FileMood

Download UD72

UD72

Name

UD72

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

4.4 GB

Total Files

153

Hash

2B6ABB7CDC69AA4C65DDD1E6EF564934B14ECB3D

/01 Introduction/

001 Introduction.mp4

21.8 MB

/02 Security and Risk Management/

002 Security and Risk Management.mp4.part

1.2 MB

003 Importance of Information Security and Risk Management.mp4

11.2 MB

004 Information Security.mp4

13.0 MB

005 IT Security and Organizational Goals Mission and Objectives.mp4

17.6 MB

006 Organizational Processes.mp4

56.9 MB

007 Security Policies.mp4

29.7 MB

008 Policy Chart.mp4

18.6 MB

009 Compliance.mp4

28.3 MB

010 Computer Crimes.mp4

36.4 MB

011 Major Legal Systems.mp4

25.1 MB

012 Introduction to Intellectual Property (IP) Law.mp4

33.7 MB

013 Import or Export Controls and Trans-Border Data Flow.mp4

17.1 MB

014 U.S. Privacy Laws.mp4

36.0 MB

015 General Data Protection Regulation (GDPR).mp4

35.5 MB

016 Security.mp4

18.3 MB

017 Risk Analysis.mp4

28.5 MB

018 Risk Analysis Types.mp4

33.1 MB

019 Countermeasure SelectionProblem.mp4

53.4 MB

020 Importance of Business Continuity Planning.mp4

34.4 MB

021 Business Impact Analysis.mp4

13.4 MB

022 Maximum Tolerable Downtime (MTD).mp4

13.3 MB

023 Failure and Recovery Metrics.mp4

37.2 MB

024 Importance of Managing Personnel Security.mp4

4.8 MB

025 Vendor Contractors and Consultant Controls.mp4

13.3 MB

026 Importance of Security Awareness Training.mp4

32.9 MB

027 Best Practices.mp4

38.3 MB

028 Conclusion.mp4

6.6 MB

/03 Asset Security/

029 Asset Security.mp4

8.4 MB

030 Information Classification.mp4

28.9 MB

031 Data Lifecycle.mp4

32.1 MB

032 Data Management.mp4

25.5 MB

033 Data Custodians.mp4

11.8 MB

034 Data Quality.mp4

5.6 MB

035 Data Documentation.mp4

16.6 MB

036 Data Access Sharing and Dissemination.mp4

16.8 MB

037 Media Resource Protection.mp4

22.9 MB

038 Data Remanence.mp4

21.5 MB

039 Software Licensing.mp4

26.3 MB

040 Data Security Controls.mp4

16.7 MB

041 Scoping and Tailoring.mp4

12.7 MB

042 Standards Selection.mp4

25.7 MB

043 Conclusion.mp4

7.8 MB

/04 Security Architecture and Engineering/

044 Security Engineering.mp4

10.7 MB

045 Architecture Framework.mp4

135.5 MB

046 Security Standards.mp4

22.8 MB

047 Security Models.mp4

83.2 MB

048 Evaluation Criteria.mp4

42.5 MB

049 Security Standard.mp4

41.6 MB

050 System Security Architecture.mp4

9.6 MB

051 System Components.mp4

44.6 MB

052 Distributed Systems.mp4

32.4 MB

053 Security Threats and Countermeasures.mp4

30.4 MB

054 Internet of Things (IoT).mp4

24.0 MB

055 Industrial Control System (ICS).mp4

37.8 MB

056 Best Practices.mp4

26.7 MB

057 Cryptography.mp4

77.9 MB

058 Symmetric Cryptography.mp4

42.1 MB

059 Data Encryption Standard (DES).mp4

66.0 MB

060 Advanced Encryption Standard (AES).mp4

57.7 MB

061 Asymmetric Cryptography.mp4

48.7 MB

062 Symmetric vs. Asymmetric Cryptography.mp4

13.5 MB

063 Public Key Infrastructure.mp4

40.6 MB

064 Hash function.mp4

72.1 MB

065 Physical and Environmental Security.mp4

32.3 MB

066 Design Criteria.mp4

73.3 MB

067 Operational Areas.mp4

10.8 MB

068 Environmental Controls.mp4

56.6 MB

069 Conclusion.mp4

2.6 MB

/05 Communications and Network Security/

070 Communications and Network Security.mp4

9.3 MB

071 Open Systems Interconnection.mp4

11.1 MB

072 OSI Layers.mp4

47.2 MB

073 Protocol Models.mp4

46.8 MB

074 IP Addressing.mp4

17.6 MB

075 Domain Routing.mp4

19.0 MB

