BT种子基本信息
- 种子哈希:4d9c26e9c596731c77bc619490118cf1b253027c
- 文档大小:6.9 GB
- 文档个数:173个文档
- 下载次数:484次
- 下载速度:极快
- 收录时间:2020-04-23
- 最近下载:2024-10-24
- DMCA/屏蔽:DMCA/屏蔽
文档列表
- Domain 1/16 - Risk analysis, attackers and attacks.mp4 125.6 MB
- Domain 4/23 - Secure communications.mp4 108.6 MB
- Domain 4/11 - IP support protocols.mp4 107.5 MB
- Domain 3/11 - Virtualization.mp4 101.4 MB
- Domain 8/08 - Software development methodologies part 1.mp4 98.6 MB
- Domain 3/06 - Security models and concepts.mp4 95.6 MB
- Domain 8/10 - Databases part 1.mp4 93.7 MB
- Domain 8/09 - Software development methodologies part 2.mp4 90.8 MB
- Domain 4/10 - IP addresses and port numbers part 2.mp4 90.2 MB
- Domain 7/12 - Incident Management.mp4 89.3 MB
- Domain 7/24 - BCP and DRP.mp4 89.0 MB
- Domain 4/07 - The OSI model.mp4 89.0 MB
- Domain 4/16 - WIFI.mp4 88.4 MB
- Domain 3/20 - Symmetric encryption.mp4 86.8 MB
- Domain 8/11 - Databases part 2.mp4 79.9 MB
- Domain 4/09 - IP addresses and port numbers part 1.mp4 76.7 MB
- Domain 5/14 - Authentication protocols.mp4 75.7 MB
- Domain 3/35 - The fire triangle and fire suppression.mp4 75.4 MB
- Domain 1/09 - Laws and regulations.mp4 73.8 MB
- Domain 8/07 - Programming concepts.mp4 73.6 MB
- Domain 3/29 - Physical security part 3.mp4 72.7 MB
- Domain 3/30 - Site selection.mp4 72.6 MB
- Domain 3/13 - System vulnerabilities, threats, and countermeasures.mp4 72.4 MB
- Domain 7/34 - Testing the plans.mp4 71.9 MB
- Domain 6/14 - Software testing.mp4 70.8 MB
- Domain 4/12 - Cable types.mp4 70.2 MB
- Domain 1/06 - The CIA Triad.mp4 69.7 MB
- Domain 4/20 - Firewalls.mp4 69.5 MB
- Domain 7/28 - Developing our BCP and DRP.mp4 65.1 MB
- Domain 8/13 - OWASP part 2.mp4 63.6 MB
- Domain 1/11 - US laws, European laws and international treaties.mp4 63.5 MB
- Domain 4/06 - Networking basics and definitions.mp4 62.7 MB
- Domain 4/22 - Network authentication protocols.mp4 61.1 MB
- Domain 3/27 - Physical security part 1.mp4 61.1 MB
- Domain 3/28 - Physical security part 2.mp4 61.0 MB
- Domain 3/09 - Hardware architecture.mp4 60.7 MB
- Domain 3/23 - Attacks on our cryptography.mp4 60.3 MB
- Domain 3/19 - The history of cryptography.mp4 60.0 MB
- Domain 5/07 - Type 1 authentication - 'Something you know' or 'Knowledge factors'.mp4 59.7 MB
- Domain 7/13 - Intrusion detection and prevention systems.mp4 59.5 MB
- Domain 3/33 - Fire suppression and hot and cold aisles.mp4 58.5 MB
- Domain 4/19 - Layer 3 routing protocols.mp4 57.8 MB
- Domain 8/12 - OWASP part 1.mp4 57.5 MB
- Domain 8/16 - Buying software from other companies.mp4 57.5 MB
- Domain 4/13 - LAN topologies.mp4 57.0 MB
- Domain 7/21 - Backups.mp4 57.0 MB
- Domain 5/10 - Authorization.mp4 54.9 MB
- Domain 2/07 - Sensitive information and media security.mp4 54.3 MB
- Domain 7/32 - Other BCP sub plans.mp4 54.2 MB
- Domain 7/33 - Employee redundancy.mp4 53.5 MB
- Domain 4/18 - Layer 1 to 3 networking devices.mp4 51.9 MB
- Domain 7/23 - Redundancy.mp4 50.5 MB
- Domain 3/21 - Asymmetric encryption.mp4 49.3 MB
- Domain 6/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp4 48.8 MB
- Domain 4/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp4 48.8 MB
- Domain 3/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp4 48.8 MB
- Domain 1/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp4 48.8 MB
- Domain 2/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp4 48.7 MB
