Packt – CompTIA Advanced Security Practitioner (CASP)
- Packt – CompTIA Advanced Security Practitioner (CASP) desc<x>ription.pdf209.37KB
- Приватные видеокурсы.pdf348.32KB
- learning_videos\\/03 - Risk nagement.mp410.21MB
- learning_videos\\/42 - Disposal Terms and Concepts.mp413.24MB
- learning_videos\\/33 - Sensitive Infortion-Internal Security Policies.mp433.34MB
- learning_videos\\/34 - Incident Response Process.mp435.78MB
- learning_videos\\/35 - Forensic Tasks.mp419.02MB
- learning_videos\\/36 - Employment and Termination Procedures.mp429.67MB
- learning_videos\\/37 - Network Auditing.mp417.76MB
- learning_videos\\/38 - Incident Response and Recovery Procedures.mp44.04MB
- learning_videos\\/39 - E-Discovery and Data Retention Policies.mp457.94MB
- learning_videos\\/40 - Data Recovery-Storage and Backup Schemes.mp479.96MB
- learning_videos\\/41 - Data Owner and Data Handling.mp415.39MB
- learning_videos\\/43 - Data Breach and Data Analysis.mp412.65MB
- learning_videos\\/31 - Security Policy Business Doents.mp449.87MB
- learning_videos\\/44 - Incident Response Guidelines.mp457.03MB
- learning_videos\\/45 - Incident and Emergency Response.mp423.78MB
- learning_videos\\/46 - Media-Software and Network Analysis.mp434.20MB
- learning_videos\\/47 - Order of Volatility.mp410.39MB
- learning_videos\\/48 - Industry Trends Overview.mp46.46MB
- learning_videos\\/49 - Performing Ongoing Research.mp410.01MB
- learning_videos\\/50 - Security Practices.mp430.69MB
- learning_videos\\/51 - Evolution of Technology.mp48.21MB
- learning_videos\\/52 - Situational Awareness and Vulnerability Assesents.mp443.57MB
- learning_videos\\/32 - Outage Impact and Estiting Downtime Terms.mp490.30MB
- learning_videos\\/30 - Legal Compliance Part2.mp464.08MB
- learning_videos\\/54 - Global Industry Security Response.mp411.65MB
- learning_videos\\/191 - Asset nagement.mp412.65MB
- learning_videos\\/183 - Mobile and Personal Device nagement.mp428.27MB
- learning_videos\\/184 - Over Air Technology Concerns.mp426.97MB
- learning_videos\\/185 - WLAN Concepts-Terms-Standards.mp433.65MB
- learning_videos\\/186 - WLAN Security and Attacks.mp440.95MB
- learning_videos\\/187 - Security Across the Technology Life Cycle.mp45.38MB
- learning_videos\\/188 - End to End Solution Ownership.mp450.80MB
- learning_videos\\/ - System Development Life Cycle.mp458.12MB
- learning_videos\\/19 - Risk nagement Process.mp413.45MB
- learning_videos\\/190 - Security Implications of Software Development Methodologies.mp423.21MB
- learning_videos\\/192 - Course End.mp41.97MB
- learning_videos\\/29 - Legal Compliance Part1.mp453.12MB
- learning_videos\\/20 - Identifying Vulnerabilities and Threats.mp419.12MB
- learning_videos\\/21 - Security Architecture fr<x>ameworks.mp427.11MB
- learning_videos\\/22 - Business Continuity Planning.mp416.30MB
- learning_videos\\/23 - IT Governance.mp413.92MB
- learning_videos\\/24 - Security Policies.mp422.96MB
- learning_videos\\/25 - Security-Privacy Policies and Procedures Part1.mp45.52MB
- learning_videos\\/26 - Security-Privacy Policies and Procedures Part2.mp43.44MB
- learning_videos\\/27 - Policy Development Updates.mp439.32MB
- learning_videos\\/28 - Developing Processes and Procedures.mp419.81MB
- learning_videos\\/53 - Researching Security Implications.mp427.92MB
- learning_videos\\/55 - Threat Actors.mp418.96MB
- learning_videos\\/181 - Cloud ba<x>sed Collaboration.mp424.24MB
- learning_videos\\/90 - Strength vs Perfornce and Cryptographic Implementations.mp421.91MB
- learning_videos\\/81 - Cryptographic Concepts.mp457.14MB
- learning_videos\\/82 - Transport Encryption Protocol.mp433.44MB
- learning_videos\\/83 - Symmetric Algorithms.mp471.07MB
