FileMood

Download Pluralsight - CISSP Security Assessment and Testing

Pluralsight CISSP Security Assessment and Testing

Name

Pluralsight - CISSP Security Assessment and Testing

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

194.5 MB

Total Files

65

Hash

B0BD6513FD53E2001BD6D730068D09E51CDC3F8B

/

03 - Assessment and Testing Strategies - Ensuring Objectives Have Been Met.mp4

11.9 MB

26 - Security Control Effectiveness Testing - Enumeration.mp4

11.2 MB

28 - Security Control Effectiveness Testing - Security Assessment Techniques.mp4

9.6 MB

01 - Course Overview - Course Overview.mp4

9.5 MB

11 - Security Control Effectiveness Testing - Vulnerability Assessment.mp4

9.3 MB

05 - Assessment and Testing Strategies - Security Assessment Foundations.mp4

9.1 MB

08 - Assessment and Testing Strategies - Assessment Types.mp4

6.9 MB

21 - Security Control Effectiveness Testing - Destructing and Non-destructive Testing.mp4

6.8 MB

46 - Test Result Analysis - Penetration Testing Report Anatomy.mp4

6.4 MB

02 - Assessment and Testing Strategies - Course Introduction.mp4

6.2 MB

04 - Assessment and Testing Strategies - Resource Constraints.mp4

5.0 MB

17 - Security Control Effectiveness Testing - Intro to Penetration Testing.mp4

4.9 MB

29 - Security Control Effectiveness Testing - Source Code Review.mp4

4.3 MB

27 - Security Control Effectiveness Testing - Identification.mp4

4.3 MB

25 - Security Control Effectiveness Testing - Scoping the Test.mp4

3.8 MB

13 - Security Control Effectiveness Testing - Identification.mp4

3.3 MB

20 - Security Control Effectiveness Testing - Selecting Target Surface.mp4

3.1 MB

07 - Assessment and Testing Strategies - Assessment Viewpoints.mp4

3.0 MB

33 - Security Process Data Collection - Management Review.mp4

2.9 MB

06 - Assessment and Testing Strategies - Security Assessment Program.mp4

2.8 MB

35 - Security Process Data Collection - Account Management.mp4

2.6 MB

42 - Test Result Analysis - Targeted Reporting.mp4

2.5 MB

12 - Security Control Effectiveness Testing - Detection.mp4

2.5 MB

34 - Security Process Data Collection - Training and Awareness.mp4

2.5 MB

14 - Security Control Effectiveness Testing - Analysis.mp4

2.4 MB

19 - Security Control Effectiveness Testing - Test Process Walkthrough.mp4

2.3 MB

10 - Security Control Effectiveness Testing - Introduction.mp4

2.3 MB

22 - Security Control Effectiveness Testing - Penetration Testing Frameworks.mp4

2.1 MB

16 - Security Control Effectiveness Testing - Mitigation.mp4

2.0 MB

18 - Security Control Effectiveness Testing - Penetration Testing.mp4

2.0 MB

cissp-security-assessment-testing.zip

2.0 MB

45 - Test Result Analysis - Reporting Challenges.mp4

2.0 MB

39 - Test Result Analysis - Introduction.mp4

2.0 MB

48 - Third-party Assessment - Introduction.mp4

2.0 MB

58 - Information Security Continuous Monitoring - Defining Your ISCM Program Strategy.mp4

1.9 MB

31 - Security Process Data Collection - Introduction.mp4

1.9 MB

32 - Security Process Data Collection - Key Performance Risk Indicators.mp4

1.8 MB

49 - Third-party Assessment - Third-party Vendors.mp4

1.8 MB

55 - Information Security Continuous Monitoring - Introduction.mp4

1.7 MB

36 - Security Process Data Collection - Disaster Recovery and Business Continuity.mp4

1.7 MB

53 - Third-party Assessment - Audit Stages.mp4

1.5 MB

62 - Information Security Continuous Monitoring - Respond to ISCM Findings.mp4

1.5 MB

41 - Test Result Analysis - Vulnerability Assessment Dashboards.mp4

1.4 MB

64 - Information Security Continuous Monitoring - Summary.mp4

1.4 MB

59 - Information Security Continuous Monitoring - Establishing Your ISCM Program Strategy.mp4

1.4 MB

60 - Information Security Continuous Monitoring - Implementing Your ISCM Program Strategy.mp4

1.4 MB

38 - Security Process Data Collection - Summary.mp4

1.3 MB

50 - Third-party Assessment - Evaluating Guidelines.mp4

1.3 MB

52 - Third-party Assessment - SSAE16.mp4

1.3 MB

23 - Security Control Effectiveness Testing - CISSP Exam Tip.mp4

1.3 MB

61 - Information Security Continuous Monitoring - Analyzing Your ISCM Program Strategy.mp4

1.3 MB

30 - Security Control Effectiveness Testing - Summary.mp4

1.2 MB

47 - Test Result Analysis - Summary.mp4

1.2 MB

09 - Assessment and Testing Strategies - Summary.mp4

1.2 MB

37 - Security Process Data Collection - Backup Data Verification.mp4

1.1 MB

63 - Information Security Continuous Monitoring - Review Your ISCM Program Strategy.mp4

1.1 MB

56 - Information Security Continuous Monitoring - What Is ISCM.mp4

996.3 KB

51 - Third-party Assessment - Audit Reports.mp4

968.9 KB

54 - Third-party Assessment - Summary.mp4

959.8 KB

43 - Test Result Analysis - Data Analysis.mp4

943.3 KB

24 - Security Control Effectiveness Testing - Penetration Testing Process.mp4

938.7 KB

15 - Security Control Effectiveness Testing - Reporting.mp4

878.9 KB

57 - Information Security Continuous Monitoring - ISCM Strategy.mp4

817.2 KB

40 - Test Result Analysis - Vulnerability Assessment.mp4

429.2 KB

44 - Test Result Analysis - Penetration Testing Reports.mp4

402.7 KB

 

Total files 65


Copyright © 2025 FileMood.com