CISSP-Packt-1zpBJ
- Doin 1/01 - Introduction.mp48.12MB
- Doin 1/02 - Why should you want to get the CISSP certification.mp429.23MB
- Doin 1/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp446.49MB
- Doin 1/04 - Links, important ics and where to focus on my slides.mp48.47MB
- Doin 1/05 - Domain 1 - What we will be covering.mp415.85MB
- Doin 1/06 - The CIA Triad.mp466.45MB
- Doin 1/07 - IAAA.mp429.78MB
- Doin 1/08 - Governance, Management, standards, and frameworks.mp442.31MB
- Doin 1/09 - Laws and regulations.mp470.36MB
- Doin 1/10 - Intellectual property.mp428.57MB
- Doin 1/11 - US laws, European laws and international treaties.mp460.58MB
- Doin 1/12 - GDPR (General Data Protection Regulation).mp425.41MB
- Doin 1/13 - Ethics.mp441.93MB
- Doin 1/14 - Policies, procedures, guidelines, and frameworks.mp439.83MB
- Doin 1/15 - Access control.mp414.56MB
- Doin 1/16 - Risk analysis, attackers and attacks.mp4119.76MB
- Doin 1/17 - What we covered in Domain 1.mp416.80MB
- Doin 2/01 - Introduction.mp48.12MB
- Doin 2/02 - Why should you want to get the CISSP certification.mp429.23MB
- Doin 2/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp446.49MB
- Doin 2/04 - Links, important ics and where to focus on my slides.mp48.47MB
- Doin 2/05 - Domain 2 - What we will be covering.mp47.43MB
- Doin 2/06 - Data classification and clearance.mp418.77MB
- Doin 2/07 - Sensitive information and media security.mp451.77MB
- Doin 2/08 - Mission, data, and system owners and data custodians.mp417.59MB
- Doin 2/09 - Memory and data remanence.mp430.72MB
- Doin 2/10 - Data remanence and destruction.mp432.50MB
- Doin 2/11 - Data security frameworks.mp419.42MB
- Doin 2/12 - What we covered in Domain 2.mp4978.03KB
- Doin 3/01 - Introduction.mp48.12MB
- Doin 3/02 - Why should you want to get the CISSP certification.mp429.23MB
- Doin 3/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp446.50MB
- Doin 3/04 - Links, important ics and where to focus on my slides.mp48.47MB
- Doin 3/05 - Domain 3 - What we will be covering.mp411.99MB
- Doin 3/06 - Security models and concepts.mp491.16MB
- Doin 3/07 - Security evaluation models.mp419.39MB
- Doin 3/08 - Secure system design concepts.mp424.62MB
- Doin 3/09 - Hardware architecture.mp457.90MB
- Doin 3/10 - Secure operating systems and software architecture.mp413.12MB
- Doin 3/11 - Virtualization.mp496.74MB
- Doin 3/12 - IOT (Internet Of Things).mp410.95MB
- Doin 3/13 - System vulnerabilities, threats, and countermeasures.mp469.01MB
- Doin 3/14 - Web architecture and attacks.mp435.38MB
- Doin 3/15 - Database security.mp424.03MB
- Doin 3/16 - Mobile device security.mp436.03MB
- Doin 3/17 - Industrial Control Systems.mp422.01MB
- Doin 3/18 - Introduction to Cryptography.mp444.72MB
- Doin 3/19 - The history of cryptography.mp457.20MB
- Doin 3/20 - Symmetric encryption.mp482.74MB
- Doin 3/21 - Asymmetric encryption.mp446.98MB
- Doin 3/22 - Hashing.mp441.47MB
- Doin 3/23 - Attacks on our cryptography.mp457.54MB
- Doin 3/24 - Digital signatures.mp426.78MB
- Doin 3/25 - IPSec and PGP.mp426.88MB
- Doin 3/26 - MAC, HMAC, SSL, and TLS.mp418.24MB
- Doin 3/27 - Physical security part 1.mp458.24MB
- Doin 3/28 - Physical security part 2.mp458.15MB
- Doin 3/29 - Physical security part 3.mp469.35MB
- Doin 3/30 - Site selection.mp469.20MB
- Doin 3/31 - Media storage.mp444.29MB
- Doin 3/32 - Electricity.mp435.83MB
- Doin 3/33 - Fire suppression and hot and cold aisles.mp455.78MB
