FileMood

Download [ DevCourseWeb.com ] CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification Training

DevCourseWeb com CBTNuggets ISC CC Certified in Cybersecurity ISC Certification Training

Name

[ DevCourseWeb.com ] CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification Training

 DOWNLOAD Copy Link

Total Size

2.1 GB

Total Files

68

Last Seen

2024-07-23 00:16

Hash

A864CD8AE437567F4EA8A4129FABFC3BA3310DF8

/

Get Bonus Downloads Here.url

0.2 KB

/.../1. Understanding Information Assurance/

1. Understanding Information Assurance - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

69.9 MB

2. Methods of Authentication - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

40.0 MB

3. Multi-Factor Authentication (MFA) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

25.0 MB

4. Biometrics Factors - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

19.6 MB

5. Data Privacy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4

32.6 MB

/.../10. Exploring On-Premise Network Infrastructure/

1. Power - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

65.3 MB

2. Data Centers and Closets - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

40.4 MB

3. Heating, Ventilation and Air Conditioning (HVAC) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

48.1 MB

4. Dealing with Fire - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

27.2 MB

5. Redundancy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

38.2 MB

6. Working with 3rd Parties - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

14.7 MB

/.../2. Discussing Risk Management, Controls, Ethics and Governance/

1. Risk Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

31.9 MB

2. Risk Treatment - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

20.5 MB

3. Security Controls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

35.2 MB

4. Security Control Categories - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4

39.3 MB

5. ISC2 Code of Ethics - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

19.7 MB

6. Policies and Procedures - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

28.7 MB

7. Standards, Regulations and Laws - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

22.5 MB

/.../3. Exploring BC, DR & IR Concepts/

1. Intro - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

34.9 MB

2. Business Continuity - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

13.5 MB

3. Business Continuity Planning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

36.4 MB

4. Disaster Recovery - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

17.1 MB

5. Disaster Recovery Planning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

27.6 MB

6. Incident Response - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

37.9 MB

7. After Action and Training - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

22.3 MB

/.../4. Reviewing Access Control Concepts/

1. Physical Security Controls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

20.5 MB

2. Monitoring Controls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

33.3 MB

3. Authorized Personnel vs Unauthorized Personnel - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

19.2 MB

4. Principle of Least Privilege - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

26.5 MB

5. Segregation of Duties - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4

22.9 MB

6. Types of Access Control - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

36.8 MB

7. Data and Media Access Control - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

36.6 MB

/.../5. Exploring Security Policies and Training/

1. Data Handling Policy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

22.4 MB

2. Password Policy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

18.2 MB

3. Acceptable Use Policy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

19.9 MB

4. Bring Your Own Device (BYOD) Policy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

23.1 MB

5. Change Management Policy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

23.2 MB

6. Privacy Policy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

31.7 MB

7. Security Awareness Training - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

52.0 MB

/.../6. Understanding Data Security and System Hardening/

1. Encryption Basics - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

17.4 MB

2. Types of Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

46.4 MB

3. Data Hashing with Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

38.3 MB

4. Digital Signatures with Hashing - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

29.7 MB

5. Data Handling - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

36.1 MB

6. Data Logging - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

28.1 MB

7. Configuration Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

41.6 MB

/.../7. Discussing Network Security Infrastructure/

1. Network Segmentation - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4

58.2 MB

2. Embedded System Security - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

26.9 MB

3. Virtual Private Networks (VPNs) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

19.1 MB

4. Defense In Depth and Zero Trust - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4

30.5 MB

5. Network Access Control (NAC) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

21.2 MB

6. SLAs and MSPs - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

31.3 MB

7. The Cloud - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

45.7 MB

/.../8. Exploring Network Threats and Attacks/

1. Types of Threats - DoS, DDoS and Malware - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

33.2 MB

2. Types of Threats - Main-in-the-middle and Side Channel - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

18.4 MB

3. Intrusion Detection Prevention Systems (IDSIPS) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

54.0 MB

4. Endpoint Protection and Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

31.1 MB

5. Vulnerability Scanning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

45.5 MB

6. Firewalls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

54.7 MB

/.../9. Understanding Computer Networking/

1. Computer Networking Basics - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

36.6 MB

2. OSI Model - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

24.9 MB

3. TCPIP Model - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

42.9 MB

4. IP Addresses - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

47.5 MB

5. Wireless Networking - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

4.6 MB

6. Networking Ports - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

36.5 MB

7. Common Applications - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4

29.4 MB

/~Get Your Files Here !/

Bonus Resources.txt

0.4 KB

 

Total files 68


Copyright © 2024 FileMood.com