搜索
[ WebToolTip.com ] Udemy - Data Security Fundamentals
磁力链接/BT种子名称
[ WebToolTip.com ] Udemy - Data Security Fundamentals
磁力链接/BT种子简介
种子哈希:
5263fffc5ebd40aaa1b08fe8abf674bd9d0ca8ee
文件大小:
1.67G
已经下载:
745
次
下载速度:
极快
收录时间:
2025-06-20
最近下载:
2025-12-20
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:5263FFFC5EBD40AAA1B08FE8ABF674BD9D0CA8EE
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
小蓝俱乐部
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
母狗园
51动漫
91短视频
抖音Max
海王TV
TikTok成人版
PornHub
暗网Xvideo
草榴社区
哆哔涩漫
呦乐园
萝莉岛
搜同
91暗网
最近搜索
raping+colection
snos008
blacked
丝塞逼
假装打电话偷拍
诊所不同年龄段女人检查阴道
sivr-405
【momo】
vika cowboy
stacy cruz ultrafilms 07.11.2022
山东潍坊语文老师李怡甜出轨
城堡的诅咒
daidai-77
包养
爱弓凉
父亲调教老婆
john wick collection
说好的不内射
rhj-256
fc2-ppv-4440151
七仔300020
探花
91渣男、筷子腿模特
土豪重金定制,极品身材女大学生,宿舍拉上帘,骚的一批
九头身网袜长美腿+能把内衣爆开的爆
tiny
水手制服短裙美女街上瞎逛
bban-529
asterix+2002
midv699
文件列表
~Get Your Files Here !/1 - Introduction/2 -Data Security Masterclass.pdf
76.4 MB
~Get Your Files Here !/10 - Security Operations & Incident Response/6 -Data Disaster Recovery.mp4
63.4 MB
~Get Your Files Here !/2 - Data Security Foundations/2 -Importance of Data Protection - real examples.mp4
53.5 MB
~Get Your Files Here !/9 - Data Loss Prevention/2 -Key Components of a DLP Solution.mp4
51.7 MB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/3 -Data Security Risk Register.mp4
51.1 MB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/1 -Data Security Policy.mp4
49.1 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/13 -AI-based Attacks.mp4
45.0 MB
~Get Your Files Here !/10 - Security Operations & Incident Response/4 -Digital Forensics Fundamentals.mp4
38.3 MB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/2 -Data Classification Policy.mp4
37.1 MB
~Get Your Files Here !/11 - Human Factors & Security Culture/4 -Creating a Security-Aware Culture.mp4
36.7 MB
~Get Your Files Here !/10 - Security Operations & Incident Response/3 -Incident Response Planning.mp4
32.5 MB
~Get Your Files Here !/2 - Data Security Foundations/5 -Data states at rest, in transit, in processing.mp4
32.2 MB
~Get Your Files Here !/5 - PRACTICE Data Security Tasks/2 -Solution Classify different types of organizational data.mp4
31.2 MB
~Get Your Files Here !/11 - Human Factors & Security Culture/3 -Measuring Security Awareness.mp4
29.6 MB
~Get Your Files Here !/9 - Data Loss Prevention/3 -Data Loss Prevention Policy - template included for download.mp4
29.1 MB
~Get Your Files Here !/1 - Introduction/1 -Introduction.mp4
28.8 MB
~Get Your Files Here !/13 - Data Security Standards/1 -Intro to Data Security Standards.mp4
28.5 MB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/4 -Data Retention Policy.mp4
28.1 MB
~Get Your Files Here !/10 - Security Operations & Incident Response/5 -Business Continuity.mp4
28.1 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/3 -Malware.mp4
27.4 MB
~Get Your Files Here !/7 - Identity and Access Management/5 -Privileged Access Management (PAM).mp4
26.9 MB
~Get Your Files Here !/11 - Human Factors & Security Culture/2 -Developing Security Awareness Programs.mp4
25.7 MB
~Get Your Files Here !/6 - Cryptography Fundamentals/1 -Principles of Cryptography.mp4
24.6 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/10 -Denial of Service (DoS) & Distributed DoS (DDoS) Attacks.mp4
24.3 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/8 -Data Leakage & Accidental Exposure.mp4
24.0 MB
~Get Your Files Here !/10 - Security Operations & Incident Response/1 -Security Monitoring and Logging.mp4
23.5 MB
~Get Your Files Here !/13 - Data Security Standards/5 -SOC 2 (Service Organization Control 2).mp4
23.4 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/1 -Phishing.mp4
23.2 MB
~Get Your Files Here !/6 - Cryptography Fundamentals/2 -Symmetric Encryption.mp4
22.9 MB
~Get Your Files Here !/12 - Staying compliant with leading data security regulations/3 -California Consumer Privacy Act (CCPA) & California Privacy Rights Act (CPRA).mp4
22.8 MB
~Get Your Files Here !/10 - Security Operations & Incident Response/2 -Incident Detection.mp4
22.5 MB
~Get Your Files Here !/12 - Staying compliant with leading data security regulations/5 -Regional and Sector-Specific Laws.mp4
