zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Pluralsight - CompTIA Security Plus SY0-401 Application Data and Host Security
magnet:?xt=urn:btih:49c4038b9166808a6a3e6b8bdd495c1628eb9021&dn=Pluralsight - CompTIA Security Plus SY0-401 Application Data and Host Security
磁力链接详情
文件列表详情
49c4038b9166808a6a3e6b8bdd495c1628eb9021
infohash:
43
文件数量
353.9 MB
文件大小
2017-2-6 05:17
创建日期
2024-11-20 00:40
最后访问
相关分词
Pluralsight
-
CompTIA
Security
Plus
SY0-401
Application
Data
and
Host
Security
01 Application Security Controls and Techniques/01 01 Fuzzing.mp4 11.95 MB
01 Application Security Controls and Techniques/01 02 Kali Linux and Pen Testing Tools.mp4 6.8 MB
01 Application Security Controls and Techniques/01 03 Secure Coding Concepts.mp4 14.59 MB
01 Application Security Controls and Techniques/01 04 Cross Site Scripting (XSS) and Cross Site Request Forgery (XSRF).mp4 16.88 MB
01 Application Security Controls and Techniques/01 05 Application Baseline Configuration and Application Hardening.mp4 9.63 MB
01 Application Security Controls and Techniques/01 06 Multi-tiered Approach and Application Patching.mp4 7.82 MB
01 Application Security Controls and Techniques/01 07 SQL vs. NoSQL Databases.mp4 12.39 MB
01 Application Security Controls and Techniques/01 08 Server-side vs. Client-side Validation.mp4 4.08 MB
02 Mobile Security Concepts and Technologies/02 01 Device Security.mp4 24.05 MB
02 Mobile Security Concepts and Technologies/02 02 Key Credential Management and Authentication.mp4 9.11 MB
02 Mobile Security Concepts and Technologies/02 03 Geo-tagging.mp4 3.96 MB
02 Mobile Security Concepts and Technologies/02 04 Transitive Trusts.mp4 5.32 MB
02 Mobile Security Concepts and Technologies/02 05 BYOD Concerns.mp4 15.19 MB
03 Establishing Host Security/03 01 Module Overview.mp4 5.73 MB
03 Establishing Host Security/03 02 Operating System Security and Settings.mp4 6.19 MB
03 Establishing Host Security/03 03 OS Hardening.mp4 2.85 MB
03 Establishing Host Security/03 04 Patch Management.mp4 3.14 MB
03 Establishing Host Security/03 05 White Listing and Black Listing Applications.mp4 3.16 MB
03 Establishing Host Security/03 06 Trusted OS.mp4 9.28 MB
03 Establishing Host Security/03 07 Host Based Firewalls.mp4 6.25 MB
03 Establishing Host Security/03 08 Host Based Intrusion Detection.mp4 6.01 MB
03 Establishing Host Security/03 09 Hardware Security.mp4 3.13 MB
03 Establishing Host Security/03 10 Host Software Baselining and Virtualization.mp4 26.28 MB
04 Appropriate Controls to Ensure Data Security/04 01 Module Overview.mp4 2.33 MB
04 Appropriate Controls to Ensure Data Security/04 02 Cloud Storage.mp4 6.07 MB
04 Appropriate Controls to Ensure Data Security/04 03 Storage Area Networks (SAN).mp4 11.56 MB
04 Appropriate Controls to Ensure Data Security/04 04 Data Encryption.mp4 13.66 MB
04 Appropriate Controls to Ensure Data Security/04 05 Hardware Based Encryption.mp4 8.14 MB
04 Appropriate Controls to Ensure Data Security/04 06 Types of Data to Secure.mp4 3.49 MB
04 Appropriate Controls to Ensure Data Security/04 07 Permissions _ ACLs.mp4 1.78 MB
04 Appropriate Controls to Ensure Data Security/04 08 Data Policies.mp4 14.28 MB
05 Mitigate Security Risks in Static Environments/05 01 Module Overview.mp4 3.03 MB
05 Mitigate Security Risks in Static Environments/05 02 SCADA Systems.mp4 22.1 MB
05 Mitigate Security Risks in Static Environments/05 03 Embedded Systems, Printers, Smart TVs, and HVAC.mp4 7.63 MB
05 Mitigate Security Risks in Static Environments/05 04 Mobile Operating Systems.mp4 7.26 MB
05 Mitigate Security Risks in Static Environments/05 05 Mainframes.mp4 4.26 MB
05 Mitigate Security Risks in Static Environments/05 06 Game Consoles.mp4 4.4 MB
05 Mitigate Security Risks in Static Environments/05 07 In-vehicle Computing Systems.mp4 5.2 MB
05 Mitigate Security Risks in Static Environments/05 08 Network Segmentation.mp4 7.37 MB
05 Mitigate Security Risks in Static Environments/05 09 Security Layers and Manual Updates.mp4 7.46 MB
05 Mitigate Security Risks in Static Environments/05 10 Firmware Version Control.mp4 5.53 MB
05 Mitigate Security Risks in Static Environments/05 11 Wrappers, Control Redundancy, and Diversity.mp4 3.82 MB
05 Mitigate Security Risks in Static Environments/05 12 Module Review.mp4 803.95 KB
其他位置