- learning_videos\\/84 - Asymmetric Algorithms.mp439.24MB
- learning_videos\\/85 - Hybrid Encryption and Digital Signatures.mp431.46MB
- learning_videos\\/86 - Public Key Infrastructure.mp464.58MB
- learning_videos\\/87 - Digital Certificate Classes and Cypher Types.mp415.37MB
- learning_videos\\/88 - Des Modes.mp445.28MB
- learning_videos\\/89 - Cryptographic Attacks.mp467.36MB
- learning_videos\\/91 - Enterprise Storage.mp45.87MB
- learning_videos\\/79 - Hashing Algorithms.mp475.52MB
- learning_videos\\/92 - Virtual Storage Types and Challenges.mp422.24MB
- learning_videos\\/93 - Cloud Storage.mp445.64MB
- learning_videos\\/94 - Data Warehousing.mp418.00MB
- learning_videos\\/95 - Data Archiving.mp418.91MB
- learning_videos\\/96 - Storage Area Networks (SANs) and (VSANs).mp420.10MB
- learning_videos\\/97 - Network Attached Storage (NAS).mp412.60MB
- learning_videos\\/98 - Storage Protocols and Fiber Channel over Ethernet (FCoE).mp424.14MB
- learning_videos\\/99 - Storage Network File Systems.mp415.08MB
- learning_videos\\/02 - Business Influences and Associated Security Risks.mp44.51MB
- learning_videos\\/80 - Message Authentication Code.mp416.62MB
- learning_videos\\/78 - Cryptographic Benefits and Techniques.mp429.70MB
- learning_videos\\/56 - Contract Security Requirements.mp410.20MB
- learning_videos\\/66 - Assesent Tools and Methods.mp46.61MB
- learning_videos\\/57 - Contract Doents.mp49.03MB
- learning_videos\\/58 - Securing the Enterprise Overview.mp45.16MB
- learning_videos\\/59 - Benchrks and ba<x>selines.mp421.05MB
- learning_videos\\/60 - Prototyping and Testing Multiple Solutions.mp420.42MB
- learning_videos\\/61 - Cost_Benefit Analysis.mp49.17MB
- learning_videos\\/62 - Metrics Collection and Trend Data.mp420.63MB
- learning_videos\\/63 - Security Controls-Reverse Engineering and Deconstructing.mp415.64MB
- learning_videos\\/ - Security Solutions Business Needs.mp419.31MB
- learning_videos\\/65 - Lesson Learned- After Action Report.mp412.33MB
- learning_videos\\/67 - Port Scanners and Vulnerability Scanners.mp424.50MB
- learning_videos\\/77 - Social Cryptographic Concepts and Techniques.mp45.18MB
- learning_videos\\/68 - Protocol Analyzer- Network Enumerator-Password Cracker.mp427.18MB
- learning_videos\\/69 - Fuzzers and HTTP Interceptors.mp419.62MB
- learning_videos\\/70 - Exploitation Tools.mp417.38MB
- learning_videos\\/71 - Passive Reconnaissance Tools.mp454.37MB
- learning_videos\\/72 - Vulnerability Assesents and lware Sandboxing.mp417.61MB
- learning_videos\\/73 - Memory Dumping and Penetration Testing.mp435.82MB
- learning_videos\\/74 - Reconnaissance and Fingerprinting.mp417.10MB
- learning_videos\\/75 - Code Review.mp414.90MB
- learning_videos\\/76 - Social Engineering.mp425.31MB
- learning_videos\\/182 - Remote Access and IPsec.mp444.76MB
- learning_videos\\/180 - Telephony-VoIP and Social Media.mp426.18MB
- learning_videos\\/04 - Business Model Strategies.mp412.02MB
- learning_videos\\/125 - Configuring and naging Interface Security.mp437.27MB
- learning_videos\\/117 - Network Device Accessibility and Security.mp465.54MB
- learning_videos\\/118 - Security Controls for Hosts.mp45.88MB
- learning_videos\\/119 - Trusted Operation Systems.mp421.94MB
- learning_videos\\/12 - Infortion Life Cycle and Steak-Holder Input.mp418.96MB
- learning_videos\\/120 - Endpoint Security Software and Data Loss Prevention.mp437.90MB
- learning_videos\\/121 - Host ba<x>sed Firewalls.mp48.68MB
- learning_videos\\/122 - Log Monitoring and Host Hardening.mp422.66MB
- learning_videos\\/123 - Standard Operating Environment and Group Policy Security.mp435.13MB
- learning_videos\\/124 - Comnd Shell Restrictions.mp46.83MB
