam.com-ISC2.ActualTests.CISSP.by.efriendofu.1451q.pdf

1.8 MB

gratisexam.com-ISC2.SelfTestEngine.SSCP.v2011-04-21.by.Albert.265q.pdf

235.1 KB

Quizzes.rar

60.9 MB

scenario_based_questions_answer_sheet_part_one_of_two.pdf

138.0 KB

scenario_based_questions_answer_sheet_part_two_of_two.pdf

137.2 KB

Security and Risk Management.rar

1.7 MB

SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide.pdf

9.1 MB

SSCP Exam Outline-Nov 1 2018.pdf

256.3 KB

Sunflower CISSP - Crash Cram.pdf

2.7 MB

/ISC2_Tests/(ISC)2 CISSP/

AU1707_C01.pdf

818.4 KB

AU1707_C02.pdf

744.9 KB

AU1707_C03.pdf

911.5 KB

AU1707_C04.pdf

1.1 MB

AU1707_C05.pdf

564.3 KB

AU1707_C06.pdf

764.0 KB

AU1707_C07.pdf

4.1 MB

AU1707_C08.pdf

1.7 MB

AU1707_C09.pdf

494.9 KB

AU1707_C10.pdf

673.5 KB

/.../Avanset_VCE_Exam_Simulator_Pro_1_0_1/

free downloads.url

0.2 KB

Readme.txt

0.1 KB

vce_exam_simulator_demo_setup.exe

15.2 MB

/.../Avanset_VCE_Exam_Simulator_Pro_1_0_1/Crack/

designer.exe

2.8 MB

free downloads.url

0.2 KB

libcryptvce.dll

146.4 KB

libeay32.dll

552.0 KB

player.exe

2.4 MB

sqlite3.dll

263.7 KB

/ISC2_Tests/Boson/

bos_ciss.exe

6.8 MB

patch_boson_v5.59.exe

21.0 KB

patch_boson_v5.62.exe

21.0 KB

/ISC2_Tests/CISSP-ISSxP/

gratisexam.com-ISC.Actualtests.CISSP-ISSAP.v2015-03-13.by.Adella.237q.pdf

202.4 KB

gratisexam.com-ISC.Braindumps.CISSP-ISSMP.v2015-03-19.by.Clarissa.200q.pdf

193.0 KB

gratisexam.com-ISC.Certkiller.CISSP-ISSEP.v2015-03-12.by.Era.213q.pdf

179.6 KB

gratisexam.com-ISC.PracticeTest.CISSP-ISSMP.v2016-05-21.by.Aaron.62q.pdf

127.7 KB

gratisexam.com-ISC.Selftestengine.CISSP-ISSMP.v2015-03-13.by.Gayle.218q.pdf

267.9 KB

/ISC2_Tests/CISSP_Transcender/

1-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

143.3 KB

2-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

152.1 KB

3-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

146.8 KB

4-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

143.2 KB

5-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

144.0 KB

6-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

143.5 KB

7-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

157.6 KB

8-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

146.2 KB

9-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

180.0 KB

10-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

148.1 KB

11-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

145.5 KB

12-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

163.9 KB

13-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

193.4 KB

14-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

276.7 KB

15-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

171.9 KB

16-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

162.2 KB

17-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

165.2 KB

18-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

145.3 KB

29-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

147.9 KB

30-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

161.2 KB

31-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

153.0 KB

32-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

153.9 KB

33-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

147.8 KB

34-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

149.9 KB

35-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

149.3 KB

36-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

142.9 KB

37-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

152.2 KB

38-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

169.1 KB

39-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

144.7 KB

40-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

147.8 KB

41-Transcender - Cert-CISSP2015 - SecurityCert_ Certified Information Systems Security Professional (CISSP).pdf

