搜索
Udemy - CISSP Domain 1 Security and Risk Management - Learn 2024 2024-4
磁力链接/BT种子名称
Udemy - CISSP Domain 1 Security and Risk Management - Learn 2024 2024-4
磁力链接/BT种子简介
种子哈希:
41e6147fd1985d4dd4de8b91a2a3811316a9907e
文件大小:
3.25G
已经下载:
1132
次
下载速度:
极快
收录时间:
2025-02-07
最近下载:
2026-01-13
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:41E6147FD1985D4DD4DE8B91A2A3811316A9907E
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
小蓝俱乐部
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
母狗园
51动漫
91短视频
抖音Max
海王TV
TikTok成人版
PornHub
暗网Xvideo
草榴社区
哆哔涩漫
呦乐园
萝莉岛
搜同
91暗网
最近搜索
easeus
苏善悦
ぶんコス+
ebwh
01.16.23.
sin的礼品盒
nilou
安徽鬼父
mj
spellforce
双飞两位小姐
jsph69.mkv
melody+marks+-+hard+
21.07.25+cory
11歲
晴一夏夏
无码流出
jufe-399
みれ美香
聊斋之惊艳
roxana
julyjailbait
小雯宝宝
秋元
沼よしのぶ
ai换脸
베트남
偷情
1042868
huge boobs anal
文件列表
4. Compliance/5. U.S. Information Privacy Law.mp4
71.2 MB
2. Security Concepts/1. Introduction Security Concepts.mp4
68.9 MB
1. Introduction/1. Introduction Course Overview.mp4
62.6 MB
11. Acquisition Strategy and Practice/10. Outsourcing.mp4
62.1 MB
2. Security Concepts/3. The Five Pillars of Security.mp4
57.3 MB
9. Risk Response/6. Control Functions and Implementation.mp4
53.8 MB
3. Security Governance Principles/9. Roles and Responsibilities.mp4
53.4 MB
13. Security Awareness and Training/5. Training.mp4
51.0 MB
12. Personnel Security Policies/5. Employment Agreements and Policies.mp4
50.8 MB
7. Risk Management/7. Asset Identification and Valuation.mp4
50.5 MB
13. Security Awareness and Training/1. Introduction Security Awareness and Training.mp4
50.0 MB
8. Threat Modeling/1. Introduction Threat Modeling.mp4
45.9 MB
9. Risk Response/5. Control Selection Criteria (Framework and Types).mp4
45.6 MB
6. Security Documentation/1. Introduction Security Documentation.mp4
44.4 MB
2. Security Concepts/9. Common Security Terms.mp4
41.8 MB
13. Security Awareness and Training/6. Security Fatigue and Champion.mp4
41.4 MB
13. Security Awareness and Training/3. Training Security and Methodology.mp4
40.8 MB
7. Risk Management/10. Risk Assessment Methodology.mp4
40.3 MB
11. Acquisition Strategy and Practice/6. Hardware, Software and Service Acquisition.mp4
39.9 MB
4. Compliance/15. Industry Standards.mp4
39.0 MB
10. Business Continuity Plan Fundamentals/2. BCP (Business Continuity Planning) and Content.mp4
37.3 MB
8. Threat Modeling/6. Malware Types.mp4
35.9 MB
8. Threat Modeling/5. Virus Types.mp4
35.5 MB
8. Threat Modeling/4. Threat Types.mp4
35.3 MB
12. Personnel Security Policies/7. Contractors.mp4
34.9 MB
8. Threat Modeling/11. Summary Implementing Threat Modeling.mp4
34.8 MB
11. Acquisition Strategy and Practice/1. Introduction Acquisition Strategy and Practice.mp4
34.6 MB
3. Security Governance Principles/8. The Organizational Culture's Impact on Security.mp4
34.2 MB
13. Security Awareness and Training/8. Summary Developing Security Awareness and Training.mp4
34.1 MB
10. Business Continuity Plan Fundamentals/21. Summary Applying BCP Fundamentals.mp4
32.8 MB
4. Compliance/16. Summary Supporting Compliance.mp4
32.3 MB
3. Security Governance Principles/1. Introduction Security Governance Principles.mp4
31.9 MB
3. Security Governance Principles/11. CISO (Chief Information Security Officer) Responsibilities.mp4
31.8 MB
3. Security Governance Principles/14. Security Reporting Options.mp4