- learning_videos\\/126 - U-Bluetooth-Firewire Restrictions and Security.mp431.91MB
- learning_videos\\/115 - Advanced Router and Switch Configuration.mp429.25MB
- learning_videos\\/127 - Full Disk Encryption.mp422.76MB
- learning_videos\\/128 - Virtualization Security.mp420.04MB
- learning_videos\\/129 - Cloud Security Services.mp428.77MB
- learning_videos\\/13 - Implementing Technical Controls.mp441.11MB
- learning_videos\\/130 - Boot Loader Protections.mp425.04MB
- learning_videos\\/131 - Virtual Host Vulnerabilities.mp411.30MB
- learning_videos\\/132 - Virtual Desk Infrastructure.mp417.90MB
- learning_videos\\/133 - Terminal Services.mp43.59MB
- learning_videos\\/134 - Virtual TPM.mp415.51MB
- learning_videos\\/116 - Data Flow Enforcement of Applications and Networks.mp410.75MB
- learning_videos\\/ - ailability Controls-Terms and Techniques.mp447.21MB
- learning_videos\\/136 - Web Application Security Design.mp410.81MB
- learning_videos\\/103 - Network and Security Components-Concepts-Security Architectures.mp45.79MB
- learning_videos\\/05 - Integrating Diverse Industries.mp45.95MB
- learning_videos\\/06 - Third Party Infortion Security and Providers.mp414.86MB
- learning_videos\\/07 - Internal and External Influences.mp417.97MB
- learning_videos\\/08 - Impact of De-Perimeterization.mp48.01MB
- learning_videos\\/09 - Risk Mitigation Planning - Strategies and Controls.mp43.63MB
- learning_videos\\/10 - CIA Triad.mp412.05MB
- learning_videos\\/100 - Secure Storage nagement Techniques.mp450.98MB
- learning_videos\\/101 - LUN sking_Mapping and HBA Allocation.mp420.22MB
- learning_videos\\/102 - Replication and Encryption Methods.mp428.37MB
- learning_videos\\/104 - Remote Access Protocols.mp455.17MB
- learning_videos\\/113 - Network Security Solutions.mp433.44MB
- learning_videos\\/105 - IPv6 and Transport Encryption.mp441.90MB
- learning_videos\\/106 - Network Authentication Methods.mp443.14MB
- learning_videos\\/107 - 802.1x and Mesh Networks.mp421.12MB
- learning_videos\\/108 - Security Devices.mp449.89MB
- learning_videos\\/109 - Network Devices.mp440.19MB
- learning_videos\\/11 - Business Classifications.mp417.97MB
- learning_videos\\/110 - Firewalls.mp429.82MB
- learning_videos\\/111 - Wireless Controllers.mp418.51MB
- learning_videos\\/112 - Router Security and Port Numbers.mp416.25MB
- learning_videos\\/135 - Application Vulnerabilities and Security Controls.mp46.79MB
- learning_videos\\/137 - Specific Application Issues.mp424.07MB
- learning_videos\\/18 - Total Cost of Ownership and Risk Strategies.mp426.76MB
- learning_videos\\/17 - Return Of Investment.mp433.47MB
- learning_videos\\/161 - Biometrics.mp434.65MB
- learning_videos\\/162 - Dual-Multi Factor and Certificate Authentication.mp416.00MB
- learning_videos\\/163 - Single Sign On Issues.mp49.27MB
- learning_videos\\/1 - Access Control Models and Open Authorization.mp427.92MB
- learning_videos\\/165 - Extensible Access Control rkup Language (XACML).mp419.09MB
- learning_videos\\/166 - Service Provisioning rkup Language (SPML).mp48.09MB
- learning_videos\\/167 - Attestation and Identity Propagation.mp419.18MB
- learning_videos\\/168 - Federation and Security Assertion rkup Language (SAML).mp419.98MB
- learning_videos\\/169 - OpenID-Shibboleth and WAYF.mp421.88MB
- learning_videos\\/170 - Advanced Trust Models.mp411.78MB
- learning_videos\\/16 - Calculation Tools and Attacker Motivation.mp426.78MB
- learning_videos\\/171 - Business Unit Collaboration.mp44.50MB
- learning_videos\\/172 - Identifying and Communicating Security Requirements.mp488.72MB
- learning_videos\\/173 - Security Controls Recommendations.mp49.20MB
- learning_videos\\/174 - Secure Solutions Collaboration.mp45.26MB
