FileMood

Download CISSP® - Security Operations

CISSP Security Operations

Name

CISSP® - Security Operations

 DOWNLOAD Copy Link

Total Size

284.8 MB

Total Files

60

Hash

7ED8695E4FC12FD145F56C8465EB81487C19B563

/1. Course Overview/

01. Course Overview.mp4

3.6 MB

/10. Evidence Handling/

31. Introduction.mp4

1.1 MB

32. Rules of Evidence.mp4

4.0 MB

33. Conclusion.mp4

760.9 KB

/11. Resource Provisioning/

34. Introduction.mp4

1.2 MB

35. Provisioning Assets.mp4

9.0 MB

36. Conclusion.mp4

1.3 MB

/12. Recovery Strategies/

37. Introduction.mp4

1.3 MB

38. Recovery Strategies.mp4

9.5 MB

39. Conclusion.mp4

741.8 KB

/13. Personnel Privacy and Safety/

40. Introduction.mp4

756.2 KB

41. Privacy.mp4

6.7 MB

42. Safety Matters.mp4

12.8 MB

43. Conclusion.mp4

1.5 MB

/14. Business Continuity and Disaster Recovery/

44. Introduction.mp4

1.4 MB

45. Disaster Recovery and Business Continuity.mp4

9.7 MB

46. Conclusion.mp4

1.6 MB

/15. Internal Physical Security/

47. Introduction.mp4

1.1 MB

48. Alarms, Access Cards, Biometrics, and Locks.mp4

17.0 MB

49. Key Controls.mp4

2.8 MB

50. Mantraps, Safes, Vaults, and Turnstiles.mp4

5.3 MB

51. Conclusion.mp4

711.1 KB

/16. Securing Assets/

52. Introduction.mp4

932.3 KB

53. Protecting Security Equipment.mp4

8.1 MB

54. Conclusion.mp4

895.1 KB

/17. External Physical Security/

55. Introduction.mp4

1.4 MB

56. Barriers.mp4

19.7 MB

57. Lighting.mp4

9.6 MB

58. Closed Circuit Television.mp4

3.0 MB

59. Conclusion.mp4

850.7 KB

/2. Introduction to Security Operations/

02. Introduction.mp4

3.0 MB

03. Security Operations Foundations.mp4

4.9 MB

04. Conclusion.mp4

849.3 KB

/3. Digital Forensics/

05. Introduction to Digital Forensics.mp4

2.3 MB

06. Digital Forensics Foundations.mp4

10.1 MB

07. Creating a Digital Forensics Capability.mp4

13.7 MB

08. Conclusion.mp4

1.4 MB

/4. Logging and Monitoring/

09. Introduction.mp4

889.6 KB

10. Logging and Monitoring Basics.mp4

7.2 MB

11. Log Management.mp4

9.6 MB

12. Logging and Monitoring Concerns.mp4

10.0 MB

13. Conclusion.mp4

733.6 KB

/5. Vulnerability Management/

14. Introduction.mp4

950.0 KB

15. Vulnerability Assessment.mp4

9.8 MB

16. Patch Management.mp4

7.4 MB

17. Conclusion.mp4

881.4 KB

/6. Change Management/

18. Introduction.mp4

945.8 KB

19. Change Control Process.mp4

12.5 MB

20. Conclusion.mp4

901.1 KB

/7. Operate and Maintain Protective Controls/

21. Introduction.mp4

1.2 MB

22. Maintaining and Operating Protective Controls.mp4

15.0 MB

23. Important Terms and Conclusion.mp4

3.2 MB

/8. Incident Management/

24. Introduction.mp4

832.0 KB

25. Creating an Incident Response Capability.mp4

4.9 MB

26. Incident Response Life Cycle.mp4

5.6 MB

27. Conclusion.mp4

588.1 KB

/9. Investigative Types/

28. Introduction.mp4

1.1 MB

29. Investigative Types.mp4

5.1 MB

30. Conclusion.mp4

1.2 MB

/

cissp-security-operations.zip

9.4 MB

 

Total files 60


Copyright © 2024 FileMood.com