31.4 MB
3. Security Governance Principles/3. Governance Requirements.mp4
31.2 MB
12. Personnel Security Policies/3. Job.mp4
30.9 MB
4. Compliance/13. Trans-Border Data Flow (TBDF).mp4
30.8 MB
8. Threat Modeling/3. Threat Models.mp4
30.8 MB
4. Compliance/1. Introduction Compliance.mp4
30.8 MB
3. Security Governance Principles/4. Due Care and Due Diligence.mp4
30.6 MB
7. Risk Management/1. Introduction Risk Management.mp4
30.5 MB
7. Risk Management/8. Vulnerability Areas.mp4
30.4 MB
12. Personnel Security Policies/1. Introduction Personnel Security Policies.mp4
29.5 MB
3. Security Governance Principles/15. Summary Security Governance Principles.mp4
29.1 MB
3. Security Governance Principles/10. CISO (Chief Information Security Officer) Role.mp4
29.1 MB
7. Risk Management/12. Qualitative and Quantitative Assessments.mp4
28.9 MB
5. Professional Ethics/1. Introduction Professional Ethics.mp4
28.4 MB
10. Business Continuity Plan Fundamentals/4. Business Continuity Plan (BCP) Project Management.mp4
28.3 MB
11. Acquisition Strategy and Practice/14. SBOM (Software Bill of Materials).mp4
27.7 MB
10. Business Continuity Plan Fundamentals/12. External Dependencies.mp4
27.6 MB
10. Business Continuity Plan Fundamentals/8. Project Initiation and Scope.mp4
27.4 MB
9. Risk Response/10. Summary Risk Response.mp4
26.5 MB
10. Business Continuity Plan Fundamentals/7. BCP Team Responsibilities.mp4
26.4 MB
10. Business Continuity Plan Fundamentals/18. Business Plan Testing.mp4
26.1 MB
4. Compliance/9. U.S. Computer Crime Law.mp4
26.1 MB
7. Risk Management/16. Summary Implementing Risk Management.mp4
25.2 MB
13. Security Awareness and Training/7. Gamification.mp4
24.7 MB
6. Security Documentation/2. The Value of Security Documentation and Types.mp4
24.7 MB
3. Security Governance Principles/12. Organizational Processes.mp4
23.5 MB
3. Security Governance Principles/6. IT Governance Committee.mp4
23.0 MB
1. Introduction/2. Domain 1 Introduction Security and Risk Management.mp4
22.2 MB
10. Business Continuity Plan Fundamentals/10. Business Organization Analysis.mp4
21.5 MB
11. Acquisition Strategy and Practice/13. PUF (Physical Unclonable Function).mp4
21.3 MB
3. Security Governance Principles/2. Security Governance.mp4
21.2 MB
6. Security Documentation/3. Security Policy Objectives and Types.mp4
21.2 MB
10. Business Continuity Plan Fundamentals/1. Introduction Business Continuity Plan Fundamentals.mp4
20.9 MB
7. Risk Management/6. The Risk Analysis Process.mp4
20.6 MB
4. Compliance/10. Data Breach.mp4
20.2 MB
4. Compliance/3. CISSP Legislative and Regulatory Compliance.mp4
20.1 MB
11. Acquisition Strategy and Practice/12. Chain of Trust.mp4
20.0 MB
12. Personnel Security Policies/8. Summary Drafting Personnel Security Policies.mp4
19.2 MB
11. Acquisition Strategy and Practice/2. Supply Chain Risks.mp4
19.2 MB
2. Security Concepts/5. Integration Terms.mp4
19.0 MB
4. Compliance/11. Intellectual Property Law and Licensing.mp4
19.0 MB
5. Professional Ethics/3. The Organizational Ethics.mp4
18.9 MB
11. Acquisition Strategy and Practice/11. Third-Party Assessment.mp4
18.6 MB
7. Risk Management/14. Risk Management Frameworks.mp4
18.5 MB
10. Business Continuity Plan Fundamentals/17. Business Plan Evaluation.mp4
18.4 MB