134.3 KB

CISSP Official (ISC)2 Practice Tests (1).pdf

5.9 MB

/.../ExactPapers.ISC2.CISSP.Q.and.A.01-2005-DDU/

CISSP.pdf

993.1 KB

CISSP_4.pdf

21.2 KB

CISSP_5.pdf

71.3 KB

CISSP_6.pdf

14.7 KB

/ISC2_Tests/Quizzes/

autorun.inf

0.0 KB

Launch.exe

127.0 KB

Launch.ini

0.4 KB

/ISC2_Tests/Quizzes/Bin/

Cissp disc 7th edition.dbd

68.2 KB

Cissp disc 7th edition.txt

2.3 KB

demo32.exe

450.6 KB

/.../Chapter 1 - Security and Risk Management/

amplaunch.html

5.3 KB

meta.xml

0.8 KB

quiz.html

3.9 KB

quiz.swf

345.5 KB

quiz_html5.html

5.0 KB

quiz_unsupported.html

0.4 KB

/.../Chapter 1 - Security and Risk Management/mobile/

6hpJw2A7Lgl_80_DX1296_DY1296_CX648_CY333.png

20.9 KB

6hpJw2A7Lgl_80_DX1296_DY1296_CX648_CY333.swf

23.6 KB

6KbSQNkiyhK_80_DX778_DY778_CX389_CY363.png

4.9 KB

6KbSQNkiyhK_80_DX778_DY778_CX389_CY363.swf

5.3 KB

6ohvQudpL9i_80_DX1296_DY1296_CX648_CY364.png

32.4 KB

6ohvQudpL9i_80_DX1296_DY1296_CX648_CY364.swf

33.0 KB

6SjzCNp6e6J_80_DX1296_DY1296_CX648_CY212.png

57.1 KB

6SjzCNp6e6J_80_DX1296_DY1296_CX648_CY212.swf

16.5 KB

app_store.png

4.6 KB

data.gz

18.7 KB

data.js

100.8 KB

fonts.js

22.0 KB

linen_background.jpg

0.6 KB

masks.js

0.6 KB

mobile_icon.png

9.7 KB

mobileinstall.html

3.9 KB

player.css

64.0 KB

player_compiled.js

817.5 KB

/.../Chapter 1 - Security and Risk Management/mobile/slides/

5aVS6W7ePAd.gz

3.3 KB

5aVS6W7ePAd.js

22.1 KB

5bVWUEcRywK.gz

3.9 KB

5bVWUEcRywK.js

25.5 KB

5mk9n5923sF.gz

4.2 KB

5mk9n5923sF.js

28.0 KB

6bFAXudxl15.gz

4.5 KB

6bFAXudxl15.js

31.5 KB

6BZYqL0fId2.gz

4.2 KB

6BZYqL0fId2.js

28.0 KB

6COIuucIxPE.gz

4.1 KB

6COIuucIxPE.js

27.9 KB

6lJ88NfZWsk.gz

4.9 KB

6lJ88NfZWsk.js

32.4 KB

6ovj2L3RoUT.gz

4.6 KB

6ovj2L3RoUT.js

31.7 KB

6QGIno27MW4.gz

3.9 KB

6QGIno27MW4.js

25.4 KB

6XSadhhUuW6.gz

4.6 KB

6XSadhhUuW6.js

31.1 KB

68ZE3IruL74.gz

3.9 KB

68ZE3IruL74.js

25.6 KB

/.../Chapter 1 - Security and Risk Management/quiz_content/

6hpJw2A7Lgl_80_DX1296_DY1296.swf

14.9 KB

6KbSQNkiyhK_80_DX778_DY778.swf

5.3 KB

6ohvQudpL9i_80_DX1296_DY1296.swf

8.3 KB

6SjzCNp6e6J_80_DX1296_DY1296.swf

29.2 KB

blank.html

0.1 KB

data.swf

19.0 KB

fonts.swf

11.8 KB

fonts.xml

27.6 KB

frame.js

17.3 KB

frame.swf

101.1 KB

frame.xml

27.1 KB

hotspot_marker.swf

1.2 KB

quiz.js

42.7 KB

thumbnail.jpg

27.3 KB

user.js

0.0 KB

/.../Chapter 1 - Security and Risk Management/quiz_content/slides/

5aVS6W7ePAd.swf

3.6 KB

5bVWUEcRywK.swf

4.2 KB

5mk9n5923sF.swf

4.5 KB

6bFAXudxl15.swf

4.8 KB

6BZYqL0fId2.swf

4.5 KB

6COIuucIxPE.swf

4.4 KB

6lJ88NfZWsk.swf

5.2 KB

6ovj2L3RoUT.swf

4.9 KB

6QGIno27MW4.swf

4.2 KB

6XSadhhUuW6.swf

4.9 KB

68ZE3IruL74.swf

4.2 KB

/.../Chapter 2 - Asset Security/

amplaunch.html

5.3 KB

meta.xml

0.8 KB

quiz.html

3.9 KB

quiz.swf

345.5 KB

quiz_html5.html

5.0 KB

quiz_unsupported.html

0.4 KB

/.../Chapter 2 - Asset Security/mobile/

5vzmQ87Z6HT_80_DX792_DY792_CX396_CY362.png

3.5 KB

5vzmQ87Z6HT_80_DX792_DY792_CX396_CY362.swf

3.9 KB

6a1qD1YbhKM_80_DX1044_DY1044_CX522_CY392.png

29.8 KB

6a1qD1YbhKM_80_DX1044_DY1044_CX522_CY392.swf

32.6 KB

6dfukm446x6_80_DX1032_DY1032_CX516_CY424.png

39.5 KB

6dfukm446x6_80_DX1032_DY1032_CX516_CY424.swf

40.4 KB

6Zw37RZxYqS_80_DX848_DY848_CX369_CY424.jpg

12.5 KB

app_store.png

4.6 KB

data.gz

18.6 KB

data.js

103.0 KB

fonts.js

20.8 KB

linen_background.jpg

0.6 KB

masks.js

0.6 KB

mobile_icon.png

9.7 KB

mobileinstall.html

3.9 KB

player.css