076 Types of Network Protocols.mp4

24.1 MB

077 LAN Network Technologies.mp4

22.6 MB

078 Network Topologies.mp4

35.7 MB

079 List of Networking Devices.mp4

38.2 MB

080 Networks.mp4

37.9 MB

081 WAN Technologies.mp4

44.6 MB

082 Remote Access Technolgy.mp4

36.2 MB

083 IPsec Security Protocols.mp4

31.1 MB

084 Remote Access Security Methods.mp4

13.4 MB

085 Bluetooth.mp4

54.8 MB

086 Network Attacks.mp4

60.1 MB

087 Conclusion.mp4

1.9 MB

/06 Identity and Access Management (IAM)/

088 Identity and Access Management.mp4

24.6 MB

089 User Identification.mp4

33.1 MB

090 Cards and Smart Cards.mp4

46.0 MB

091 Kerberos.mp4

36.7 MB

092 Access Control.mp4

30.1 MB

093 Attribute-Based Access Control (ABAC).mp4

11.1 MB

094 Access Control Concepts.mp4

36.0 MB

095 Credential Management Systems.mp4

3.0 MB

096 Identity Management.mp4

53.0 MB

097 Unauthorized Disclosure of Information.mp4

36.9 MB

098 Threats to Access Control.mp4

27.4 MB

099 Conclusion.mp4

3.6 MB

/07 Security Assessment and Testing/

100 Security Assessment and Testing.mp4

2.4 MB

101 Assessment and Test Strategies.mp4

8.9 MB

102 Log Management.mp4

20.3 MB

103 Synthetic Transactions.mp4

4.8 MB

104 Testing Techniques.mp4

23.5 MB

105 Information Security Continuous Monitoring.mp4

84.1 MB

106 Service Organization Controls.mp4

19.3 MB

107 Audit Preparation.mp4

11.3 MB

108 Conclusion.mp4

6.0 MB

/08 Security Operations/

109 Security Operations.mp4

744.1 KB

110 Investigations.mp4

23.6 MB

111 Forensic Investigation Guidelines.mp4

5.8 MB

112 Incident Response.mp4

18.4 MB

113 Evidence.mp4

23.9 MB

114 Computer Forensics Procedure.mp4

1.7 MB

115 Requirements for Investigation Types.mp4

34.7 MB

116 Data Leakor Loss Prevention DLP.mp4

9.9 MB

117 Introduction to Security Operations.mp4

5.3 MB

118 Effects of Operations Controls on C.I.A.mp4

8.2 MB

119 Threats to Operations.mp4

76.0 MB

120 Types of Accounts.mp4

14.2 MB

121 Protecting.mp4

78.3 MB

122 Cloud and Virtual Storage.mp4

13.9 MB

123 Incident ManagementDetection Phase.mp4

23.4 MB

124 Monitoring.mp4

14.3 MB

125 Operating and Maintaining Preventive Measures.mp4

50.3 MB

126 Recovery Strategy.mp4

38.9 MB

127 Backup Sites.mp4

45.5 MB

128 Importance of Maintaining Resilient Systems.mp4

31.1 MB

129 Disaster Recovery.mp4

11.4 MB

130 Importance of Testing.mp4

17.8 MB

131 Disaster Recovery PhasesMaintenance.mp4

66.1 MB

132 Importance of Lighting.mp4

15.3 MB

133 Access Control.mp4

73.2 MB

134 Building and Inside Security.mp4

2.8 MB

135 Conclusion.mp4

3.2 MB

/09 Software Development Security/

136 Software Development Security.mp4

2.7 MB

137 Environments.mp4

4.6 MB

138 Distributed Data Processing and Agents.mp4

40.3 MB

139 Threats in the Software Environment.mp4

44.3 MB

140 System Life Cycle and Systems Development.mp4

70.9 MB

141 Software Development Methods.mp4

15.3 MB

142 Object-Oriented Programming Terms.mp4

10.3 MB

143 Object Request Brokers.mp4

15.0 MB

144 Software Security and Assurance.mp4

84.8 MB

145 Audit and Assurance Mechanisms.mp4

4.9 MB

146 Assessing the Effectiveness of Software Security.mp4

26.4 MB

147 Database.mp4

19.6 MB

148 Data Warehousing.mp4

31.3 MB

149 Malwares.mp4

27.7 MB

150 Importance and Role of Knowledge Management.mp4

9.3 MB

151 Web Application Environment.mp4

26.4 MB

152 OWASP Secure Coding Practices.mp4

33.0 MB

153 Conclusion.mp4

6.2 MB

 

Total files 153


Copyright © 2025 FileMood.com