22.2 MB
~Get Your Files Here !/13 - Data Security Standards/2 -ISOIEC 27001.mp4
22.2 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/2 -Phishing email example identifying a phishing email.mp4
21.8 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/4 -Ransomware.mp4
21.0 MB
~Get Your Files Here !/2 - Data Security Foundations/1 -What is Data Security.mp4
20.9 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/14 -Zero-Day Vulnerabilities.mp4
20.5 MB
~Get Your Files Here !/12 - Staying compliant with leading data security regulations/1 -General Data Protection Regulation (GDPR).mp4
20.3 MB
~Get Your Files Here !/7 - Identity and Access Management/2 -IAM Principles.mp4
20.2 MB
~Get Your Files Here !/14 - Data Security Certifications/1 -Which Data Security Certification to pursue - how to choose.mp4
19.9 MB
~Get Your Files Here !/5 - PRACTICE Data Security Tasks/1 -Exercise Classify different types of organizational data.mp4
19.7 MB
~Get Your Files Here !/2 - Data Security Foundations/4 -The CIA Triad Confidentiality, Integrity and Availability.mp4
19.4 MB
~Get Your Files Here !/7 - Identity and Access Management/1 -What is Identity and Access Management (IAM).mp4
19.3 MB
~Get Your Files Here !/2 - Data Security Foundations/3 -Types of sensitive data to be protected.mp4
18.3 MB
~Get Your Files Here !/8 - Secure Software Development/5 -DevSecOps Principles.mp4
18.2 MB
~Get Your Files Here !/6 - Cryptography Fundamentals/3 -Hands-On exercise Let's do symmetric encryption on a message.mp4
18.1 MB
~Get Your Files Here !/7 - Identity and Access Management/4 -Authorization and Access Control Models.mp4
18.1 MB
~Get Your Files Here !/11 - Human Factors & Security Culture/1 -Social Engineering Attacks.mp4
17.3 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/11 -Insecure APIs & Third-party integrations.mp4
17.1 MB
~Get Your Files Here !/6 - Cryptography Fundamentals/5 -Hands-On exercise Let's do asymmetric encryption on a message.mp4
16.8 MB
~Get Your Files Here !/9 - Data Loss Prevention/4 -Types of DLP and Implementation Considerations.mp4
16.6 MB
~Get Your Files Here !/8 - Secure Software Development/2 -Secure Coding Principles.mp4
16.5 MB
~Get Your Files Here !/6 - Cryptography Fundamentals/6 -Hashing for Data Integrity.mp4
16.4 MB
~Get Your Files Here !/8 - Secure Software Development/1 -Security in the SDLC.mp4
15.3 MB
~Get Your Files Here !/6 - Cryptography Fundamentals/4 -Asymmetric Encryption.mp4
14.8 MB
~Get Your Files Here !/9 - Data Loss Prevention/1 -Introduction to Data Loss Prevention (DLP).mp4
14.7 MB
~Get Your Files Here !/13 - Data Security Standards/4 -Payment Card Industry Data Security Standard (PCI DSS).mp4
14.4 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/5 -Insider Threats.mp4
13.8 MB
~Get Your Files Here !/12 - Staying compliant with leading data security regulations/4 -India’s Digital Personal Data Protection Act (DPDP).mp4
13.5 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/6 -Weak Passwords & Credential Theft.mp4
13.3 MB
~Get Your Files Here !/6 - Cryptography Fundamentals/7 -Hands-On exercise Let's hash a password.mp4
13.2 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/9 -Man-in-the-Middle (MitM) Attacks.mp4
12.9 MB
~Get Your Files Here !/7 - Identity and Access Management/3 -Authentication Methods.mp4
12.6 MB
~Get Your Files Here !/14 - Data Security Certifications/2 -Certified Information Systems Security Professional (CISSP).mp4
12.6 MB
~Get Your Files Here !/13 - Data Security Standards/3 -NIST SP 800-53.mp4
12.4 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/12 -Physical Security Breaches.mp4
11.9 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/7 -Unpatched Software Vulnerabilities.mp4
11.6 MB
~Get Your Files Here !/12 - Staying compliant with leading data security regulations/2 -Health Insurance Portability and Accountability Act (HIPAA).mp4
10.5 MB
~Get Your Files Here !/14 - Data Security Certifications/11 -GDPR - Certified Data Protection Officer (CDPO).mp4
10.4 MB
~Get Your Files Here !/14 - Data Security Certifications/7 -Certified Cloud Security Professional (CCSP).mp4
10.2 MB
