磁力狗

磁力狗
为您索检到2条磁力链接,耗时0毫秒。搜索结果较少,你是否写错字?

最新地址

【影视】 Secure Operations and Protections
收录时间:2022-01-13 文档个数:117 文档大小:6.6 GB 最近下载:2025-01-19 人气:2546 磁力链接
  • mp4[TutsNode.com] - Secure Operations and Protections/7 - 1.5 Network Architecture.mp4 471.3 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/4 - 1.2 Cloud vs. On-premises - Part 2.mp4 460.6 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/42 - 4.1 What is a Cyber Incident.mp4 440.6 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/10 - 1.8 Identity and Access Management.mp4 417.1 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/11 - 1.9 Cloud Access Security Broker (CASB).mp4 333.9 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/44 - 4.3 Trusted Parties.mp4 312.6 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/32 - 3.4 Firewall.mp4 228.4 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/12 - 1.10 Honeypots and Breach Detection.mp4 205.4 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/46 - 4.5 Preventing Inadvertent Release of Information.mp4 205.0 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/16 - 2.2 DevSecOps.mp4 197.6 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/29 - 3.1 Change Control.mp4 195.3 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/3 - 1.1 Cloud vs. On-premises - Part 1.mp4 167.2 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/18 - 2.4 User Acceptance Training and Stress Test.mp4 149.4 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/5 - 1.3 Asset Management.mp4 148.2 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/21 - 2.7 Secure Coding Best Practices.mp4 145.7 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/48 - 5.1 Legal.mp4 112.8 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/17 - 2.3 Software Assessment Methods.mp4 101.2 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/34 - 3.6 Data Loss Prevention (DLP).mp4 98.7 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/15 - 2.1 SDLC Platforms.mp4 90.8 MB
  • mp4[TutsNode.com] - Secure Operations and Protections/24 - 2.10 Session Management.mp4 89.8 MB
【影视】 [ CourseWikia.com ] Oreilly - Secure Operations and Protections, 2nd Edition
收录时间:2024-04-09 文档个数:92 文档大小:1.3 GB 最近下载:2025-02-18 人气:1131 磁力链接
  • mp4~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4 120.3 MB
  • mp4~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4 117.9 MB
  • mp4~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4 106.0 MB
  • mp4~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4 89.3 MB
  • mp4~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4 87.1 MB
  • mp4~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4 76.0 MB
  • mp4~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4 52.0 MB
  • mp4~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4 50.1 MB
  • mp4~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4 43.6 MB
  • mp4~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/011. 4.10 Secure coding best practices.mp4 39.2 MB
  • mp4~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/002. 2.1 Standardize processes.mp4 34.3 MB
  • mp4~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/012. 4.11 Secure software development life cycle (SDLC).mp4 33.3 MB
  • mp4~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/007. 4.6 Risk management principles.mp4 33.1 MB
  • mp4~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/013. 3.12 Identification and authentication failures.mp4 27.4 MB
  • mp4~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/016. 3.15 Privilege escalation.mp4 26.3 MB
  • mp4~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/010. 4.9 Attack surface management.mp4 24.6 MB
  • mp4~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/003. 4.2 Control types.mp4 24.1 MB
  • mp4~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/006. 3.5 Cryptographic failures.mp4 23.8 MB
  • mp4~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/009. 1.8 Sensitive data protection.mp4 22.0 MB
  • mp4~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/005. 4.4 Maintenance windows.mp4 20.6 MB
共1页 上一页 1 下一页
>