- Domain 7/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp4 48.7 MB
- Domain 5/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp4 48.7 MB
- Domain 8/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp4 48.7 MB
- Domain 5/09 - Type 3 authentication - 'Something you are' or 'Biometrics'.mp4 47.0 MB
- Domain 3/18 - Introduction to Cryptography.mp4 46.9 MB
- Domain 6/11 - Penetration testing.mp4 46.7 MB
- Domain 3/31 - Media storage.mp4 46.4 MB
- Domain 7/31 - Disaster Recovery sites.mp4 45.0 MB
- Domain 1/08 - Governance, Management, standards, and frameworks.mp4 44.4 MB
- Domain 5/13 - Identity and access provisioning.mp4 44.0 MB
- Domain 1/13 - Ethics.mp4 44.0 MB
- Domain 4/14 - WAN protocols.mp4 43.8 MB
- Domain 7/07 - Administrative personnel controls.mp4 43.7 MB
- Domain 3/22 - Hashing.mp4 43.5 MB
- Domain 7/08 - Digital forensics.mp4 43.1 MB
- Domain 8/15 - Capability Maturity Model (CMM).mp4 43.1 MB
- Domain 4/15 - SAN and VoIP protocols.mp4 42.4 MB
- Domain 1/14 - Policies, procedures, guidelines, and frameworks.mp4 41.8 MB
- Domain 7/35 - After a disruption.mp4 41.6 MB
- Domain 5/08 - Type 2 authentication - 'Something you have' or 'Possession factors'.mp4 40.5 MB
- Domain 7/11 - Incident Management definitions.mp4 38.2 MB
- Domain 3/16 - Mobile device security.mp4 37.8 MB
- Domain 8/14 - Software vulnerabilities and Attacks.mp4 37.7 MB
- Domain 3/32 - Electricity.mp4 37.6 MB
- Domain 4/08 - The TCP-IP model.mp4 37.4 MB
- Domain 7/29 - BIA (Business Impact Analysis).mp4 37.3 MB
- Domain 3/14 - Web architecture and attacks.mp4 37.1 MB
- Domain 7/10 - Network and Software forensics.mp4 36.0 MB
- Domain 7/18 - Patch Management.mp4 35.4 MB
- Domain 7/25 - Warfare, terrorism, sabotage, and ransomware.mp4 35.2 MB
- Domain 2/10 - Data remanence and destruction.mp4 34.1 MB
- Domain 8/17 - Artificial intelligence (AI).mp4 34.0 MB
- Domain 6/12 - Social Engineering attacks.mp4 33.4 MB
- Domain 2/09 - Memory and data remanence.mp4 32.2 MB
- Domain 7/27 - DRP basics.mp4 32.1 MB
- Domain 1/07 - IAAA.mp4 31.2 MB
- Domain 7/19 - Change management.mp4 31.0 MB
- Domain 5/02 - Why should you want to get the CISSP certification.mp4 30.7 MB
- Domain 4/02 - Why should you want to get the CISSP certification.mp4 30.7 MB
- Domain 8/02 - Why should you want to get the CISSP certification.mp4 30.7 MB
- Domain 6/02 - Why should you want to get the CISSP certification.mp4 30.7 MB
- Domain 2/02 - Why should you want to get the CISSP certification.mp4 30.7 MB
- Domain 7/02 - Why should you want to get the CISSP certification.mp4 30.7 MB
- Domain 3/02 - Why should you want to get the CISSP certification.mp4 30.7 MB
- Domain 1/02 - Why should you want to get the CISSP certification.mp4 30.6 MB
- Domain 7/22 - RAID (Redundant Array of Independent Disks).mp4 30.3 MB
- Domain 1/10 - Intellectual property.mp4 30.0 MB
- Domain 7/20 - 0-day attacks.mp4 29.9 MB
- Domain 7/06 - Domain 7 key concepts.mp4 29.1 MB
- Domain 5/12 - Access control systems.mp4 28.3 MB
- Domain 3/25 - IPSec and PGP.mp4 28.2 MB
- Domain 3/24 - Digital signatures.mp4 28.1 MB
- Domain 6/09 - Security Audit Logs.mp4 28.0 MB
- Domain 4/21 - Modems.mp4 26.8 MB
- Domain 1/12 - GDPR (General Data Protection Regulation).mp4 26.6 MB
- Domain 6/13 - Penetration testing tools.mp4 25.9 MB
- Domain 3/08 - Secure system design concepts.mp4 25.8 MB