- Doin 3/34 - Personnel safety.mp422.16MB
- Doin 3/35 - The fire triangle and fire suppression.mp471.93MB
- Doin 3/36 - Domain 3 - What we covered.mp47.26MB
- Doin 4/01 - Introduction.mp48.12MB
- Doin 4/02 - Why should you want to get the CISSP certification.mp429.24MB
- Doin 4/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp446.50MB
- Doin 4/04 - Links, important ics and where to focus on my slides.mp48.48MB
- Doin 4/05 - Domain 4 - What we will be covering.mp48.00MB
- Doin 4/06 - Networking basics and definitions.mp459.79MB
- Doin 4/07 - The OSI model.mp484.84MB
- Doin 4/08 - The TCP-IP model.mp435.70MB
- Doin 4/09 - IP addresses and port numbers part 1.mp473.17MB
- Doin 4/10 - IP addresses and port numbers part 2.mp486.07MB
- Doin 4/11 - IP support protocols.mp4102.49MB
- Doin 4/12 - Cable types.mp466.96MB
- Doin 4/13 - LAN ologies.mp454.39MB
- Doin 4/14 - WAN protocols.mp441.74MB
- Doin 4/15 - SAN and VoIP protocols.mp440.48MB
- Doin 4/16 - WIFI.mp484.31MB
- Doin 4/17 - Bluetooth.mp421.29MB
- Doin 4/18 - Layer 1 to 3 networking devices.mp449.49MB
- Doin 4/19 - Layer 3 routing protocols.mp455.11MB
- Doin 4/20 - Firewalls.mp466.33MB
- Doin 4/21 - Modems.mp425.55MB
- Doin 4/22 - Network authentication protocols.mp458.25MB
- Doin 4/23 - Secure communications.mp4103.56MB
- Doin 4/24 - What we covered in Domain 4.mp47.30MB
- Doin 5/01 - Introduction.mp48.12MB
- Doin 5/02 - Why should you want to get the CISSP certification.mp429.24MB
- Doin 5/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp446.49MB
- Doin 5/04 - Links, important ics and where to focus on my slides.mp48.47MB
- Doin 5/05 - Domain 5 - What we will be covering.mp46.67MB
- Doin 5/06 - Introduction to Access Control.mp424.36MB
- Doin 5/07 - Type 1 authentication - 'Something you know' or 'Knowledge factors'.mp456.93MB
- Doin 5/08 - Type 2 authentication - 'Something you he' or 'Possession factors'.mp438.66MB
- Doin 5/09 - Type 3 authentication - 'Something you are' or 'Biometrics'.mp444.85MB
- Doin 5/10 - Authorization.mp452.32MB
- Doin 5/11 - Accountability.mp46.98MB
- Doin 5/12 - Access control systems.mp427.02MB
- Doin 5/13 - Identity and access provisioning.mp441.94MB
- Doin 5/14 - Authentication protocols.mp472.22MB
- Doin 5/15 - What we covered in Domain 5.mp46.26MB
- Doin 6/01 - Introduction.mp48.12MB
- Doin 6/02 - Why should you want to get the CISSP certification.mp429.23MB
- Doin 6/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp446.50MB
- Doin 6/04 - Links, important ics and where to focus on my slides.mp48.47MB
- Doin 6/05 - Domain 6 - What we will be covering.mp412.09MB
- Doin 6/06 - Domain 6 key concepts.mp46.32MB
- Doin 6/07 - Security Assesents.mp414.91MB
- Doin 6/08 - Security Audits.mp420.45MB
- Doin 6/09 - Security Audit Logs.mp426.71MB
- Doin 6/10 - Vulnerability scanners.mp411.96MB
- Doin 6/11 - Penetration testing.mp444.53MB
- Doin 6/12 - Social Engineering attacks.mp431.86MB
- Doin 6/13 - Penetration testing tools.mp424.73MB
- Doin 6/14 - Software testing.mp467.54MB
- Doin 6/15 - What we covered in Domain 6.mp48.25MB
- Doin 7/01 - Introduction.mp48.12MB
- Doin 7/02 - Why should you want to get the CISSP certification.mp429.23MB
- Doin 7/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp446.49MB
- Doin 7/04 - Links, important ics and where to focus on my slides.mp48.48MB
- Doin 7/05 - Domain 7 - What we will be covering.mp49.39MB
- Doin 7/06 - Domain 7 key concepts.mp427.71MB
