FileMood

Download ITPT141

ITPT141

Name

ITPT141

 DOWNLOAD Copy Link

Total Size

83.4 GB

Total Files

160

Hash

51A157BB4D48799EDAC10E26960936FD0BD5914C

/

0 - Overview.mp4

152.0 MB

1.11 - Confidentiality, Integrity, Availability (CIA).mp4

595.6 MB

1.12 - Confidentiality, Integrity, Availability (CIA) Pt2.mp4

386.2 MB

1.21 - Evaluate, Apply Security Governance Principles.mp4

413.6 MB

1.22 - Evaluate, Apply Security Goverance Principles Pt2.mp4

1.2 GB

1.31 - Determine Compliance Requirements.mp4

453.8 MB

1.32 - Determine Compliance Requirements Part 2.mp4

913.7 MB

1.33 - Determine Compliance Requirements Part 3.mp4

415.1 MB

1.41 - Understand Legal and Regulatory Issues.mp4

529.6 MB

1.42 - Understand Legal and Regulatory Issues Part 2.mp4

514.9 MB

1.51 - Understand, adhere to and promote ethics.mp4

135.1 MB

1.61 - Policy, Standards, Procedures and Guidelines.mp4

233.7 MB

1.71 - Understand Business Continuity Requirements.mp4

848.8 MB

1.72 - Understand Business Continuity Requirements Part 2.mp4

779.2 MB

1.73 - Understand Business Continuity Requirements Part 3.mp4

630.1 MB

1.81 - Personnel, Security Policies and Procedures.mp4

685.4 MB

1.911 - Understand_Apply Risk Management Concepts.mp4

591.0 MB

1.912 - Understand_Apply Risk Management Concepts Part 2.mp4

601.6 MB

1.913 - Understand_Apply Risk Management Concepts Part 3.mp4

446.7 MB

1.914 - Understand_Apply Risk Management Concepts Part 4.mp4

471.7 MB

1.915 - Understand_Apply Risk Management Concepts Part 5.mp4

475.4 MB

1.921 - Understanding_Apply Threat Modeling Concepts.mp4

665.9 MB

1.931 - Apply Risk Management to the Supply Chain.mp4

497.0 MB

1.941 - Security Awareness_Education and Training.mp4

217.1 MB

1.951 - Security and Risk Management - Key Points.mp4

341.5 MB

1.961 - CIA Deep Dive.mp4

845.1 MB

1.971 - Organizational Roles and Responsibilities.mp4

379.1 MB

1.981 - Risk Terminology and Concepts.mp4

507.8 MB

2.11 - Identify and Classify Information and Assets.mp4

521.7 MB

2.21 - Determine and Maintain Information_Asset Ownership.mp4

341.9 MB

2.31 - Protect Privacy.mp4

731.3 MB

2.32 - Protect Privacy Part 2.mp4

785.3 MB

2.41 - Ensure Appropriate Asset Retention.mp4

329.4 MB

2.51 - Determine Data Security Controls.mp4

611.1 MB

2.52 - Determine Data Security Controls Part 2.mp4

611.5 MB

2.53 - Determine Data Security Controls Part 3.mp4

583.6 MB

2.61 - Establish Asset Handling Requirements.mp4

632.5 MB

2.71 - Asset Security - Key Points.mp4

184.7 MB

3.11 - Implement and Manage Engineering Processes.mp4

778.9 MB

3.21 - Fundamental Concepts of Systems and Security.mp4

688.2 MB

3.22 - Fundamental Concepts of Systems and Security Pt.2.mp4

496.2 MB

3.23 - Fundamental Concepts of Systems and Security Pt.3.mp4

552.4 MB

3.24 - Fundamental Concepts of Systems and Security Pt.4.mp4

478.3 MB

3.25 - Fundamental Concepts of Systems and Security Pt.5.mp4

490.5 MB

3.31 - Controls Based on Security Requirements.mp4

383.0 MB

3.32 - Controls Based on Security Requirements Part 2.mp4

308.2 MB

3.41 - Vulnerabilities of Security Architecture.mp4

797.0 MB

3.42 - Vulnerabilities of Security Architecture Part 2.mp4

587.4 MB

3.43 - Vulnerabilities of Security Architecture Part 3.mp4

658.2 MB