64.0 KB

player_compiled.js

817.5 KB

/.../Chapter 2 - Asset Security/mobile/slides/

5mLAhqQIumt.gz

4.4 KB

5mLAhqQIumt.js

28.4 KB

5YUGK2yNEfn.gz

4.5 KB

5YUGK2yNEfn.js

31.2 KB

5ZJuKUjrlS9.gz

4.7 KB

5ZJuKUjrlS9.js

31.7 KB

6atYOLp63Dl.gz

3.8 KB

6atYOLp63Dl.js

25.1 KB

6DErudF1Fjn.gz

4.3 KB

6DErudF1Fjn.js

28.3 KB

6JdkwHSfQxj.gz

3.3 KB

6JdkwHSfQxj.js

22.1 KB

6kyswZZu4cy.gz

4.3 KB

6kyswZZu4cy.js

28.3 KB

6MnKjkAIvB0.gz

4.3 KB

6MnKjkAIvB0.js

28.3 KB

6oJyrM4tuON.gz

4.0 KB

6oJyrM4tuON.js

25.8 KB

61RLsm8OHsB.gz

4.6 KB

61RLsm8OHsB.js

31.4 KB

61SO99saMfp.gz

4.0 KB

61SO99saMfp.js

26.0 KB

/.../Chapter 2 - Asset Security/quiz_content/

5vzmQ87Z6HT_80_DX792_DY792.swf

3.9 KB

6a1qD1YbhKM_80_DX1044_DY1044.swf

45.4 KB

6dfukm446x6_80_DX1032_DY1032.swf

16.8 KB

6zw37rzxyqs_80_dx848_dy848.jpg

33.5 KB

blank.html

0.1 KB

data.swf

18.9 KB

fonts.swf

11.3 KB

fonts.xml

24.2 KB

frame.js

17.3 KB

frame.swf

101.0 KB

frame.xml

27.1 KB

hotspot_marker.swf

1.2 KB

quiz.js

42.7 KB

thumbnail.jpg

19.0 KB

user.js

0.0 KB

/.../Chapter 2 - Asset Security/quiz_content/slides/

5mLAhqQIumt.swf

4.7 KB

5YUGK2yNEfn.swf

4.8 KB

5ZJuKUjrlS9.swf

5.0 KB

6atYOLp63Dl.swf

4.1 KB

6DErudF1Fjn.swf

4.6 KB

6JdkwHSfQxj.swf

3.6 KB

6kyswZZu4cy.swf

4.6 KB

6MnKjkAIvB0.swf

4.6 KB

6oJyrM4tuON.swf

4.3 KB

61RLsm8OHsB.swf

4.9 KB

61SO99saMfp.swf

4.3 KB

/.../Chapter 3 - Security Engineering/

amplaunch.html

5.3 KB

meta.xml

0.8 KB

quiz.html

3.9 KB

quiz.swf

345.5 KB

quiz_html5.html

5.0 KB

quiz_unsupported.html

0.4 KB

/.../Chapter 3 - Security Engineering/mobile/

5amULiBO9wA_80_DX780_DY780_CX390_CY364.png

2.7 KB

5amULiBO9wA_80_DX780_DY780_CX390_CY364.swf

3.1 KB

5jk1gzqzhO3_80_DX540_DY540_CX270_CY233.png

7.7 KB

5jk1gzqzhO3_80_DX540_DY540_CX270_CY233.swf

8.0 KB

5sLr0xnJ3hm_80_DX1296_DY1296_CX648_CY377.png

87.6 KB

5sLr0xnJ3hm_80_DX1296_DY1296_CX648_CY377.swf

26.5 KB

6Lt2R95ZxZg_80_DX1194_DY1194_CX597_CY375.png

70.5 KB

6Lt2R95ZxZg_80_DX1194_DY1194_CX597_CY375.swf

70.8 KB

app_store.png

4.6 KB

data.gz

18.5 KB

data.js

102.8 KB

fonts.js

21.3 KB

linen_background.jpg

0.6 KB

masks.js

0.6 KB

mobile_icon.png

9.7 KB

mobileinstall.html

3.9 KB

player.css

64.0 KB

player_compiled.js

817.5 KB

/.../Chapter 3 - Security Engineering/mobile/slides/

5awhfeesRd8.gz

4.5 KB

5awhfeesRd8.js

30.9 KB

5WDpUrPNQDA.gz

4.0 KB

5WDpUrPNQDA.js

26.3 KB

5WmQ2wtJuXt.gz

4.3 KB

5WmQ2wtJuXt.js

28.3 KB

6aWbxP2AAjo.gz

3.3 KB

6aWbxP2AAjo.js

22.1 KB

6H9StgZ46kD.gz

3.9 KB

6H9StgZ46kD.js

26.0 KB

6IT9dweqsFE.gz

4.0 KB

6IT9dweqsFE.js

26.8 KB

6JsZOAykHAw.gz

4.2 KB

6JsZOAykHAw.js

27.9 KB

6m9ZBKLvucA.gz

4.3 KB

6m9ZBKLvucA.js

28.3 KB

6owDvDCOFgl.gz

4.5 KB

6owDvDCOFgl.js

31.0 KB

61VOvrm41P8.gz

4.5 KB

61VOvrm41P8.js

30.8 KB

68nzaaSUYbR.gz

4.5 KB

68nzaaSUYbR.js

28.7 KB

/.../Chapter 3 - Security Engineering/quiz_content/

5amULiBO9wA_80_DX780_DY780.swf

3.1 KB

5jk1gzqzhO3_80_DX540_DY540.swf

8.0 KB

5sLr0xnJ3hm_80_DX1296_DY1296.swf

34.8 KB

6Lt2R95ZxZg_80_DX1194_DY1194.swf

75.7 KB

blank.html

0.1 KB

data.swf

18.9 KB

fonts.swf

11.5 KB

fonts.xml

25.3 KB

frame.js

17.3 KB

frame.swf

100.8 KB

frame.xml

27.1 KB

hotspot_marker.swf

1.2 KB

quiz.js

42.7 KB

thumbnail.jpg

46.6 KB

user.js

0.0 KB

/.../Chapter 3 - Security Engineering/quiz_content/slides/

5awhfeesRd8.swf

4.8 KB

5WDpUrPNQDA.swf

4.3 KB

5WmQ2wtJuXt.swf

4.6 KB

6aWbxP2AAjo.swf

3.6 KB

6H9StgZ46kD.swf

