BT种子基本信息
- 种子哈希:691314cb69d688412fbdc75a6aefac3e6c38c7ed
- 文档大小:18.7 GB
- 文档个数:206个文档
- 下载次数:3039次
- 下载速度:极快
- 收录时间:2024-03-13
- 最近下载:2025-01-03
- DMCA/屏蔽:DMCA/屏蔽
文档列表
- Chapter 3 Security Architecture and Engineering/008. Assess and mitigate vulnerabilities - the rest.mp4 336.7 MB
- Chapter 3 Security Architecture and Engineering/017. Spotlight on fire control.mp4 324.3 MB
- Chapter 5 Identity and Access Management (IAM)/005. Implement, manage auth mechanisms - Models.mp4 321.2 MB
- Chapter 3 Security Architecture and Engineering/016. Design site and facility security controls.mp4 320.6 MB
- Chapter 8 Software Development Security/012. Spotlight on Databases.mp4 308.0 MB
- Chapter 3 Security Architecture and Engineering/007. Assess and mitigate vulnerabilities - the basics.mp4 305.8 MB
- Chapter 3 Security Architecture and Engineering/006. Security capabilities of Info Systems - Memory.mp4 303.0 MB
- Chapter 4 Communication and Network Security/009. Implement Secure Communication Channels.mp4 294.8 MB
- Chapter 7 Security Operations/006. Apply resource protection.mp4 289.7 MB
- Chapter 7 Security Operations/004. Perform Configuration Management (CM).mp4 288.6 MB
- Chapter 7 Security Operations/003. Conduct logging & monitoring activities - threat.mp4 280.7 MB
- Chapter 4 Communication and Network Security/006. Spotlight on Micro-segmentation.mp4 274.0 MB
- Chapter 5 Identity and Access Management (IAM)/009. Spotlight on Federated Identity Management (FIM).mp4 272.0 MB
- Chapter 2 Asset Security/003. Provision resources securely.mp4 266.6 MB
- Chapter 1 Security and Risk Management/007. Spotlight on the GDPR.mp4 259.2 MB
- Chapter 7 Security Operations/002. Conduct logging & monitoring activities.mp4 258.7 MB
- Chapter 3 Security Architecture and Engineering/015. Security principles for site and facility design.mp4 253.2 MB
- Chapter 1 Security and Risk Management/006. Legal, regulatory issues for information security.mp4 250.4 MB
- Chapter 5 Identity and Access Management (IAM)/004. Implement, manage auth mechanisms - Vocab.mp4 241.8 MB
- Chapter 3 Security Architecture and Engineering/005. Security capabilities of Information Systems - CPU.mp4 232.8 MB
- Chapter 2 Asset Security/002. Establish information, asset handling requirements.mp4 231.8 MB
- Chapter 8 Software Development Security/010. Assess security impact of acquired software.mp4 231.7 MB
- Chapter 5 Identity and Access Management (IAM)/008. Spotlight on Kerberos.mp4 230.1 MB
- Chapter 7 Security Operations/016. Address personnel safety and security concerns.mp4 220.5 MB
- Chapter 8 Software Development Security/011. Define, apply secure coding guidelines, standards.mp4 220.2 MB
- Chapter 1 Security and Risk Management/012. Understand, apply risk management concepts.mp4 219.8 MB
- Chapter 5 Identity and Access Management (IAM)/001. Control physical and logical access to assets.mp4 216.3 MB
- Chapter 3 Security Architecture and Engineering/009. Spotlight on cryptographic solutions - Symmetric.mp4 214.9 MB
- Chapter 5 Identity and Access Management (IAM)/003. Federated identity with a third-party service.mp4 213.0 MB
- Chapter 8 Software Development Security/003. Security in the SDLC - Methodologies.mp4 206.8 MB
- Chapter 7 Security Operations/001. Understand and comply with investigations.mp4 206.6 MB
- Chapter 8 Software Development Security/009. Assess the effectiveness of software security.mp4 204.8 MB
- Chapter 7 Security Operations/015. Implement and manage physical security.mp4 204.6 MB