3.44 - Vulnerabilities of Security Architectures Part 4.mp4

455.2 MB

3.51 - Vulnerabilities in Web-Based Systems.mp4

426.1 MB

3.52 - Vulnerabilities in Web-Based Systems Part 2.mp4

397.4 MB

3.61 - Vulnerabilities in Mobile Systems.mp4

322.6 MB

3.71 - Vulnerabilities in Embedded Devices.mp4

270.5 MB

3.81 - Apply Cryptography.mp4

464.2 MB

3.82 - Apply Cryptography Part 2.mp4

593.7 MB

3.83 - Apply Cryptography Part 3.mp4

531.9 MB

3.84 - Apply Cryptography Part 4.mp4

399.3 MB

3.85 - Apply Cryptography Part 5.mp4

477.5 MB

3.86 - Apply Cryptography Part 6.mp4

450.2 MB

3.87 - Apply Cryptography Part 7.mp4

304.7 MB

3.88 - Apply Cryptography Part 8.mp4

568.1 MB

3.891 - Apply Cryptography Part 9.mp4

479.6 MB

3.892 - Apply Cryptography Part 10.mp4

502.1 MB

3.893 - Apply Cryptography Part 11.mp4

548.9 MB

3.894 - Apply Cryptography Part 12.mp4

538.3 MB

3.895 - Apply Cryptography Part 13.mp4

552.6 MB

3.91 - Site_Facility Design and Security.mp4

700.3 MB

3.912 - Site_Facility Design and Security Part 2.mp4

696.3 MB

3.913 - Site_Facility Design and Security Part 3.mp4

497.7 MB

3.914 - Site_Facility Design and Security Part 4.mp4

543.2 MB

3.921 - Security Architecture and Engineering - Key Points.mp4

263.0 MB

4.11 - Secure Design Principles in Networks.mp4

683.2 MB

4.12 - Secure Design Principles in Networks Part 2.mp4

826.1 MB

4.13 - Secure Design Principles in Networks Part 3.mp4

901.2 MB

4.14 - Secure Design Principles in Networks Part 4.mp4

679.5 MB

4.15 - Secure Design Principles in Networks Part 5.mp4

814.5 MB

4.16 - Secure Design Principles in Networks Part 6.mp4

423.0 MB

4.17 - Secure Design Principles in Networks Part 7.mp4

604.5 MB

4.18 - Secure Design Principles in Networks Part 8.mp4

699.5 MB

4.19 - Secure Design Principles in Networks Part 9.mp4

517.6 MB

4.192 - Secure Design Principles in Networks Part 10.mp4

696.6 MB

4.193 - Secure Design Principles in Networks Part 11.mp4

428.0 MB

4.194 - Secure Design Principles in Networks Part 12.mp4

521.6 MB

4.21 - Secure Network Components.mp4

721.3 MB

4.22 - Secure Network Components Part 2.mp4

791.0 MB

4.23 - Secure Network Components Part 3.mp4

671.0 MB

4.24 - Secure Network Components Part 4.mp4

634.3 MB

4.25 - Secure Network Components Part 5.mp4

474.6 MB

4.31 - Implement Secure Communication Channels.mp4

519.4 MB

4.32 - Implement Secure Communication Channels Part 2.mp4

443.5 MB

4.33 - Implement Secure Communication Channels Part 3.mp4

559.8 MB

4.34 - Implement Secure Communication Channels Part 4.mp4

503.7 MB

4.35 - Implement Secure Communication Channels Part 5.mp4

411.2 MB

4.36 - Implement Secure Communication Channels Part 6.mp4

387.7 MB

4.41 - Communication and Network Security - Key Points.mp4

195.9 MB

5.11 - Control Physical and Logical Access to Assets.mp4

476.4 MB

5.12 - Control Physical and Logical Access to Assets Pt 2.mp4

560.5 MB

5.21 - Manage Identification and Authentication.mp4

547.4 MB

5.22 - Manage Identification and Authentication Part 2.mp4

702.9 MB

5.23 - Manage Identification and Authentication Part 3.mp4

236.5 MB

5.31 - Integrate Identity as a Third-Party Service.mp4

752.5 MB

5.41 - Implement_Manage Authorization Mechanisms.mp4

526.4 MB

5.42 - Implement_Manage Authorization Mechanisms Pt.2.mp4

596.0 MB