4.2 KB

6IT9dweqsFE.swf

4.3 KB

6JsZOAykHAw.swf

4.4 KB

6m9ZBKLvucA.swf

4.6 KB

6owDvDCOFgl.swf

4.8 KB

61VOvrm41P8.swf

4.8 KB

68nzaaSUYbR.swf

4.8 KB

/.../Chapter 4 - Communications and Network Security/

amplaunch.html

5.3 KB

meta.xml

0.8 KB

quiz.html

3.9 KB

quiz.swf

345.5 KB

quiz_html5.html

5.0 KB

quiz_unsupported.html

0.4 KB

/.../Chapter 4 - Communications and Network Security/mobile/

6MAI8MbyZHw_80_DX1202_DY1202_CX601_CY400.png

57.2 KB

6MAI8MbyZHw_80_DX1202_DY1202_CX601_CY400.swf

57.5 KB

6UsPePolftz_80_DX1296_DY1296_CX648_CY317.png

71.2 KB

6UsPePolftz_80_DX1296_DY1296_CX648_CY317.swf

72.0 KB

6VNvlq8ZLg7_80_DX810_DY810_CX405_CY138.png

15.2 KB

6VNvlq8ZLg7_80_DX810_DY810_CX405_CY138.swf

8.2 KB

620F1Jgb1CT_80_DX1066_DY1066_CX533_CY424.png

37.9 KB

620F1Jgb1CT_80_DX1066_DY1066_CX533_CY424.swf

38.8 KB

app_store.png

4.6 KB

data.gz

19.7 KB

data.js

108.7 KB

fonts.js

21.7 KB

linen_background.jpg

0.6 KB

masks.js

0.6 KB

mobile_icon.png

9.7 KB

mobileinstall.html

3.9 KB

player.css

64.0 KB

player_compiled.js

817.5 KB

/.../Chapter 4 - Communications and Network Security/mobile/slides/

5kH4Bo7I96B.gz

4.4 KB

5kH4Bo7I96B.js

28.3 KB

5WqCvN1YUgV.gz

4.6 KB

5WqCvN1YUgV.js

31.2 KB

6cPgoScsbhS.gz

4.6 KB

6cPgoScsbhS.js

31.3 KB

6eTaXok0JLR.gz

3.9 KB

6eTaXok0JLR.js

25.2 KB

6Hy9d0y7k0K.gz

4.3 KB

6Hy9d0y7k0K.js

28.1 KB

6jGaZyNxfTD.gz

4.3 KB

6jGaZyNxfTD.js

28.4 KB

6KDNWitU8gt.gz

4.4 KB

6KDNWitU8gt.js

28.3 KB

6LIzawHQufj.gz

3.9 KB

6LIzawHQufj.js

25.3 KB

6m0HHp0FsSZ.gz

3.3 KB

6m0HHp0FsSZ.js

22.1 KB

62MTg8nFEzK.gz

4.6 KB

62MTg8nFEzK.js

31.3 KB

624cO1cGPlo.gz

4.0 KB

624cO1cGPlo.js

26.1 KB

/.../Chapter 4 - Communications and Network Security/quiz_content/

6MAI8MbyZHw_80_DX1202_DY1202.swf

33.3 KB

6UsPePolftz_80_DX1296_DY1296.swf

77.4 KB

6VNvlq8ZLg7_80_DX810_DY810.swf

8.2 KB

620F1Jgb1CT_80_DX1066_DY1066.swf

36.3 KB

blank.html

0.1 KB

data.swf

20.1 KB

fonts.swf

11.6 KB

fonts.xml

27.4 KB

frame.js

17.3 KB

frame.swf

101.2 KB

frame.xml

27.1 KB

hotspot_marker.swf

1.2 KB

quiz.js

42.7 KB

thumbnail.jpg

25.6 KB

user.js

0.0 KB

/.../Chapter 4 - Communications and Network Security/quiz_content/slides/

5kH4Bo7I96B.swf

4.7 KB

5WqCvN1YUgV.swf

4.9 KB

6cPgoScsbhS.swf

4.9 KB

6eTaXok0JLR.swf

4.2 KB

6Hy9d0y7k0K.swf

4.6 KB

6jGaZyNxfTD.swf

4.6 KB

6KDNWitU8gt.swf

4.7 KB

6LIzawHQufj.swf

4.2 KB

6m0HHp0FsSZ.swf

3.6 KB

62MTg8nFEzK.swf

4.9 KB

624cO1cGPlo.swf

4.3 KB

/.../Chapter 5 - Identity and Access Management/

amplaunch.html

5.3 KB

meta.xml

0.8 KB

quiz.html

3.9 KB

quiz.swf

345.5 KB

quiz_html5.html

5.0 KB

quiz_unsupported.html

0.4 KB

/.../Chapter 5 - Identity and Access Management/mobile/

5rr06xT9Leh_80_DX782_DY782_CX391_CY353.png

3.2 KB

5rr06xT9Leh_80_DX782_DY782_CX391_CY353.swf

3.6 KB

5tHVxOTuRH6_80_DX1296_DY1296_CX648_CY393.png

90.3 KB

5tHVxOTuRH6_80_DX1296_DY1296_CX648_CY393.swf

90.8 KB

6csGVbzUoO6_80_DX904_DY904_CX452_CY424.png

56.4 KB

6csGVbzUoO6_80_DX904_DY904_CX452_CY424.swf

57.8 KB

65NK4OPNaOG_80_DX1296_DY1296_CX648_CY317.png

84.8 KB

65NK4OPNaOG_80_DX1296_DY1296_CX648_CY317.swf

36.8 KB

app_store.png

4.6 KB

data.gz

19.5 KB

data.js

108.3 KB

fonts.js

21.6 KB

linen_background.jpg

0.6 KB

masks.js

0.6 KB

mobile_icon.png

9.7 KB

mobileinstall.html

3.9 KB

player.css

64.0 KB

player_compiled.js

817.5 KB

/.../Chapter 5 - Identity and Access Management/mobile/slides/

5bt8vfqgkKO.gz