- Chapter 4 Communication and Network Security/003. Spotlight on IPsec.mp4 204.4 MB
- Chapter 8 Software Development Security/005. Security in the SDLC - odds & ends.mp4 200.9 MB
- Chapter 8 Software Development Security/001. Spotlight on the Software Development Life Cycle.mp4 199.7 MB
- Chapter 1 Security and Risk Management/003. Understand and apply security concepts (CIA).mp4 199.0 MB
- Chapter 8 Software Development Security/006. Apply controls in development ecosystems - basics.mp4 197.3 MB
- Chapter 6 Security Assessment and Testing/003. Conduct security control testing - the basics.mp4 197.0 MB
- Chapter 1 Security and Risk Management/010. Identify, analyze, prioritize BC requirements.mp4 195.6 MB
- Chapter 6 Security Assessment and Testing/004. Conduct security control testing - the rest.mp4 189.7 MB
- Chapter 3 Security Architecture and Engineering/012. Spotlight on cryptographic solutions - hashing.mp4 188.7 MB
- Chapter 7 Security Operations/008. Detective & preventative measures.mp4 188.0 MB
- Chapter 1 Security and Risk Management/015. Apply Supply Chain Risk Management (SCRM) concepts.mp4 186.4 MB
- Chapter 1 Security and Risk Management/011. Personnel security policies and procedures.mp4 186.4 MB
- Chapter 8 Software Development Security/004. Security in the SDLC - Maturity Models.mp4 184.5 MB
- Chapter 3 Security Architecture and Engineering/011. Spotlight on cryptographic solutions - PKI & certs.mp4 181.7 MB
- Chapter 4 Communication and Network Security/008. Secure Network Components.mp4 175.5 MB
- Chapter 6 Security Assessment and Testing/005. Collect security process data.mp4 174.7 MB
- Chapter 1 Security and Risk Management/004. Evaluate and apply security governance principles.mp4 173.9 MB
- Chapter 8 Software Development Security/008. Spotlight on the OWASP TOP 10.mp4 172.3 MB
- Chapter 1 Security and Risk Management/009. Security policy, standards, procedures, guidelines.mp4 171.4 MB
- Chapter 8 Software Development Security/007. Apply controls in development ecosystems - rest.mp4 169.5 MB
- Chapter 2 Asset Security/001. Identify and classify information, assets.mp4 168.7 MB
- Chapter 7 Security Operations/009. Patch & vulnerability management.mp4 167.7 MB
- Chapter 2 Asset Security/005. Ensure appropriate asset retention.mp4 167.7 MB
- Chapter 4 Communication and Network Security/001. Spotlight on the OSI Model.mp4 167.4 MB
- Chapter 4 Communication and Network Security/007. Wireless, Cellular & Content Distribution Networks.mp4 167.4 MB
- Chapter 5 Identity and Access Management (IAM)/007. Implement authentication systems.mp4 166.8 MB
- Chapter 6 Security Assessment and Testing/001. Assessment, test, & security audit strategies.mp4 166.0 MB
- Chapter 5 Identity and Access Management (IAM)/006. Manage the identity, access provisioning lifecycle.mp4 164.8 MB
- Chapter 3 Security Architecture and Engineering/014. Understand methods of cryptanalytic attacks.mp4 163.0 MB
- Chapter 4 Communication and Network Security/002. Spotlight on Internet Protocol (IP) networking.mp4 162.4 MB
- Chapter 1 Security and Risk Management/014. Threat modeling concepts and methodologies.mp4 161.8 MB
- Chapter 3 Security Architecture and Engineering/001. Engineering process using secure design principles.mp4 161.4 MB
- Chapter 7 Security Operations/010. Understand & participate in change management.mp4 161.3 MB
- Chapter 1 Security and Risk Management/008. Understand requirements for investigation types.mp4 159.9 MB