7. Risk Management/15. Risk Maturity Model (RMM).mp4
18.1 MB
7. Risk Management/9. Identify Threats.mp4
17.9 MB
9. Risk Response/4. Risk Treatment.mp4
17.7 MB
12. Personnel Security Policies/6. Termination.mp4
17.6 MB
11. Acquisition Strategy and Practice/9. Business Documents.mp4
17.5 MB
3. Security Governance Principles/5. Security Goal Categories.mp4
17.4 MB
2. Security Concepts/2. The CIA Triad.mp4
17.2 MB
2. Security Concepts/7. Authenticity Terms.mp4
17.1 MB
9. Risk Response/3. Responses to Risks.mp4
17.1 MB
10. Business Continuity Plan Fundamentals/3. Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP).mp4
17.1 MB
4. Compliance/12. License Types.mp4
16.7 MB
10. Business Continuity Plan Fundamentals/14. Impact of Financial Loss.mp4
16.7 MB
5. Professional Ethics/10. Summary Upholding Professional Ethics in Security.mp4
16.4 MB
10. Business Continuity Plan Fundamentals/16. Reduced Operational.mp4
16.4 MB
2. Security Concepts/10. Security Concepts Best Practices for Application.mp4
16.1 MB
11. Acquisition Strategy and Practice/8. Service Level Agreement (SLA).mp4
16.0 MB
12. Personnel Security Policies/2. Personnel Security.mp4
15.9 MB
3. Security Governance Principles/13. Communications.mp4
15.8 MB
11. Acquisition Strategy and Practice/5. Acquisition Strategy.mp4
15.2 MB
10. Business Continuity Plan Fundamentals/9. NIST SP 800-34.mp4
15.2 MB
4. Compliance/14. CISSP Import and Export Controls.mp4
15.2 MB
2. Security Concepts/4. Confidentiality Terms.mp4
15.0 MB
8. Threat Modeling/7. Reduction Analysis.mp4
15.0 MB
4. Compliance/6. International Privacy Law.mp4
14.8 MB
6. Security Documentation/5. Summary Drafting Security Documentation.mp4
14.7 MB
2. Security Concepts/8. Non-repudiation Terms.mp4
14.2 MB
7. Risk Management/11. Risk Assessment Determination Factors.mp4
14.2 MB
8. Threat Modeling/2. Threat Modeling Process.mp4
14.2 MB
8. Threat Modeling/9. Diagramming Attacks.mp4
13.9 MB
10. Business Continuity Plan Fundamentals/15. MTD ( Maximum Tolerable Downtime).mp4
13.9 MB
2. Security Concepts/6. Availability Terms.mp4
13.8 MB
10. Business Continuity Plan Fundamentals/20. BCP Implementation During a Disaster.mp4
13.7 MB
10. Business Continuity Plan Fundamentals/13. Critical Business Processes.mp4
13.6 MB
9. Risk Response/8. Monitoring and Measuring.mp4
13.6 MB
11. Acquisition Strategy and Practice/15. Summary Acquisition Strategy and Practice.mp4
13.5 MB
9. Risk Response/2. Threat Remediation.mp4
13.4 MB
9. Risk Response/9. Continuous Improvement.mp4
13.4 MB
11. Acquisition Strategy and Practice/3. Supply Chain Risk Management.mp4
13.4 MB
14. Conclusion/1. Summary Domain 1.mp4
13.4 MB
11. Acquisition Strategy and Practice/4. Acquisition Security Requirements.mp4
13.3 MB
13. Security Awareness and Training/2. Security Awareness.mp4
13.3 MB
7. Risk Management/5. Results of Improper Risk Management.mp4
13.2 MB
10. Business Continuity Plan Fundamentals/5. Advisory Committee-BCP Team.mp4
13.1 MB
8. Threat Modeling/8. Threat Agents.mp4
13.0 MB
12. Personnel Security Policies/4. Onboarding and Transfers.mp4
12.9 MB
4. Compliance/7. EU GDPR.mp4
12.9 MB
9. Risk Response/1. Introduction Risk Response.mp4
12.8 MB
8. Threat Modeling/10. Rating Threat Impact (DREAD) aka. DREAD Model.mp4
12.7 MB
10. Business Continuity Plan Fundamentals/11. BIA (Business Impact Analysis).mp4