4.0 KB

5bt8vfqgkKO.js

26.2 KB

5ghGzfzMisf.gz

3.8 KB

5ghGzfzMisf.js

25.0 KB

5qnXdikTNol.gz

4.2 KB

5qnXdikTNol.js

28.0 KB

5sZqtJUtVcZ.gz

4.6 KB

5sZqtJUtVcZ.js

31.4 KB

6dlXn70wMok.gz

4.2 KB

6dlXn70wMok.js

28.3 KB

6fD1tWcYTAl.gz

4.3 KB

6fD1tWcYTAl.js

28.1 KB

6G9XPnpztnR.gz

4.6 KB

6G9XPnpztnR.js

31.3 KB

6KWIwYlTh8l.gz

4.6 KB

6KWIwYlTh8l.js

31.4 KB

6NjX2Rpn2Fb.gz

4.2 KB

6NjX2Rpn2Fb.js

27.9 KB

6pZKof48Nft.gz

3.3 KB

6pZKof48Nft.js

22.1 KB

6U06PxyCzlY.gz

4.0 KB

6U06PxyCzlY.js

26.0 KB

/.../Chapter 5 - Identity and Access Management/quiz_content/

5rr06xT9Leh_80_DX782_DY782.swf

3.6 KB

5tHVxOTuRH6_80_DX1296_DY1296.swf

84.9 KB

6csGVbzUoO6_80_DX904_DY904.swf

28.8 KB

65NK4OPNaOG_80_DX1296_DY1296.swf

71.5 KB

blank.html

0.1 KB

data.swf

19.9 KB

fonts.swf

11.7 KB

fonts.xml

25.5 KB

frame.js

17.3 KB

frame.swf

101.3 KB

frame.xml

27.1 KB

hotspot_marker.swf

1.2 KB

quiz.js

42.7 KB

thumbnail.jpg

22.2 KB

user.js

0.0 KB

/.../Chapter 5 - Identity and Access Management/quiz_content/slides/

5bt8vfqgkKO.swf

4.3 KB

5ghGzfzMisf.swf

4.1 KB

5qnXdikTNol.swf

4.5 KB

5sZqtJUtVcZ.swf

4.9 KB

6dlXn70wMok.swf

4.5 KB

6fD1tWcYTAl.swf

4.6 KB

6G9XPnpztnR.swf

4.9 KB

6KWIwYlTh8l.swf

4.9 KB

6NjX2Rpn2Fb.swf

4.5 KB

6pZKof48Nft.swf

3.6 KB

6U06PxyCzlY.swf

4.3 KB

/.../Chapter 6 - Security Assessment and Testing/

amplaunch.html

5.3 KB

meta.xml

0.8 KB

quiz.html

3.9 KB

quiz.swf

345.5 KB

quiz_html5.html

5.0 KB

quiz_unsupported.html

0.4 KB

/.../Chapter 6 - Security Assessment and Testing/mobile/

5rQ0wwURIGV_80_DX1278_DY1278_CX639_CY424.png

21.7 KB

5rQ0wwURIGV_80_DX1278_DY1278_CX639_CY424.swf

21.8 KB

5WhV2rhe2Cq_80_DX766_DY766_CX383_CY353.png

4.2 KB

5WhV2rhe2Cq_80_DX766_DY766_CX383_CY353.swf

4.7 KB

6KLfoayzEW2_80_DX1174_DY1174_CX587_CY330.png

110.2 KB

6KLfoayzEW2_80_DX1174_DY1174_CX587_CY330.swf

23.2 KB

6R2EisGAhad_80_DX1296_DY1296_CX648_CY227.png

25.3 KB

6R2EisGAhad_80_DX1296_DY1296_CX648_CY227.swf

25.6 KB

app_store.png

4.6 KB

data.gz

20.8 KB

data.js

118.0 KB

fonts.js

21.7 KB

linen_background.jpg

0.6 KB

masks.js

0.6 KB

mobile_icon.png

9.7 KB

mobileinstall.html

3.9 KB

player.css

64.0 KB

player_compiled.js

817.5 KB

/.../Chapter 6 - Security Assessment and Testing/mobile/slides/

5cLpnhXdzJY.gz

4.0 KB

5cLpnhXdzJY.js

25.6 KB

5h2VYkUhSd9.gz

3.8 KB

5h2VYkUhSd9.js

25.2 KB

5j6VE25WTxO.gz

4.4 KB

5j6VE25WTxO.js

28.4 KB

5lm778Bqr5L.gz

4.3 KB

5lm778Bqr5L.js

28.2 KB

5t1XO0gdG7Z.gz

4.4 KB

5t1XO0gdG7Z.js

28.5 KB

5v5O4WTeIxG.gz

4.8 KB

5v5O4WTeIxG.js

31.8 KB

6aeytbO9Imd.gz

4.7 KB

6aeytbO9Imd.js

31.7 KB

6Aq47nmeXte.gz

4.6 KB

6Aq47nmeXte.js

31.0 KB

6De7EmK9KeG.gz

3.9 KB

6De7EmK9KeG.js

25.5 KB

6ilqzi27PiX.gz

3.3 KB

6ilqzi27PiX.js

22.1 KB

6lpOFD0HSDA.gz

4.5 KB

6lpOFD0HSDA.js

28.5 KB

/.../Chapter 6 - Security Assessment and Testing/quiz_content/

5rQ0wwURIGV_80_DX1278_DY1278.swf

5.7 KB

5WhV2rhe2Cq_80_DX766_DY766.swf

4.7 KB

6KLfoayzEW2_80_DX1174_DY1174.swf

48.1 KB

6R2EisGAhad_80_DX1296_DY1296.swf

38.4 KB

blank.html

0.1 KB

data.swf

21.2 KB

fonts.swf

11.7 KB

fonts.xml

26.5 KB

frame.js

17.3 KB

frame.swf

100.8 KB

frame.xml

27.1 KB

hotspot_marker.swf

1.2 KB

quiz.js

42.7 KB

thumbnail.jpg

28.9 KB

user.js

0.0 KB

/.../Chapter 6 - Security Assessment and Testing/quiz_content/slides/

5cLpnhXdzJY.swf

4.3 KB

5h2VYkUhSd9.swf

4.1 KB

5j6VE25WTxO.swf

4.7 KB

5lm778Bqr5L.swf

4.6 KB

5t1XO0gdG7Z.swf