- Chapter 3 Security Architecture and Engineering/010. Spotlight on cryptographic solutions - Asymmetric.mp4 159.2 MB
- Chapter 3 Security Architecture and Engineering/002. Fundamental concepts of security models.mp4 159.0 MB
- Chapter 2 Asset Security/004. Manage data lifecycle.mp4 158.3 MB
- Chapter 2 Asset Security/006. Data security controls and compliance requirements.mp4 158.2 MB
- Chapter 6 Security Assessment and Testing/006. Analyze test output and generate reports.mp4 152.4 MB
- Chapter 3 Security Architecture and Engineering/013. Cryptographic solutions - digital signing.mp4 151.3 MB
- Chapter 1 Security and Risk Management/005. Determine compliance and other requirements.mp4 151.3 MB
- Chapter 6 Security Assessment and Testing/002. Spotlight on System and Org Controls Reports (SOC).mp4 150.1 MB
- Chapter 3 Security Architecture and Engineering/003. Controls based upon system security requirements.mp4 148.0 MB
- Chapter 7 Security Operations/011. Implement recovery strategies.mp4 147.5 MB
- Chapter 7 Security Operations/007. Conduct incident management.mp4 144.0 MB
- Chapter 5 Identity and Access Management (IAM)/002. Manage identification and authentication.mp4 141.6 MB
- Chapter 3 Security Architecture and Engineering/004. Security capabilities of Information Systems - vocab.mp4 141.3 MB
- Chapter 7 Security Operations/012. Implement Disaster Recovery (DR) processes.mp4 141.1 MB
- Chapter 7 Security Operations/013. Test Disaster Recovery Plans (DRP).mp4 138.5 MB
- Chapter 4 Communication and Network Security/010. Communications & Network Security - Key Points.mp4 133.7 MB
- Chapter 4 Communication and Network Security/004. Spotlight on Secure Protocols.mp4 128.9 MB
- Chapter 1 Security and Risk Management/016. Security awareness, education, and training program.mp4 122.7 MB
- Chapter 8 Software Development Security/002. Certs & Accreditation Verification & Validation.mp4 119.2 MB
- Chapter 6 Security Assessment and Testing/007. Security Assessment and Testing - Key Points.mp4 118.7 MB
- Chapter 2 Asset Security/007. Assets Security - Key Points.mp4 116.4 MB
- Chapter 8 Software Development Security/013. Software Development Security - Key Points.mp4 113.5 MB
- Chapter 7 Security Operations/017. Security Operations - Key points.mp4 111.2 MB
- Chapter 4 Communication and Network Security/005. Implications of converged & multilayer protocols.mp4 107.8 MB
- Chapter 3 Security Architecture and Engineering/018. Security Architecture & Engineering - Key Points.mp4 107.1 MB
- Chapter 7 Security Operations/014. Business Continuity (BC) planning & exercises.mp4 102.9 MB
- Chapter 1 Security and Risk Management/017. Security and Risk Management Key Points.mp4 100.5 MB
- Chapter 1 Security and Risk Management/013. Spotlight on the Risk Management Framework.mp4 99.8 MB
- Chapter 5 Identity and Access Management (IAM)/010. Identity Access Management (IAM) - Key Points.mp4 95.3 MB
- Chapter 1 Security and Risk Management/002. Understand adhere, promote professional ethics.mp4 75.9 MB
- Chapter 7 Security Operations/005. Apply foundational security operations concepts.mp4 57.9 MB
- Chapter 9 The CISSP Toolbox/004. What is your timeline.en.mp4 44.1 MB
- Chapter 9 The CISSP Toolbox/003. What does your study plan look like.mp4 35.6 MB
- Chapter 1 Security and Risk Management/001. Overview.mp4 27.7 MB
- Chapter 9 The CISSP Toolbox/002. Who are you.mp4 27.4 MB
- Chapter 9 The CISSP Toolbox/001. What is the CISSP Toolbox.mp4 14.6 MB