- Domain 5/06 - Introduction to Access Control.mp4 25.5 MB
- Domain 3/15 - Database security.mp4 25.2 MB
- Domain 3/34 - Personnel safety.mp4 23.2 MB
- Domain 3/17 - Industrial Control Systems.mp4 23.1 MB
- Domain 8/06 - Designing security into our software.mp4 23.1 MB
- Domain 4/17 - Bluetooth.mp4 22.3 MB
- Domain 6/08 - Security Audits.mp4 21.4 MB
- Domain 7/36 - What we covered in Domain 7.mp4 21.3 MB
- Domain 2/11 - Data security frameworks.mp4 20.4 MB
- Domain 3/07 - Security evaluation models.mp4 20.3 MB
- Domain 2/06 - Data classification and clearance.mp4 19.7 MB
- Domain 7/26 - Personnel.mp4 19.4 MB
- Domain 3/26 - MAC, HMAC, SSL, and TLS.mp4 19.1 MB
- Domain 2/08 - Mission, data, and system owners and data custodians.mp4 18.4 MB
- Domain 7/17 - Configuration Management.mp4 18.4 MB
- Domain 7/09 - Spinning disk forensics.mp4 17.9 MB
- Domain 7/16 - Honeynets and Honeypots.mp4 17.6 MB
- Domain 1/17 - What we covered in Domain 1.mp4 17.6 MB
- Domain 8/05 - Domain 8 - What we will be covering.mp4 17.0 MB
- Domain 1/05 - Domain 1 - What we will be covering.mp4 16.6 MB
- Domain 7/15 - Application white-listing.mp4 15.8 MB
- Domain 6/07 - Security Assessments.mp4 15.6 MB
- Domain 1/15 - Access control.mp4 15.3 MB
- Domain 7/30 - Supply and infrastructure redundancy.mp4 14.6 MB
- Domain 7/14 - SIEM (Security Information and Event Management).mp4 13.9 MB
- Domain 3/10 - Secure operating systems and software architecture.mp4 13.8 MB
- Domain 6/05 - Domain 6 - What we will be covering.mp4 12.7 MB
- Domain 3/05 - Domain 3 - What we will be covering.mp4 12.6 MB
- Domain 6/10 - Vulnerability scanners.mp4 12.5 MB
- Domain 3/12 - IOT (Internet Of Things).mp4 11.5 MB
- Domain 8/01 - Introduction.mp4 10.9 MB
- Domain 7/05 - Domain 7 - What we will be covering.mp4 9.8 MB
- Domain 4/04 - Links, important topics and where to focus on my slides.mp4 8.9 MB
- Domain 7/04 - Links, important topics and where to focus on my slides.mp4 8.9 MB
- Domain 8/04 - Links, important topics and where to focus on my slides.mp4 8.9 MB
- Domain 1/04 - Links, important topics and where to focus on my slides.mp4 8.9 MB
- Domain 2/04 - Links, important topics and where to focus on my slides.mp4 8.9 MB
- Domain 3/04 - Links, important topics and where to focus on my slides.mp4 8.9 MB
- Domain 5/04 - Links, important topics and where to focus on my slides.mp4 8.9 MB
- Domain 6/04 - Links, important topics and where to focus on my slides.mp4 8.9 MB
- Domain 6/15 - What we covered in Domain 6.mp4 8.6 MB
- Domain 5/01 - Introduction.mp4 8.5 MB
- Domain 6/01 - Introduction.mp4 8.5 MB
- Domain 7/01 - Introduction.mp4 8.5 MB
- Domain 1/01 - Introduction.mp4 8.5 MB
- Domain 2/01 - Introduction.mp4 8.5 MB
- Domain 3/01 - Introduction.mp4 8.5 MB
- Domain 4/01 - Introduction.mp4 8.5 MB
- Domain 4/05 - Domain 4 - What we will be covering.mp4 8.4 MB
- Domain 2/05 - Domain 2 - What we will be covering.mp4 7.8 MB
- Domain 4/24 - What we covered in Domain 4.mp4 7.7 MB
- Domain 3/36 - Domain 3 - What we covered.mp4 7.6 MB
- Domain 5/11 - Accountability.mp4 7.3 MB
- Domain 5/05 - Domain 5 - What we will be covering.mp4 7.0 MB
- Domain 6/06 - Domain 6 key concepts.mp4 6.6 MB
- Domain 5/15 - What we covered in Domain 5.mp4 6.6 MB
- Domain 8/18 - What we covered in Domain 8.mp4 5.9 MB
- Domain 2/12 - What we covered in Domain 2.mp4 1.0 MB
==查看完整文档列表==