CISSP 3rd Edition |
||
Name |
DOWNLOAD
Copy Link
Trouble downloading? see How To |
|
Total Size |
6.6 GB |
|
Total Files |
452 |
|
Hash |
2C6F98097B9F4DD2576234372D08CF347D9C5E32 |
/.../Lesson 30 Secure Network Components/ |
|
|
67.1 MB |
|
0.8 KB |
|
3.8 MB |
|
15.8 KB |
|
38.0 MB |
|
16.1 KB |
|
42.1 MB |
|
25.7 KB |
|
20.2 KB |
|
47.3 MB |
|
13.8 KB |
|
33.1 MB |
|
25.5 KB |
|
54.1 MB |
/Introduction/ |
|
|
41.8 MB |
|
10.8 KB |
/Module 1 Security and Risk Management Domain/ |
|
|
2.2 KB |
|
9.7 MB |
/.../Lesson 1 Understand, Adhere to, and Promote Professional Ethics/ |
|
|
0.4 KB |
|
2.1 MB |
|
19.1 KB |
|
48.5 MB |
/.../Lesson 2 Understand and Apply Security Concepts/ |
|
|
0.4 KB |
|
2.1 MB |
|
17.4 KB |
|
40.0 MB |
/.../Lesson 3 Evaluate and Apply Security Governance Principles/ |
|
|
0.6 KB |
|
2.6 MB |
|
16.0 KB |
|
38.5 MB |
|
22.9 KB |
|
53.5 MB |
|
19.0 KB |
|
46.1 MB |
/.../Lesson 4 Determine Compliance and Other Requirements/ |
|
|
0.7 KB |
|
3.0 MB |
|
17.3 KB |
|
43.5 MB |
|
19.5 KB |
|
48.9 MB |
|
20.5 KB |
|
37.8 MB |
/.../Lesson 5 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context/ |
|
|
0.6 KB |
|
2.6 MB |
|
17.6 KB |
|
37.1 MB |
|
17.3 KB |
|
44.5 MB |
/.../Lesson 6 Understand Requirements for Investigation Types/ |
|
|
0.4 KB |
|
2.1 MB |
|
16.1 KB |
|
39.3 MB |
/.../Lesson 7 Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines/ |
|
|
0.5 KB |
|
2.4 MB |
|
17.0 KB |
|
38.7 MB |
/.../Lesson 8 Identify, Analyze, and Prioritize Business Continuity Requirements/ |
|
|
0.6 KB |
|
2.5 MB |
|
15.2 KB |
|
33.6 MB |
|
16.2 KB |
|
41.8 MB |
/.../Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/ |
|
|
0.6 KB |
|
3.1 MB |
|
15.5 KB |
|
35.5 MB |
|
18.5 KB |
|
44.0 MB |
|
20.5 KB |
|
39.8 MB |
/.../Lesson 10 Understand and Apply Risk Management Concepts/ |
|
|
0.5 KB |
|
2.8 MB |
|
18.2 KB |
|
42.0 MB |
|
18.1 KB |
|
43.4 MB |
|
22.1 KB |
|
55.5 MB |
|
18.9 KB |
|
42.5 MB |
/.../Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/ |
|
|
0.6 KB |
|
2.9 MB |
|
22.4 KB |
|
55.6 MB |
|
15.1 KB |
|
36.2 MB |
|
18.4 KB |
|
47.9 MB |
|
19.4 KB |
|
43.7 MB |
/.../Lesson 12 Apply Supply Chain Risk Management Concepts/ |
|
|
0.4 KB |
|
1.9 MB |
|
15.5 KB |
|
36.6 MB |
/.../Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/ |
|
|
0.8 KB |
|
3.5 MB |
|
22.5 KB |
|
51.5 MB |
|
16.2 KB |
|
39.1 MB |
|
22.8 KB |
|
47.9 MB |
/Module 2 Asset Security/ |
|
|
1.4 KB |
|
6.3 MB |
/.../Lesson 14 Identify and Classify Information and Assets/ |
|
|
0.4 KB |
|
2.0 MB |
|
18.1 KB |
|
41.1 MB |