- Chapter 6 Security Assessment and Testing/004. Conduct security control testing - the rest.en.srt 56.0 kB
- Chapter 3 Security Architecture and Engineering/008. Assess and mitigate vulnerabilities - the rest.en.srt 55.1 kB
- Chapter 5 Identity and Access Management (IAM)/008. Spotlight on Kerberos.en.srt 54.7 kB
- Chapter 3 Security Architecture and Engineering/017. Spotlight on fire control.en.srt 54.1 kB
- Chapter 3 Security Architecture and Engineering/006. Security capabilities of Info Systems - Memory.en.srt 54.1 kB
- Chapter 3 Security Architecture and Engineering/007. Assess and mitigate vulnerabilities - the basics.en.srt 53.0 kB
- Chapter 8 Software Development Security/009. Assess the effectiveness of software security.en.srt 52.5 kB
- Chapter 8 Software Development Security/006. Apply controls in development ecosystems - basics.en.srt 52.5 kB
- Chapter 3 Security Architecture and Engineering/016. Design site and facility security controls.en.srt 52.1 kB
- Chapter 7 Security Operations/015. Implement and manage physical security.en.srt 52.0 kB
- Chapter 7 Security Operations/008. Detective & preventative measures.en.srt 52.0 kB
- Chapter 6 Security Assessment and Testing/003. Conduct security control testing - the basics.en.srt 51.8 kB
- Chapter 8 Software Development Security/003. Security in the SDLC - Methodologies.en.srt 51.7 kB
- Chapter 4 Communication and Network Security/007. Wireless, Cellular & Content Distribution Networks.en.srt 51.2 kB
- Chapter 8 Software Development Security/001. Spotlight on the Software Development Life Cycle.en.srt 51.2 kB
- Chapter 7 Security Operations/001. Understand and comply with investigations.en.srt 51.1 kB
- Chapter 3 Security Architecture and Engineering/009. Spotlight on cryptographic solutions - Symmetric.en.srt 51.1 kB
- Chapter 5 Identity and Access Management (IAM)/002. Manage identification and authentication.en.srt 50.5 kB
- Chapter 1 Security and Risk Management/010. Identify, analyze, prioritize BC requirements.en.srt 50.4 kB
- Chapter 4 Communication and Network Security/003. Spotlight on IPsec.en.srt 50.0 kB
- Chapter 5 Identity and Access Management (IAM)/005. Implement, manage auth mechanisms - Models.en.srt 50.0 kB
- Chapter 2 Asset Security/006. Data security controls and compliance requirements.en.srt 49.9 kB
- Chapter 4 Communication and Network Security/006. Spotlight on Micro-segmentation.en.srt 49.8 kB
- Chapter 4 Communication and Network Security/009. Implement Secure Communication Channels.en.srt 49.6 kB
- Chapter 4 Communication and Network Security/002. Spotlight on Internet Protocol (IP) networking.en.srt 49.5 kB
- Chapter 7 Security Operations/002. Conduct logging & monitoring activities.en.srt 48.9 kB
- Chapter 7 Security Operations/006. Apply resource protection.en.srt 48.5 kB
- Chapter 7 Security Operations/011. Implement recovery strategies.en.srt 48.4 kB
- Chapter 5 Identity and Access Management (IAM)/007. Implement authentication systems.en.srt 48.3 kB
- Chapter 8 Software Development Security/004. Security in the SDLC - Maturity Models.en.srt 48.3 kB
- Chapter 5 Identity and Access Management (IAM)/003. Federated identity with a third-party service.en.srt 48.2 kB
- Chapter 1 Security and Risk Management/012. Understand, apply risk management concepts.en.srt 48.1 kB
- Chapter 1 Security and Risk Management/007. Spotlight on the GDPR.en.srt 48.0 kB
- Chapter 4 Communication and Network Security/010. Communications & Network Security - Key Points.en.srt 48.0 kB