~Get Your Files Here !/14 - Data Security Certifications/10 -HealthCare Information Security and Privacy Practitioner (HCISPP).mp4
9.9 MB
~Get Your Files Here !/14 - Data Security Certifications/6 -CompTIA Security+.mp4
9.1 MB
~Get Your Files Here !/15 - Course Closure/1 -Next Steps.mp4
8.6 MB
~Get Your Files Here !/14 - Data Security Certifications/9 -Certified Information Privacy Technologist (CIPT).mp4
8.5 MB
~Get Your Files Here !/14 - Data Security Certifications/8 -Offensive Security Certified Professional (OSCP).mp4
8.5 MB
~Get Your Files Here !/1 - Introduction/2 -Download the course materials.mp4
8.4 MB
~Get Your Files Here !/8 - Secure Software Development/3 -API Security Basics.mp4
8.3 MB
~Get Your Files Here !/14 - Data Security Certifications/4 -Certified Information Systems Auditor (CISA).mp4
7.9 MB
~Get Your Files Here !/14 - Data Security Certifications/5 -Certified Ethical Hacker (CEH).mp4
7.7 MB
~Get Your Files Here !/8 - Secure Software Development/4 -Automated Security Testing.mp4
7.7 MB
~Get Your Files Here !/14 - Data Security Certifications/3 -Certified Information Security Manager (CISM).mp4
6.4 MB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/2 -Data Classification Policy.docx
114.7 kB
~Get Your Files Here !/3 - Threats and Vulnerabilities/1 -Phishing Poster - for printing.pdf
65.8 kB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/4 -Data Retention Policy.docx
38.6 kB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/1 -Data Security Policy.docx
31.0 kB
~Get Your Files Here !/9 - Data Loss Prevention/3 -Data Loss Prevention Policy.docx
27.7 kB
~Get Your Files Here !/10 - Security Operations & Incident Response/3 -Incident Response Plan for Data Security.docx
19.5 kB
~Get Your Files Here !/7 - Identity and Access Management/2 -Identity and Access Management.docx
19.0 kB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/3 -Risk Register.xlsx
14.4 kB
~Get Your Files Here !/14 - Data Security Certifications/1 -Data Security Certifications.xlsx
13.4 kB
~Get Your Files Here !/5 - PRACTICE Data Security Tasks/2 -Data Classification Exercise_Solution.xlsx
12.3 kB
~Get Your Files Here !/5 - PRACTICE Data Security Tasks/1 -Data Classification Exercise.xlsx
12.0 kB
~Get Your Files Here !/11 - Human Factors & Security Culture/2 -Security_Awareness_Program_Template.xlsx
10.4 kB
~Get Your Files Here !/15 - Course Closure/2 - Bonus Lecture.html
4.5 kB
Get Bonus Downloads Here.url
180 Bytes
~Get Your Files Here !/8 - Secure Software Development/2 -Secure Coding Principles Checklist.url
134 Bytes
~Get Your Files Here !/13 - Data Security Standards/5 -SOC 2.url
119 Bytes
~Get Your Files Here !/8 - Secure Software Development/4 -Automated Security Testing article.url
101 Bytes
~Get Your Files Here !/6 - Cryptography Fundamentals/6 -Hashing 101.url
89 Bytes
~Get Your Files Here !/7 - Identity and Access Management/5 -Detailed Guide on PAM.url
84 Bytes
~Get Your Files Here !/8 - Secure Software Development/5 -DevSecOps Principles article.url
80 Bytes
~Get Your Files Here !/6 - Cryptography Fundamentals/1 -Cryptography 101.url
79 Bytes
~Get Your Files Here !/6 - Cryptography Fundamentals/4 -IBM guide on Asymmetric Encryption.url
77 Bytes
~Get Your Files Here !/6 - Cryptography Fundamentals/2 -IBM guide on Symmetric Encryption.url
76 Bytes
~Get Your Files Here !/13 - Data Security Standards/3 -NIST SP 800-53.url
73 Bytes
~Get Your Files Here !/13 - Data Security Standards/4 -PCI DSS.url
70 Bytes
~Get Your Files Here !/Bonus Resources.txt
70 Bytes
~Get Your Files Here !/13 - Data Security Standards/2 -ISO 27001.url
69 Bytes
~Get Your Files Here !/3 - Threats and Vulnerabilities/4 -Ransomware article to read with 11 famous examples.url
63 Bytes
~Get Your Files Here !/8 - Secure Software Development/3 -API Security 101 article.url
61 Bytes
~Get Your Files Here !/8 - Secure Software Development/1 -Secure Software Development Lifecycle (SSDLC).url
60 Bytes
~Get Your Files Here !/6 - Cryptography Fundamentals/7 -Hashing tool.url
57 Bytes
~Get Your Files Here !/6 - Cryptography Fundamentals/5 -Asymmetric encryption online tool.url
54 Bytes
~Get Your Files Here !/6 - Cryptography Fundamentals/3 -Online encryption tool.url
50 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!