/.../Lesson 15 Establish Information and Asset Handling Requirements/ |
|
|
0.4 KB |
|
2.0 MB |
|
13.5 KB |
|
33.6 MB |
/.../Lesson 16 Provision Resources Securely/ |
|
|
0.3 KB |
|
1.8 MB |
|
17.5 KB |
|
42.4 MB |
/.../Lesson 17 Manage Data Lifecycle/ |
|
|
0.5 KB |
|
2.2 MB |
|
20.1 KB |
|
48.2 MB |
|
16.6 KB |
|
43.3 MB |
/.../Lesson 18 Ensure Appropriate Asset Retention/ |
|
|
0.4 KB |
|
2.0 MB |
|
15.2 KB |
|
38.1 MB |
/.../Lesson 19 Determine Data Security Controls and Compliance Requirements/ |
|
|
0.7 KB |
|
3.3 MB |
|
12.8 KB |
|
30.3 MB |
|
15.4 KB |
|
36.5 MB |
|
25.7 KB |
|
47.9 MB |
/Module 3 Security Architecture and Engineering/ |
|
|
1.9 KB |
|
8.3 MB |
/.../Lesson 20 Research, Implement, and Manage Engineering Processes Using Secure Design Principles/ |
|
|
0.5 KB |
|
2.2 MB |
|
18.6 KB |
|
46.9 MB |
/.../Lesson 21 Understand the Fundamental Concepts of Security Models/ |
|
|
0.4 KB |
|
2.0 MB |
|
19.1 KB |
|
45.8 MB |
/.../Lesson 22 Select Controls Based Upon System Security Requirements/ |
|
|
0.4 KB |
|
2.1 MB |
|
12.4 KB |
|
31.8 MB |
/.../Lesson 23 Understand Security Capabilities of Information Systems/ |
|
|
0.5 KB |
|
2.8 MB |
|
21.2 KB |
|
49.3 MB |
|
19.5 KB |
|
37.8 MB |
/.../Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/ |
|
|
1.1 KB |
|
5.5 MB |
|
15.7 KB |
|
36.3 MB |
|
14.8 KB |
|
38.0 MB |
|
24.8 KB |
|
63.2 MB |
|
15.9 KB |
|
38.4 MB |
|
14.3 KB |
|
34.4 MB |
|
17.5 KB |
|
43.1 MB |
|
17.1 KB |
|
45.2 MB |
|
23.9 KB |
|
48.8 MB |
/.../Lesson 25 Select and Determine Cryptographic Solutions/ |
|
|
1.0 KB |
|
4.8 MB |
|
19.0 KB |
|
48.6 MB |
|
19.5 KB |
|
47.2 MB |
|
21.2 KB |
|
44.9 MB |
|
21.4 KB |
|
47.0 MB |
|
20.9 KB |
|
46.0 MB |
|
12.9 KB |
|
29.4 MB |
/.../Lesson 26 Understand Methods of Cryptanalytic Attacks/ |
|
|
0.7 KB |
|
3.7 MB |
|
16.7 KB |
|
42.6 MB |
003. 26.2 Hash and Kerberos Post-Exploitation Attacks.en.srt |
16.5 KB |
|
40.4 MB |
|
15.7 KB |
|
40.0 MB |
|
22.4 KB |
|
42.3 MB |
/.../Lesson 27 Apply Security Principles to Site and Facility Design/ |
|
|
0.4 KB |
|
2.1 MB |
|
13.3 KB |
|
29.3 MB |
/.../Lesson 28 Design Site and Facility Security Controls/ |
|
|
0.7 KB |
|
3.1 MB |
|
17.5 KB |
|
46.5 MB |
|
16.9 KB |
|
45.8 MB |
|
21.9 KB |
|
39.5 MB |
/Module 4 Communication and Network Security/ |
|
|
2.0 KB |
|
7.9 MB |
/.../Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/ |
|
|
0.9 KB |
|
4.7 MB |
|
25.5 KB |
|
58.9 MB |
|
19.5 KB |
|
48.7 MB |
|
11.5 KB |
|
27.9 MB |
|
15.0 KB |
|
39.2 MB |
|
15.0 KB |
|
35.8 MB |
|
15.7 KB |
|
40.9 MB |
|
19.6 KB |
|
52.3 MB |