- Doin 7/07 - Administrative personnel controls.mp441.65MB
- Doin 7/08 - Digital forensics.mp441.10MB
- Doin 7/09 - Spinning disk forensics.mp417.06MB
- Doin 7/10 - Network and Software forensics.mp434.29MB
- Doin 7/11 - Incident Management definitions.mp436.39MB
- Doin 7/12 - Incident Management.mp485.20MB
- Doin 7/13 - Intrusion detection and prevention systems.mp456.70MB
- Doin 7/14 - SIEM (Security Information and Event Management).mp413.22MB
- Doin 7/15 - Application white-listing.mp415.08MB
- Doin 7/16 - Honeynets and Honeypots.mp416.82MB
- Doin 7/17 - Configuration Management.mp417.55MB
- Doin 7/18 - Patch Management.mp433.73MB
- Doin 7/19 - Change management.mp429.58MB
- Doin 7/20 - 0-day attacks.mp428.52MB
- Doin 7/21 - Backups.mp454.38MB
- Doin 7/22 - RAID (Redundant Array of Independent Disks).mp428.89MB
- Doin 7/23 - Redundancy.mp448.17MB
- Doin 7/24 - BCP and DRP.mp484.85MB
- Doin 7/25 - Warfare, terrori, sabotage, and ransomware.mp433.54MB
- Doin 7/26 - Personnel.mp418.54MB
- Doin 7/27 - DRP basics.mp430.62MB
- Doin 7/28 - Developing our BCP and DRP.mp462.11MB
- Doin 7/29 - BIA (Business Impact Analysis).mp435.60MB
- Doin 7/30 - Supply and infrastructure redundancy.mp413.95MB
- Doin 7/31 - Disaster Recovery sites.mp442.92MB
- Doin 7/32 - Other BCP sub plans.mp451.74MB
- Doin 7/33 - Employee redundancy.mp450.97MB
- Doin 7/34 - Testing the plans.mp468.55MB
- Doin 7/35 - After a disruption.mp439.69MB
- Doin 7/36 - What we covered in Domain 7.mp420.35MB
- Doin 8/01 - Introduction.mp410.39MB
- Doin 8/02 - Why should you want to get the CISSP certification.mp429.24MB
- Doin 8/03 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp446.49MB
- Doin 8/04 - Links, important ics and where to focus on my slides.mp48.48MB
- Doin 8/05 - Domain 8 - What we will be covering.mp416.25MB
- Doin 8/06 - Designing security into our software.mp422.00MB
- Doin 8/07 - Programming concepts.mp470.20MB
- Doin 8/08 - Software development methodologies part 1.mp494.08MB
- Doin 8/09 - Software development methodologies part 2.mp486.56MB
- Doin 8/10 - Databases part 1.mp489.32MB
- Doin 8/11 - Databases part 2.mp476.23MB
- Doin 8/12 - OWASP part 1.mp454.81MB
- Doin 8/13 - OWASP part 2.mp460.64MB
- Doin 8/14 - Software vulnerabilities and Attacks.mp435.97MB
- Doin 8/15 - Capability Maturity Model (CMM).mp441.09MB
- Doin 8/16 - Buying software from other companies.mp454.81MB
- Doin 8/17 - Artificial intelligence (AI).mp432.41MB
- Doin 8/18 - What we covered in Domain 8.mp45.64MB
- CreateTime2023-12-20
- UpdateTime2023-12-20
- FileTotalCount173
- TotalSize12.89GBHotTimes5ViewTimes10DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.GUR-010 2.NCGB-001 3.KWBD-073 4.KK-037 5.HITMA-147 6.MBOX-34 7.DVH-587 8.RKI-179 9.KWBD-009 10.BNDV-00563 11.ACCE-1045 12.OKAS-080 13.MIGD-476 14.GAR-358 15.MIRD-125 16.OHIS-39 17.MA-239 18.URSP-002 19.TN-03 20.M-870 21.RMD-789 22.HFD-047 23.JDL-16 24.KTDS-714 25.RJT-009 26.CYCD-01 27.MKCK-121 28.HITL-301 29.TOMN-065 30.QIZZX-003 31.TOMN-084 32.MIAE-059 33.GOKU-052 34.GIRO-53 35.YSAD-024 36.RBB-132 37.SQTE-236 38.EMLB-006 39.AVS-022 40.HOKS-021 41.SHIC-118 42.SHMO-144 43.TIKB-063 44.010 45.001 46.073 47.037 48.147 49.34 50.587 51.179 52.009 53.00563 54.1045 55.080 56.476 57.358 58.125 59.39 60.239 61.002 62.03 63.870 64.789 65.047 66.16 67.714 68.009 69.01 70.121 71.301 72.065 73.003 74.084 75.059 76.052 77.53 78.024 79.132 80.236 81.006 82.022 83.021 84.118 85.144 86.063