- Chapter 6 Security Assessment and Testing/001. Assessment, test, & security audit strategies.en.srt 47.9 kB
- Chapter 1 Security and Risk Management/008. Understand requirements for investigation types.en.srt 47.7 kB
- Chapter 2 Asset Security/002. Establish information, asset handling requirements.en.srt 47.6 kB
- Chapter 3 Security Architecture and Engineering/004. Security capabilities of Information Systems - vocab.en.srt 47.6 kB
- Chapter 6 Security Assessment and Testing/005. Collect security process data.en.srt 47.2 kB
- Chapter 3 Security Architecture and Engineering/014. Understand methods of cryptanalytic attacks.en.srt 47.0 kB
- Chapter 5 Identity and Access Management (IAM)/001. Control physical and logical access to assets.en.srt 46.7 kB
- Chapter 1 Security and Risk Management/015. Apply Supply Chain Risk Management (SCRM) concepts.en.srt 46.3 kB
- Chapter 3 Security Architecture and Engineering/011. Spotlight on cryptographic solutions - PKI & certs.en.srt 46.3 kB
- Chapter 8 Software Development Security/008. Spotlight on the OWASP TOP 10.en.srt 46.2 kB
- Chapter 1 Security and Risk Management/006. Legal, regulatory issues for information security.en.srt 45.9 kB
- Chapter 5 Identity and Access Management (IAM)/004. Implement, manage auth mechanisms - Vocab.en.srt 45.7 kB
- Chapter 3 Security Architecture and Engineering/015. Security principles for site and facility design.en.srt 45.6 kB
- Chapter 3 Security Architecture and Engineering/005. Security capabilities of Information Systems - CPU.en.srt 45.2 kB
- Chapter 5 Identity and Access Management (IAM)/006. Manage the identity, access provisioning lifecycle.en.srt 44.3 kB
- Chapter 4 Communication and Network Security/001. Spotlight on the OSI Model.en.srt 44.2 kB
- Chapter 7 Security Operations/003. Conduct logging & monitoring activities - threat.en.srt 43.9 kB
- Chapter 2 Asset Security/004. Manage data lifecycle.en.srt 43.7 kB
- Chapter 7 Security Operations/004. Perform Configuration Management (CM).en.srt 43.3 kB
- Chapter 1 Security and Risk Management/014. Threat modeling concepts and methodologies.en.srt 43.0 kB
- Chapter 3 Security Architecture and Engineering/003. Controls based upon system security requirements.en.srt 42.9 kB
- Chapter 6 Security Assessment and Testing/007. Security Assessment and Testing - Key Points.en.srt 42.3 kB
- Chapter 8 Software Development Security/007. Apply controls in development ecosystems - rest.en.srt 42.2 kB
- Chapter 3 Security Architecture and Engineering/018. Security Architecture & Engineering - Key Points.en.srt 41.4 kB
- Chapter 2 Asset Security/007. Assets Security - Key Points.en.srt 40.5 kB
- Chapter 1 Security and Risk Management/011. Personnel security policies and procedures.en.srt 40.4 kB
- Chapter 7 Security Operations/017. Security Operations - Key points.en.srt 39.6 kB
- Chapter 8 Software Development Security/011. Define, apply secure coding guidelines, standards.en.srt 39.5 kB
- Chapter 4 Communication and Network Security/008. Secure Network Components.en.srt 39.5 kB
- Chapter 2 Asset Security/005. Ensure appropriate asset retention.en.srt 39.3 kB
- Chapter 8 Software Development Security/005. Security in the SDLC - odds & ends.en.srt 39.0 kB
- Chapter 3 Security Architecture and Engineering/010. Spotlight on cryptographic solutions - Asymmetric.en.srt 38.4 kB
- Chapter 6 Security Assessment and Testing/002. Spotlight on System and Org Controls Reports (SOC).en.srt 38.1 kB
- Chapter 7 Security Operations/016. Address personnel safety and security concerns.en.srt 37.9 kB