|
18.3 KB |
|
41.0 MB |
/.../Lesson 31 Implement Secure Communication Channels According to Design/ |
|
|
0.8 KB |
|
4.0 MB |
|
15.2 KB |
|
36.2 MB |
|
17.3 KB |
|
41.7 MB |
|
16.0 KB |
|
40.5 MB |
|
13.8 KB |
|
32.0 MB |
|
17.9 KB |
|
36.5 MB |
/Module 5 Identity and Access Management (IAM)/ |
|
|
1.5 KB |
|
6.6 MB |
/.../Lesson 32 Control Physical and Logical Access to Assets/ |
|
|
0.5 KB |
|
2.3 MB |
|
13.9 KB |
|
34.0 MB |
/.../Lesson 33 Manage Identification and Authentication of People, Devices, and Services/ |
|
|
0.5 KB |
|
3.1 MB |
|
15.2 KB |
|
38.4 MB |
|
18.6 KB |
|
42.5 MB |
|
13.6 KB |
|
33.9 MB |
/.../Lesson 34 Federated Identity with a Third-party Service/ |
|
|
0.4 KB |
|
2.0 MB |
|
15.8 KB |
|
35.9 MB |
/.../Lesson 35 Implement and Manage Authorization Mechanisms/ |
|
|
0.5 KB |
|
2.5 MB |
|
17.9 KB |
|
44.2 MB |
|
23.8 KB |
|
49.2 MB |
/.../Lesson 36 Manage the Identity and Access Provisioning Lifecycle/ |
|
|
0.5 KB |
|
2.4 MB |
|
17.5 KB |
|
39.7 MB |
|
16.0 KB |
|
42.1 MB |
/.../Lesson 37 Implement Authentication Systems/ |
|
|
0.7 KB |
|
3.0 MB |
|
21.5 KB |
|
47.9 MB |
|
11.9 KB |
|
26.2 MB |
|
18.6 KB |
|
36.2 MB |
/Module 6 Security Assessment and Testing/ |
|
|
1.6 KB |
|
6.2 MB |
/.../Lesson 38 Design and Validate Assessment, Test, and Audit Strategies/ |
|
|
0.5 KB |
|
2.3 MB |
|
13.9 KB |
|
34.2 MB |
|
19.0 KB |
|
41.1 MB |
/.../Lesson 39 Conduct Security Controls Testing/ |
|
|
0.6 KB |
|
2.9 MB |
|
17.5 KB |
|
43.0 MB |
|
17.5 KB |
|
41.4 MB |
|
14.5 KB |
|
38.4 MB |
|
22.1 KB |
|
42.3 MB |
/.../Lesson 40 Collect Security Process Data/ |
|
|
0.5 KB |
|
2.4 MB |
|
15.6 KB |
|
35.0 MB |
|
16.7 KB |
|
34.7 MB |
|
14.5 KB |
|
36.0 MB |
/.../Lesson 41 Analyze Test Output and Generate Report/ |
|
|
0.4 KB |
|
2.0 MB |
|
19.7 KB |
|
45.3 MB |
/.../Lesson 42 Conduct or Facilitate Security Audits/ |
|
|
0.6 KB |
|
2.5 MB |
|
21.5 KB |
|
49.1 MB |
|
23.6 KB |
|
52.4 MB |
/Module 7 Security Operations/ |
|
|
2.2 KB |
|
9.4 MB |
/.../Lesson 43 Understand and Comply with Investigations/ |
|
|
0.4 KB |
|
2.1 MB |
|
24.2 KB |
|
54.0 MB |
|
20.0 KB |
|
49.5 MB |
/.../Lesson 44 Conduct Logging and Monitoring Activities/ |
|
|
0.5 KB |
|
2.3 MB |
|
19.7 KB |
|
46.3 MB |
|
20.4 KB |
|
47.9 MB |
/.../Lesson 45 Perform Configuration Management/ |
|
|
0.5 KB |
|
2.1 MB |
|
13.2 KB |
|
28.6 MB |
|
11.1 KB |
|
26.9 MB |
/.../Lesson 46 Apply Foundational Security Operations Concepts/ |
|
|
0.4 KB |
|
1.9 MB |
|
16.8 KB |
|
40.8 MB |
/.../Lesson 47 Apply Resource Protection/ |
|
|
0.6 KB |
|
2.7 MB |
|