12.4 MB
10. Business Continuity Plan Fundamentals/6. BCP Program Coordinators.mp4
11.8 MB
13. Security Awareness and Training/4. Appropriate Levels.mp4
11.7 MB
11. Acquisition Strategy and Practice/7. Security Questions to Ask Before Acquisition.mp4
11.1 MB
7. Risk Management/4. Integrating Governance, Compliance, and Risk Management.mp4
10.6 MB
5. Professional Ethics/4. Regulatory Requirements for Ethics Programs.mp4
10.5 MB
5. Professional Ethics/9. Code of Ethics.mp4
10.4 MB
4. Compliance/8. Computer Crime.mp4
10.1 MB
3. Security Governance Principles/7. Organizational Governance Structure.mp4
9.7 MB
5. Professional Ethics/8. Ethical Minefields for Security Professionals.mp4
9.4 MB
6. Security Documentation/4. The Relationship Between Security Document Types.mp4
9.3 MB
9. Risk Response/7. Residual Risk.mp4
9.2 MB
4. Compliance/2. Compliance.mp4
9.1 MB
5. Professional Ethics/5. Ethics Issues in a Computing Environment.mp4
8.6 MB
5. Professional Ethics/2. The Purpose of Ethics.mp4
8.5 MB
7. Risk Management/13. Risk Prioritization.mp4
8.4 MB
5. Professional Ethics/7. Internet Architecture Board Ethics (IAB).mp4
8.4 MB
4. Compliance/4. Privacy Issues and Personally Identifiable Information (PII).mp4
8.1 MB
7. Risk Management/3. Risk Management.mp4
7.1 MB
10. Business Continuity Plan Fundamentals/19. Business Plan Maintenance.mp4
6.8 MB
7. Risk Management/2. What is Risk.mp4
6.7 MB
4. Compliance/17. Lab Discussing Compliance.html
7.0 kB
10. Business Continuity Plan Fundamentals/22. Lab Discussing Business Continuity Plan Fundamentals.html
5.7 kB
11. Acquisition Strategy and Practice/16. Lab Discussing Acquisition Strategy and Practice.html
5.7 kB
7. Risk Management/18. Template Risk Management Documentation Template.html
5.2 kB
8. Threat Modeling/12. Lab Discussing Threat Modeling.html
5.1 kB
5. Professional Ethics/6. Common Computer Ethics Fallacies.mp4
4.5 kB
2. Security Concepts/11. Lab Discussing Security Concepts.html
4.5 kB
3. Security Governance Principles/17. Template Security Governance Principles.html
4.4 kB
10. Business Continuity Plan Fundamentals/23. Template Business Continuity Plan Fundamentals.html
4.4 kB
7. Risk Management/17. Lab Discussing Risk Management.html
4.3 kB
5. Professional Ethics/11. Lab Discussing Professional Ethics in Security.html
4.1 kB
3. Security Governance Principles/16. Lab Discussing Security Governance Principles.html
4.1 kB
8. Threat Modeling/13. Template Threat Modeling Documentation.html
4.0 kB
12. Personnel Security Policies/9. Lab Discussing Personnel Security Policies.html
3.9 kB
6. Security Documentation/7. Template Security Documentation.html
3.9 kB
9. Risk Response/11. Lab Discussing Risk Response.html
3.8 kB
11. Acquisition Strategy and Practice/17. Template Acquisition Strategy and Practice.html
3.6 kB
4. Compliance/18. Template CISSP Compliance Documentation Template.html
3.4 kB
5. Professional Ethics/12. Template CISSP Professional Ethics Documentation.html
3.1 kB
6. Security Documentation/6. Lab Discussing Security Documentation.html
3.1 kB
2. Security Concepts/12. Template Security Concepts Documentation Template.html
2.5 kB
9. Risk Response/12. Template Risk Response Documentation.html
2.2 kB
Read me.txt
142 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!