4.7 KB

5v5O4WTeIxG.swf

5.1 KB

6aeytbO9Imd.swf

5.0 KB

6Aq47nmeXte.swf

4.9 KB

6De7EmK9KeG.swf

4.2 KB

6ilqzi27PiX.swf

3.6 KB

6lpOFD0HSDA.swf

4.7 KB

/.../Chapter 7 - Security Operations/

amplaunch.html

5.3 KB

meta.xml

0.8 KB

quiz.html

3.9 KB

quiz.swf

345.5 KB

quiz_html5.html

5.0 KB

quiz_unsupported.html

0.4 KB

/.../Chapter 7 - Security Operations/mobile/

6bYXbrSqZ9X_80_DX1296_DY1296_CX648_CY250.jpg

15.9 KB

6fnVWRTNnmv_80_DX810_DY810_CX405_CY353.png

3.3 KB

6fnVWRTNnmv_80_DX810_DY810_CX405_CY353.swf

3.8 KB

6iUdTnwIF0P_80_DX1296_DY1296_CX648_CY60.png

9.8 KB

6iUdTnwIF0P_80_DX1296_DY1296_CX648_CY60.swf

9.8 KB

6kKXeKOvOWk_80_DX1296_DY1296_CX648_CY175.png

37.7 KB

6kKXeKOvOWk_80_DX1296_DY1296_CX648_CY175.swf

10.6 KB

app_store.png

4.6 KB

data.gz

18.0 KB

data.js

99.8 KB

fonts.js

22.1 KB

linen_background.jpg

0.6 KB

masks.js

0.6 KB

mobile_icon.png

9.7 KB

mobileinstall.html

3.9 KB

player.css

64.0 KB

player_compiled.js

817.5 KB

/.../Chapter 7 - Security Operations/mobile/slides/

5asDuur5bcD.gz

4.4 KB

5asDuur5bcD.js

30.5 KB

5iqeO7eObK9.gz

4.2 KB

5iqeO7eObK9.js

28.0 KB

5urC1A4t7j3.gz

4.7 KB

5urC1A4t7j3.js

29.1 KB

5vFf4a26Hbv.gz

3.9 KB

5vFf4a26Hbv.js

25.4 KB

5VpIf2ABBgt.gz

4.3 KB

5VpIf2ABBgt.js

28.2 KB

5XlEzX2FvxJ.gz

4.2 KB

5XlEzX2FvxJ.js

28.2 KB

6E1H2aRZmBL.gz

3.3 KB

6E1H2aRZmBL.js

22.1 KB

6EBlvmwKJwn.gz

3.9 KB

6EBlvmwKJwn.js

25.5 KB

6nJaZb4LH6p.gz

4.6 KB

6nJaZb4LH6p.js

31.2 KB

6TDvkPTny4j.gz

4.5 KB

6TDvkPTny4j.js

31.1 KB

6Y9RjtBwc0T.gz

3.9 KB

6Y9RjtBwc0T.js

25.3 KB

/.../Chapter 7 - Security Operations/quiz_content/

6bYXbrSqZ9X_80_DX1296_DY1296.jpg

17.6 KB

6fnVWRTNnmv_80_DX810_DY810.swf

3.8 KB

6iUdTnwIF0P_80_DX1296_DY1296.swf

14.0 KB

6kKXeKOvOWk_80_DX1296_DY1296.swf

17.8 KB

blank.html

0.1 KB

data.swf

18.4 KB

fonts.swf

12.0 KB

fonts.xml

27.4 KB

frame.js

17.3 KB

frame.swf

101.0 KB

frame.xml

27.1 KB

hotspot_marker.swf

1.2 KB

quiz.js

42.7 KB

thumbnail.jpg

25.9 KB

user.js

0.0 KB

/.../Chapter 7 - Security Operations/quiz_content/slides/

5asDuur5bcD.swf

4.7 KB

5iqeO7eObK9.swf

4.5 KB

5urC1A4t7j3.swf

5.0 KB

5vFf4a26Hbv.swf

4.2 KB

5VpIf2ABBgt.swf

4.6 KB

5XlEzX2FvxJ.swf

4.6 KB

6E1H2aRZmBL.swf

3.6 KB

6EBlvmwKJwn.swf

4.2 KB

6nJaZb4LH6p.swf

4.9 KB

6TDvkPTny4j.swf

4.8 KB

6Y9RjtBwc0T.swf

4.2 KB

/.../Chapter 8 - Software Development Security/

amplaunch.html

5.3 KB

meta.xml

0.8 KB

quiz.html

3.9 KB

quiz.swf

345.5 KB

quiz_html5.html

5.0 KB

quiz_unsupported.html

0.4 KB

/.../Chapter 8 - Software Development Security/mobile/

5XLopNiiGsj_80_DX1128_DY1128_CX564_CY408.png

106.9 KB

5XLopNiiGsj_80_DX1128_DY1128_CX564_CY408.swf

28.1 KB

6dkwHSGC0zf_80_DX1296_DY1296_CX648_CY364.jpg

8.7 KB

6Fq6MyZrDis_80_DX918_DY918_CX459_CY424.png

28.9 KB

6Fq6MyZrDis_80_DX918_DY918_CX459_CY424.swf

29.7 KB

65SWAxlBUse_80_DX1296_DY1296_CX648_CY325.png

61.7 KB

65SWAxlBUse_80_DX1296_DY1296_CX648_CY325.swf

22.2 KB

app_store.png

4.6 KB

data.gz

18.0 KB

data.js

97.6 KB

fonts.js

20.8 KB

linen_background.jpg

0.6 KB

masks.js

0.6 KB

mobile_icon.png

9.7 KB

mobileinstall.html

3.9 KB

player.css

64.0 KB

player_compiled.js

817.5 KB

/.../Chapter 8 - Software Development Security/mobile/slides/

5VNRtROQa0i.gz

3.9 KB

5VNRtROQa0i.js

25.7 KB

5YWu5asro7z.gz

3.8 KB

5YWu5asro7z.js

25.2 KB

6HjLWZ6dSom.gz

4.3 KB

6HjLWZ6dSom.js

28.3 KB

6i1c5Ns28Ym.gz

4.5 KB

6i1c5Ns28Ym.js

30.8 KB

6ID2LJ02kpl.gz

4.2 KB