5.51 - Manage Identity and Access Provisioning Lifecycle.mp4

409.4 MB

5.61 - Access Control Attacks.mp4

535.5 MB

5.62 - Access Control Attacks Part 2.mp4

314.8 MB

5.71 - Identity and Access Management - Key Points.mp4

316.4 MB

6.11 - Assessment, Test and Audit.mp4

443.7 MB

6.12 - Assessment, Test and Audit Part 2.mp4

646.2 MB

6.21 - Conduct Security Control Testing.mp4

678.9 MB

6.22 - Conduct Security Control Testing Part 2.mp4

599.2 MB

6.23 - Conduct Security Control Testing Part 3.mp4

510.0 MB

6.31 - Collect Security Process Data.mp4

490.6 MB

6.41 - Security Assessment and Testing - Key Points.mp4

133.3 MB

7.11 - Understand and Support Investigations.mp4

546.8 MB

7.21 - Conduct Logging and Monitoring Activities.mp4

305.7 MB

7.31 - Provisioning and Protecting Resources.mp4

625.9 MB

7.32 - Provisioning and Protecting Resources Part 2.mp4

315.6 MB

7.41 - Apply Foundational Security Operation Concepts.mp4

246.4 MB

7.51 - Conduct Incident Management.mp4

344.4 MB

7.61 - Detective and Preventative Measures.mp4

563.6 MB

7.62 - Detective and Preventative Measures Part 2.mp4

809.6 MB

7.71 - Patch and Vulnerability Management.mp4

241.5 MB

7.81 - Understand Change Management.mp4

373.2 MB

7.91 - Implement Recovery Strategies.mp4

544.2 MB

7.912 - Implement Recovery Strategies Part 2.mp4

404.1 MB

7.913 - Implement Recovery Strategies Part 3.mp4

532.9 MB

7.914 - Implement Recovery Strategies Part 4.mp4

339.3 MB

7.915 - Implement Recovery Strategies Part 5.mp4

532.1 MB

7.921 - Implement and Test BCDR.mp4

748.4 MB

7.922 - Implement and Test BCDR Part 2.mp4

685.8 MB

7.923 - Implement and Test BCDR Part 3.mp4

203.0 MB

7.931 - Implement and Manage Physical Security.mp4

759.4 MB

7.932 - Implement and Manage Physical Security Part 2.mp4

669.8 MB

7.94 - Personnel Safety and Security Concerns.mp4

246.5 MB

7.95 - Security Operations - Key Points.mp4

332.9 MB

8.11 - Security in the SDLC.mp4

936.4 MB

8.12 - Security in the SDLC Part 2.mp4

458.0 MB

8.13 - Security in the SDLC Part 3.mp4

670.1 MB

8.14 - Security in the SDLC Part 4.mp4

704.3 MB

8.15 - Security in the SDLC Part 5.mp4

565.6 MB

8.16 - Security in the SDLC Part 6.mp4

155.6 MB

8.21 - Security Controls in Dev Environments.mp4

490.5 MB

8.22 - Security Controls in Dev Environments Part 2.mp4

769.9 MB

8.23 - Security Controls in Dev Environments Part 3.mp4

861.9 MB

8.24 - Security Controls in Dev Environments Part 4.mp4

643.4 MB

8.25 - Security Controls in Dev Environments Part 5.mp4

590.6 MB

8.26 - Security Controls in Dev Environments Part 6.mp4

540.6 MB

8.27 - Security Controls in Dev Environments Part 7.mp4

592.8 MB

8.28 - Security Controls in Dev Environments Part 8.mp4

665.9 MB

8.29 - Security Controls in Dev Environments Part 9.mp4

404.7 MB

8.31 - Assess Effectiveness of Software Security.mp4

581.3 MB

8.41 - Assess Security Impact of Acquired Software.mp4

229.3 MB

8.51 - Secure Coding Guidelines and Standards.mp4

485.2 MB

8.61 - Databases and Data Warehouses.mp4

595.4 MB

8.62 - Databases and Data Warehouses Part 2.mp4

447.4 MB

8.71 - Types of Storage.mp4

202.9 MB

8.81 - Knowledge-based Systems.mp4

276.1 MB

8.91 - Software Development Security - Key Points.mp4

201.1 MB

 

Total files 160


Copyright © 2024 FileMood.com