- Chapter 1 Security and Risk Management/003. Understand and apply security concepts (CIA).en.srt 37.7 kB
- Chapter 2 Asset Security/001. Identify and classify information, assets.en.srt 37.2 kB
- Chapter 7 Security Operations/012. Implement Disaster Recovery (DR) processes.en.srt 37.1 kB
- Chapter 3 Security Architecture and Engineering/012. Spotlight on cryptographic solutions - hashing.en.srt 36.7 kB
- Chapter 6 Security Assessment and Testing/006. Analyze test output and generate reports.en.srt 36.3 kB
- Chapter 5 Identity and Access Management (IAM)/009. Spotlight on Federated Identity Management (FIM).en.srt 36.1 kB
- Chapter 4 Communication and Network Security/004. Spotlight on Secure Protocols.en.srt 35.8 kB
- Chapter 7 Security Operations/009. Patch & vulnerability management.en.srt 35.4 kB
- Chapter 7 Security Operations/010. Understand & participate in change management.en.srt 35.1 kB
- Chapter 1 Security and Risk Management/004. Evaluate and apply security governance principles.en.srt 34.9 kB
- Chapter 7 Security Operations/007. Conduct incident management.en.srt 33.9 kB
- Chapter 1 Security and Risk Management/013. Spotlight on the Risk Management Framework.en.srt 33.9 kB
- Chapter 7 Security Operations/013. Test Disaster Recovery Plans (DRP).en.srt 33.5 kB
- Chapter 3 Security Architecture and Engineering/013. Cryptographic solutions - digital signing.en.srt 33.2 kB
- Chapter 2 Asset Security/003. Provision resources securely.en.srt 32.2 kB
- Chapter 1 Security and Risk Management/017. Security and Risk Management Key Points.en.srt 32.1 kB
- Chapter 8 Software Development Security/002. Certs & Accreditation Verification & Validation.en.srt 31.2 kB
- Chapter 1 Security and Risk Management/005. Determine compliance and other requirements.en.srt 31.1 kB
- Chapter 1 Security and Risk Management/009. Security policy, standards, procedures, guidelines.en.srt 30.8 kB
- Chapter 8 Software Development Security/012. Spotlight on Databases.en.srt 30.6 kB
- Chapter 5 Identity and Access Management (IAM)/010. Identity Access Management (IAM) - Key Points.en.srt 30.2 kB
- Chapter 8 Software Development Security/013. Software Development Security - Key Points.en.srt 29.6 kB
- Chapter 7 Security Operations/014. Business Continuity (BC) planning & exercises.en.srt 26.7 kB
- Chapter 1 Security and Risk Management/016. Security awareness, education, and training program.en.srt 25.2 kB
- Chapter 3 Security Architecture and Engineering/002. Fundamental concepts of security models.en.srt 24.1 kB
- Chapter 3 Security Architecture and Engineering/001. Engineering process using secure design principles.en.srt 23.9 kB
- Chapter 4 Communication and Network Security/005. Implications of converged & multilayer protocols.en.srt 23.5 kB
- Chapter 1 Security and Risk Management/002. Understand adhere, promote professional ethics.en.srt 21.6 kB
- Chapter 7 Security Operations/005. Apply foundational security operations concepts.en.srt 18.1 kB
- Chapter 8 Software Development Security/010. Assess security impact of acquired software.en.srt 14.0 kB
- Chapter 9 The CISSP Toolbox/004. What is your timeline.en.srt 13.7 kB
- Chapter 9 The CISSP Toolbox/003. What does your study plan look like.en.srt 10.7 kB
- Chapter 9 The CISSP Toolbox/002. Who are you.en.srt 8.6 kB
- Chapter 1 Security and Risk Management/001. Overview.en.srt 6.3 kB
- Chapter 9 The CISSP Toolbox/001. What is the CISSP Toolbox.en.srt 2.2 kB
==查看完整文档列表==