6ID2LJ02kpl.js

28.0 KB

6ocpa6zwsaM.gz

4.5 KB

6ocpa6zwsaM.js

30.8 KB

6pTiLNsgBBJ.gz

4.4 KB

6pTiLNsgBBJ.js

28.3 KB

6RrbtenYomJ.gz

4.0 KB

6RrbtenYomJ.js

26.3 KB

6Xa5JWBAIat.gz

4.3 KB

6Xa5JWBAIat.js

28.2 KB

6ZmzZM47lHd.gz

3.3 KB

6ZmzZM47lHd.js

22.1 KB

62xulG3qRze.gz

4.5 KB

62xulG3qRze.js

30.8 KB

/.../Chapter 8 - Software Development Security/quiz_content/

5XLopNiiGsj_80_DX1128_DY1128.swf

70.9 KB

6dkwHSGC0zf_80_DX1296_DY1296.jpg

10.5 KB

6Fq6MyZrDis_80_DX918_DY918.swf

11.3 KB

65SWAxlBUse_80_DX1296_DY1296.swf

50.8 KB

blank.html

0.1 KB

data.swf

18.3 KB

fonts.swf

11.3 KB

fonts.xml

24.2 KB

frame.js

17.3 KB

frame.swf

101.2 KB

frame.xml

27.1 KB

hotspot_marker.swf

1.2 KB

quiz.js

42.7 KB

thumbnail.jpg

27.8 KB

user.js

0.0 KB

/.../Chapter 8 - Software Development Security/quiz_content/slides/

5VNRtROQa0i.swf

4.2 KB

5YWu5asro7z.swf

4.1 KB

6HjLWZ6dSom.swf

4.6 KB

6i1c5Ns28Ym.swf

4.8 KB

6ID2LJ02kpl.swf

4.5 KB

6ocpa6zwsaM.swf

4.8 KB

6pTiLNsgBBJ.swf

4.7 KB

6RrbtenYomJ.swf

4.3 KB

6Xa5JWBAIat.swf

4.6 KB

6ZmzZM47lHd.swf

3.6 KB

62xulG3qRze.swf

4.8 KB

/ISC2_Tests/Quizzes/Software/

setup.exe

50.8 MB

/ISC2_Tests/Tests/

7 Types of Hard CISSP Exam Questions and How To Approach Them.pdf

113.4 KB

Access Control.zip

1.7 MB

Business Continuity and Disaster Recovery Planning.zip

1.0 MB

CISSP Practice questions 3rd Michael Gregg.pdf

248.1 KB

CISSP Practice Questions Exam Cram (3rd - Gregg, Michael.pdf

1.9 MB

CISSP Real Retired 100 Qs.pdf.fb!

1.3 MB

Cryptography.zip

1.2 MB

Information Security Governance and Risk Management.zip

1.3 MB

Legal, Regulations, Investigations and Compliance.zip

929.7 KB

Physical and Environmental Security.zip

940.5 KB

Read Me.txt

0.4 KB

Security Architecture and Design.zip

1.2 MB

Security Operations.zip

1.1 MB

Software Development Security.zip

940.3 KB

Telecommunications and Network Security.zip

1.4 MB

/.../CISSP Practice 2250 Questions- Wiley [Epub]/

CISSP Practice - Cover.jpg.fb!

453.0 KB

CISSP Practice - Vallabhaneni, S. Rao.epub

1.4 MB

/.../CISSP Practice Exams Shon Harris 2015/9780071845403/

Access Control.zip

1.7 MB

Business Continuity and Disaster Recovery Planning.zip

1.0 MB

Cryptography.zip

1.2 MB

Information Security Governance and Risk Management.zip

1.3 MB

Legal, Regulations, Investigations and Compliance.zip

929.7 KB

Physical and Environmental Security.zip

940.5 KB

Read Me.txt.fb!

0.4 KB

Security Architecture and Design.zip

1.2 MB

Security Operations.zip

1.1 MB

Software Development Security.zip

940.3 KB

Telecommunications and Network Security.zip

1.4 MB

/.../CISSP Practice Exams Shon Harris 2015/9780071845403/Access Control/

ioslaunch.html.fb!

4.8 KB

meta.xml

0.8 KB

quiz.html.fb!

4.3 KB

quiz.swf

344.1 KB

quiz_html5.html.fb!

4.8 KB

quiz_unsupported.html.fb!

0.4 KB

/.../CISSP Practice Exams Shon Harris 2015/9780071845403/Access Control/mobile/

5m4nYZOW6Vz_80_DX1078_DY1078_CX539_CY396.jpg.fb!

25.4 KB

6bymBn4eoyv_80_DX1296_DY1296_CX648_CY347.jpg.fb!

29.9 KB

6hm7CWRzeLg_80_DX1296_DY1296_CX648_CY379.jpg.fb!

36.8 KB

6ZuQrj79HOw_80_DX1070_DY1070_CX535_CY424.png.fb!

76.9 KB

6ZuQrj79HOw_80_DX1070_DY1070_CX535_CY424.swf

79.1 KB

679Lo2Fgaeh_80_DX1296_DY1296_CX648_CY389.jpg.fb!

28.6 KB

app_store.png.fb!

4.6 KB

data.gz

17.7 KB

data.js

100.4 KB

fonts.js

33.7 KB

linen_background.jpg.fb!

0.6 KB

masks.js

9.7 KB

mobile_icon.png.fb!

9.7 KB

mobileinstall.html.fb!

