zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Enterprise Security Policies, Practices, and Procedures
magnet:?xt=urn:btih:af08228a9ba2619935b0e02d98716b64b35b14bd&dn=Enterprise Security Policies, Practices, and Procedures
磁力链接详情
文件列表详情
af08228a9ba2619935b0e02d98716b64b35b14bd
infohash:
37
文件数量
238.19 MB
文件大小
2017-9-20 23:19
创建日期
2024-11-23 12:43
最后访问
相关分词
Enterprise
Security
Policies
Practices
and
Procedures
01. Course Overview/01. Course Overview.mp4 4.07 MB
02. Security Data Analytics What's Going On/01. Series Introductionoverview.mp4 10.57 MB
02. Security Data Analytics What's Going On/02. Module Overview.mp4 1.36 MB
02. Security Data Analytics What's Going On/03. Teaching an Old Dog New Tricks.mp4 15.16 MB
02. Security Data Analytics What's Going On/04. Trend Analysis.mp4 8.65 MB
02. Security Data Analytics What's Going On/05. Data Aggregation and Correlation.mp4 4.69 MB
02. Security Data Analytics What's Going On/06. Historical Analysis.mp4 16.9 MB
02. Security Data Analytics What's Going On/07. Summary.mp4 1.78 MB
03. Defense in Depth This Is Where It Begins/01 Introduction and Overview.mp4 1.34 MB
03. Defense in Depth This Is Where It Begins/02. What Is Defense in Depth.mp4 16.89 MB
03. Defense in Depth This Is Where It Begins/04. Level 2 Processes.mp4 3.54 MB
03. Defense in Depth This Is Where It Begins/05. Level 3 Technologies.mp4 3.45 MB
03. Defense in Depth This Is Where It Begins/06. Level 4 The Network.mp4 3.99 MB
03. Defense in Depth This Is Where It Begins/07. Summary.mp4 2.4 MB
04. Defense in Depth What Tools Can You Use/01. Introduction and Overview.mp4 2.07 MB
04. Defense in Depth What Tools Can You Use/02. Let's Break It Down!.mp4 9.9 MB
04. Defense in Depth What Tools Can You Use/03. IPSHIPS.mp4 13.15 MB
04. Defense in Depth What Tools Can You Use/04. Firewalls Softwarehardware.mp4 4.11 MB
04. Defense in Depth What Tools Can You Use/05. Anti-virusanti-malware.mp4 1.9 MB
04. Defense in Depth What Tools Can You Use/06. EMET.mp4 12.21 MB
04. Defense in Depth What Tools Can You Use/07. Web Proxies & WAFs.mp4 7.59 MB
04. Defense in Depth What Tools Can You Use/08. A New Hope.mp4 13.07 MB
04. Defense in Depth What Tools Can You Use/09. Summary.mp4 2.44 MB
05. Defense in Depth Drill, Test, Rinse, Repeat/01. Introduction and Overview.mp4 1.13 MB
05. Defense in Depth Drill, Test, Rinse, Repeat/02. Why Penetration Tests.mp4 6.61 MB
05. Defense in Depth Drill, Test, Rinse, Repeat/03. Rules Are Rules.mp4 9.95 MB
05. Defense in Depth Drill, Test, Rinse, Repeat/04. Reverse Engineering.mp4 4.07 MB
05. Defense in Depth Drill, Test, Rinse, Repeat/05. Teams Involved.mp4 4.7 MB
05. Defense in Depth Drill, Test, Rinse, Repeat/06. Risk Evaluation.mp4 7.39 MB
05. Defense in Depth Drill, Test, Rinse, Repeat/07. Summary.mp4 1.95 MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/01. Introduction and Overview.mp4 1.09 MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/02. Frameworks.mp4 6.8 MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/03. Policies.mp4 12.2 MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/04. Controls.mp4 6.62 MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/05. Procedures.mp4 7.15 MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/06. Quality Controls & Verification.mp4 5.87 MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/07. Module & Course Summary.mp4 1.39 MB
其他位置