- learning_videos\\/175 - Secure Communication and Collaboration.mp45.59MB
- learning_videos\\/176 - Web-Video Conferencing-Instant Messaging.mp466.00MB
- learning_videos\\/177 - Desk Sharing.mp427.64MB
- learning_videos\\/178 - Presence Guidelines.mp418.67MB
- learning_videos\\/01 - Course Introduction.mp44.90MB
- learning_videos\\/160 - Authentication Factors.mp49.71MB
- learning_videos\\/159 - Password Types-nagement and Policies.mp433.78MB
- learning_videos\\/138 - Session nagement.mp412.97MB
- learning_videos\\/147 - Host-Storage-Network and Application Integration.mp44.58MB
- learning_videos\\/139 - Input Validation.mp422.73MB
- learning_videos\\/14 - Determine Aggregate CIA Score.mp416.48MB
- learning_videos\\/140 - Web Vulnerabilities and Input Mitigation Issues.mp420.97MB
- learning_videos\\/141 - Buffer Overflow and other Application Issues.mp435.35MB
- learning_videos\\/142 - Application Security fr<x>amework.mp421.06MB
- learning_videos\\/143 - Web Service Security and Secure Coding Standards.mp411.28MB
- learning_videos\\/144 - Software Development Methods.mp439.88MB
- learning_videos\\/145 - Monitoring Mechanis and Client-Server Side Processing.mp421.45MB
- learning_videos\\/146 - Browser Extensions and Other Web Development Techniques.mp432.63MB
- learning_videos\\/148 - Securing Data Flows.mp423.93MB
- learning_videos\\/158 - Authentication and Identity nagement.mp417.97MB
- learning_videos\\/149 - Standards Concepts.mp417.45MB
- learning_videos\\/15 - Worst Case Scenario Planning.mp444.56MB
- learning_videos\\/150 - Interoperability Issues.mp415.98MB
- learning_videos\\/151 - In House Commercial and Customized Applications.mp47.97MB
- learning_videos\\/152 - Cloud and Virtualization Models.mp432.53MB
- learning_videos\\/153 - Logical and Physical Deployment Diagrams.mp46.99MB
- learning_videos\\/154 - Secure Infrastructure Design.mp423.26MB
- learning_videos\\/155 - Storage Integration Security.mp47.17MB
- learning_videos\\/156 - Enterprise Application Integration Enablers.mp437.78MB
- learning_videos\\/157 - Authentication and Authorization Technologies.mp44.65MB
- learning_videos\\/179 - Eil Messaging Protocol.mp431.29MB
- CreateTime2021-04-08
- UpdateTime2021-04-11
- FileTotalCount195
- TotalSize9.39GBHotTimes5ViewTimes10DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.PBD-151 2.HZD-27 3.DOKS-211 4.CWM-039 5.MXGS-328 6.CABD-041 7.APAO-010 8.WNZ-176 9.ANX-014 10.BOIE-006 11.JUSD-358 12.JUSD-351 13.ZONO-056 14.DYNS-013 15.JUSD-438 16.DBZH-11 17.OKAS-072 18.VENU-303 19.FSET-328 20.SQTE-044 21.MIDD-813 22.BIB-053 23.XND-017 24.UMD-394 25.MIBD-552 26.TYWD-013 27.SOE-121 28.RKI-278 29.SBB-132 30.IDBD-329 31.MOZD-38 32.DSD-064 33.AT-120 34.IPTD-088 35.FTA-122 36.ONSD-603 37.ONSD-584 38.DV-1469 39.ONSD-512 40.KWBD-093 41.EMAD-067 42.DVH-392 43.SKSS-48 44.KBKD-285 45.MDYD-254 46.YLW-4033 47.BNDV-00689 48.WSS-131 49.NFDM-255 50.LIA-008 51.AKHO-076 52.VSPDS-291 53.SPZ-268 54.BIHD-003 55.TWD-183 56.ROKAD-094 57.BZ-048 58.HUNT-139 59.SPZ-400 60.ID-006 61.MAMA-113 62.MANA-018 63.SGSR-072 64.WEI-004 65.TXXD-065 66.RD-025 67.VO-052 68.KT-291 69.C-540 70.OKAS-085 71.195 72.776 73.739 74.01 75.020 76.127 77.219 78.575 79.023 80.561 81.041 82.268 83.014 84.125 85.012 86.026 87.018 88.25 89.527 90.1019 91.289 92.053 93.137 94.600 95.365 96.4 97.494 98.081 99.199 100.002 101.25 102.0068 103.220 104.446 105.051 106.257 107.465 108.00573 109.177 110.32 111.004 112.052 113.015 114.026 115.020 116.120 117.363 118.281 119.043 120.1701 121.4615 122.012 123.774 124.324 125.005 126.006 127.172 128.071 129.168 130.722 131.035 132.001 133.007 134.576 135.279 136.2348 137.020 138.4716 139.048 140.086