4.0 KB

player.css

62.6 KB

player_compiled.js

799.3 KB

/.../CISSP Practice Exams Shon Harris 2015/9780071845403/Access Control/mobile/slides/

5onLWn3xevI.gz

4.2 KB

5onLWn3xevI.js

28.4 KB

5saZQwASPYp.gz

5.2 KB

5saZQwASPYp.js

46.6 KB

5tsJrzZXA9H.gz

4.2 KB

5tsJrzZXA9H.js

28.1 KB

5YRrPOwmmUx.gz

4.5 KB

5YRrPOwmmUx.js

30.6 KB

6GFVRX9xqWQ.gz

4.3 KB

6GFVRX9xqWQ.js

28.3 KB

6gqeuEEVJ1f.gz

3.9 KB

6gqeuEEVJ1f.js

25.5 KB

6n4UbwEvFwc.gz

4.5 KB

6n4UbwEvFwc.js

31.5 KB

6nIpz08KycO.gz

4.1 KB

6nIpz08KycO.js

28.0 KB

6o2adFJeZUI.gz

4.5 KB

6o2adFJeZUI.js

30.6 KB

6OGZnrBgBzS.gz

4.1 KB

6OGZnrBgBzS.js

28.1 KB

6OzCQQTnFBs.gz

4.2 KB

6OzCQQTnFBs.js

28.0 KB

6QSGvtLpG74.gz

4.1 KB

6QSGvtLpG74.js

28.1 KB

6S9OWvtJ9Fe.gz

4.1 KB

6S9OWvtJ9Fe.js

28.2 KB

6VJbWM8PwEL.gz

3.3 KB

6VJbWM8PwEL.js

22.1 KB

/.../CISSP Practice Exams Shon Harris 2015/9780071845403/Access Control/quiz_content/

5m4nYZOW6Vz_80_DX1078_DY1078.jpg.fb!

58.2 KB

6bymBn4eoyv_80_DX1296_DY1296.jpg.fb!

45.0 KB

6hm7CWRzeLg_80_DX1296_DY1296.jpg.fb!

61.8 KB

6ZuQrj79HOw_80_DX1070_DY1070.swf

128.8 KB

679Lo2Fgaeh_80_DX1296_DY1296.jpg.fb!

61.6 KB

blank.html.fb!

0.1 KB

data.swf

18.0 KB

fonts.swf

18.5 KB

fonts.xml

34.5 KB

frame.js

17.3 KB

frame.swf

101.3 KB

frame.xml

27.1 KB

hotspot_marker.swf

1.2 KB

quiz.js

43.7 KB

thumbnail.jpg.fb!

44.9 KB

user.js

0.0 KB

/.../CISSP Practice Exams Shon Harris 2015/9780071845403/Access Control/quiz_content/slides/

5onLWn3xevI.swf

4.5 KB

5saZQwASPYp.swf

5.5 KB

5tsJrzZXA9H.swf

4.5 KB

5YRrPOwmmUx.swf

4.8 KB

6GFVRX9xqWQ.swf

4.6 KB

6gqeuEEVJ1f.swf

4.2 KB

6n4UbwEvFwc.swf

4.8 KB

6nIpz08KycO.swf

4.4 KB

6o2adFJeZUI.swf

4.8 KB

6OGZnrBgBzS.swf

4.4 KB

6OzCQQTnFBs.swf

4.5 KB

6QSGvtLpG74.swf

4.4 KB

6S9OWvtJ9Fe.swf

4.4 KB

6VJbWM8PwEL.swf

3.6 KB

/.../Total tester CISSP All-in-One Exam Guide, 6th Edition Shon Harris book/java/jre7/lib/security/

trusted.libraries

0.0 KB

/IT_Security_eBooks/

Computer Forensics and Cyber Crime An Introduction, 3rd Edition.rar

126.9 MB

Investigative Computer Forensics The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives.pdf

3.4 MB

ISO-IEC_27001-2013 Requirements (original).pdf

469.9 KB

ISO-IEC_27002-2013 Code of practice for IS management (original).pdf

948.3 KB

theoretical-experimental-methods-against-attacks.pdf

10.5 MB

Зима В.М., Молдовян А.А. - Многоуровневая защита информационно-программного обеспечения вычислительных систем - 1997.pdf

581.7 KB

Зима В.М., Молдовян А.А. - Многоуровневая защита от компьютерных вирусов - 1997.pdf

1.4 MB

Зима В.М., Молдовян А.А. - Схемы защиты информации на основе системы Кобра - 1997.pdf

558.4 KB

Зима В.М., Молдовян А.А. - Технология практического обеспечения информационной безопасности - 1997.pdf

634.3 KB

Зима В.М., Молдовян А.А., Молдовян Н.А. - Защита компьютерных ресурсов от несанкционированных действий пользователей - 1997.pdf

1.0 MB

Зима,Молдовян,Молдовян Безопасность глобальных сетевых технологий.2000.pdf

3.5 MB

Шнайдер Брюс - Прикладная Криптография.pdf

3.4 MB

/.../Brus_Shnayer_Prikladnaya_kriptografiya/

Прикладная криптография 1.PDF

625.1 KB

Прикладная криптография 2.PDF

356.3 KB

Прикладная криптография 3.PDF

550.6 KB

Прикладная криптография 4.PDF

392.2 KB

Прикладная криптография 5.PDF

395.1 KB

Прикладная криптография 6.PDF

520.6 KB

Прикладная криптография 7.PDF

61.9 KB

Прикладная криптография 8.PDF

349.3 KB

Прикладная криптография 9.PDF

79.0 KB

/.../Syngress-Mission_Critical_Internet_Security/

115_sec.exe

7.2 MB

/Прикладная криптография/

ac_01_06.pdf

625.1 KB

ac_07_10.pdf

356.3 KB

ac_11_14.pdf

550.6 KB

ac_15_17.pdf

392.2 KB

ac_18_20.pdf

395.1 KB

ac_21_25.pdf

520.6 KB

ac_contnt.pdf

61.9 KB

ac_refer.pdf

349.3 KB

ac_source.pdf

79.0 KB

 

Total files 2485


Copyright © 2025 FileMood.com