17.8 KB |
|
42.9 MB |
|
18.2 KB |
|
45.0 MB |
|
20.8 KB |
|
42.6 MB |
/.../Lesson 48 Conduct Incident Management/ |
|
|
0.5 KB |
|
2.1 MB |
|
17.7 KB |
|
41.6 MB |
|
19.2 KB |
|
46.0 MB |
/.../Lesson 49 Operate and Maintain Detective and Preventative Measures/ |
|
|
0.6 KB |
|
3.3 MB |
|
12.2 KB |
|
28.6 MB |
|
19.0 KB |
|
49.0 MB |
|
13.4 KB |
|
34.0 MB |
|
14.4 KB |
|
32.4 MB |
/.../Lesson 50 Implement and Support Patch and Vulnerability Management/ |
|
|
0.4 KB |
|
2.0 MB |
|
21.8 KB |
|
46.4 MB |
/.../Lesson 51 Understand and Participate in Change Management Process/ |
|
|
0.5 KB |
|
2.3 MB |
|
14.4 KB |
|
32.0 MB |
|
24.7 KB |
|
50.4 MB |
/.../Lesson 52 Implement Recovery Strategies/ |
|
|
0.5 KB |
|
2.0 MB |
|
18.7 KB |
|
41.6 MB |
|
24.1 KB |
|
52.0 MB |
/.../Lesson 53 Implement Disaster Recovery Processes/ |
|
|
0.4 KB |
|
1.8 MB |
|
18.2 KB |
|
41.5 MB |
/.../Lesson 54 Test Disaster Recovery Plans/ |
|
|
0.4 KB |
|
1.9 MB |
|
20.2 KB |
|
47.2 MB |
/.../Lesson 55 Participate in Business Continuity (BC) Planning and Exercises/ |
|
|
0.4 KB |
|
2.1 MB |
|
16.4 KB |
|
42.3 MB |
/.../Lesson 56 Implement and Manage Physical Security/ |
|
|
0.4 KB |
|
2.0 MB |
|
20.7 KB |
|
51.2 MB |
/.../Lesson 57 Address Personnel Safety and Security Concerns/ |
|
|
0.6 KB |
|
2.7 MB |
|
17.0 KB |
|
41.6 MB |
|
22.2 KB |
|
42.1 MB |
/Module 8 Software Development Security/ |
|
|
2.0 KB |
|
7.8 MB |
/.../Lesson 58 Understand and Integrate Security in the Software Development Lifecycle/ |
|
|
0.6 KB |
|
2.5 MB |
|
19.3 KB |
|
47.4 MB |
|
13.7 KB |
|
31.3 MB |
/.../Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/ |
|
|
0.7 KB |
|
3.0 MB |
|
15.6 KB |
|
38.2 MB |
|
26.4 KB |
|
63.0 MB |
|
18.5 KB |
|
33.9 MB |
/.../Lesson 60 Assess the Effectiveness of Software Security/ |
|
|
0.4 KB |
|
1.9 MB |
|
13.7 KB |
|
31.2 MB |
/.../Lesson 61 Assess the Security Impact of Acquired Software/ |
|
|
0.4 KB |
|
2.0 MB |
|
18.1 KB |
|
38.9 MB |
/.../Lesson 62 Define and Apply Secure Coding Guidelines and Standards/ |
|
|
0.8 KB |
|
3.7 MB |
|
14.6 KB |
|
35.4 MB |
|
26.0 KB |
|
60.0 MB |
|
16.4 KB |
|
37.9 MB |
|
20.6 KB |
|
41.7 MB |
/Module 9 Attaining and Maintaining Your CISSP/ |
|
|
0.5 KB |
|
2.5 MB |
/.../Lesson 63 Preparing for Your Examination/ |
|
|
0.5 KB |
|
2.4 MB |
|
9.6 KB |
|
27.1 MB |
|
13.2 KB |
|
32.6 MB |
|
12.0 KB |
|
30.4 MB |
/.../Lesson 64 The Certification Process/ |
|
|
0.5 KB |
|
2.3 MB |
|
9.5 KB |
|
24.5 MB |
|
7.3 KB |
|
20.0 MB |
/Summary/ |
|
|
1.3 KB |
|
7.0 MB |
Total files 452 |
Copyright © 2025 FileMood.com