搜索
[ CourseMega.com ] Udemy - Cyber Security Class - Asset Security & Security Engineering
磁力链接/BT种子名称
[ CourseMega.com ] Udemy - Cyber Security Class - Asset Security & Security Engineering
磁力链接/BT种子简介
种子哈希:
1c1b4041602dc272350793c4aa6f1cd1c8cbb332
文件大小:
5.54G
已经下载:
2230
次
下载速度:
极快
收录时间:
2022-01-09
最近下载:
2025-09-19
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:1C1B4041602DC272350793C4AA6F1CD1C8CBB332
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
暗网Xvideo
TikTok成人版
PornHub
听泉鉴鲍
少女日记
草榴社区
哆哔涩漫
呦乐园
萝莉岛
悠悠禁区
拔萝卜
疯马秀
最近搜索
闺蜜来玩
新萝莉
bluray 中文
破
魔女的侵袭
里有
平面
最近
小只
国手
尤物
欲火
嗲
爱萝莉
猪猪
【想想】
肉鸡
少妇骑
张美
做头
女神 啪啪
美熟女
极品人妻
女儿内射
洋洋
体内
2024最新
コミケ
姐妹花
脱内裤
文件列表
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/9. Methods of Encryption Symmetric Cryptography.mp4
90.5 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/14. Protecting Assets Understanding Configuration Management - 2.mp4
67.1 MB
~Get Your Files Here !/10. Learning System & Computer Architecture/11. Section Outro.mp4
66.6 MB
~Get Your Files Here !/2. Understanding Information Life Cycle/1. Introduction.mp4
63.7 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/23. Methods of Encryption Hash Message Authentication Code.mp4
62.7 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/13. Protecting Assets Understanding Configuration Management - 1.mp4
61.9 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/7. Methods of Encryption Understanding Symmetric Algorithms.mp4
60.7 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/12. Protecting Assets Learning System Configuration.mp4
60.4 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/11. Methods of Encryption Exclusive OR (XOR).mp4
57.7 MB
~Get Your Files Here !/10. Learning System & Computer Architecture/1. Introduction.mp4
56.1 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/18. Protecting Assets Tools to Securely Delete Content.mp4
55.3 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/19. Section Outro.mp4
54.3 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/10. Protecting Assets Learn About ASD.mp4
52.4 MB
~Get Your Files Here !/2. Understanding Information Life Cycle/2. Information Life Cycle The Valuable Information Assets - 1.mp4
51.9 MB
~Get Your Files Here !/11. Learn and Understand Operating Systems/12. Section Outro.mp4
50.9 MB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/11. Methods of Encryption Learning Asymmetric Key Algorithms.mp4
50.7 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/11. Security Models Learning the Trusted Computing Base.mp4
50.5 MB
~Get Your Files Here !/2. Understanding Information Life Cycle/3. Information Life Cycle The Valuable Information Assets - 2.mp4
50.1 MB
~Get Your Files Here !/10. Learning System & Computer Architecture/8. System and Computer Architecture Memory Types - 3.mp4
49.8 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/20. Learning Information Systems Architecture SSO For Web Applications.mp4
48.6 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/22. Learning Information Systems Architecture Cross site scripting attacks.mp4
48.5 MB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/12. Methods of Encryption Rivest Shamir Adleman.mp4
47.9 MB
~Get Your Files Here !/11. Learn and Understand Operating Systems/6. Learning Operating Systems Understanding Processes & Buffers.mp4
46.9 MB
~Get Your Files Here !/3. Learning Layers of Responsibility/5. Section Outro.mp4
46.6 MB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/8. Methods of Encryption Confidentiality - 1.mp4
46.2 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/6. Security Models Learning Biba Model.mp4
45.1 MB
~Get Your Files Here !/11. Learn and Understand Operating Systems/11. Learning Operating Systems Operating System Security.mp4
44.7 MB
~Get Your Files Here !/4. Learn About Information Classification/9. Learning Information Classification Define Appropriate Protections.mp4
44.7 MB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/6. Methods of Encryption Learning Secure Key Distribution.mp4
44.5 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/17. Protecting Assets Learn and Understand Data Remanence - 2.mp4
44.3 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/7. Protecting Assets Subtypes - 3.mp4
44.3 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/10. Learning Information Systems Architecture Applications.mp4
44.2 MB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/5. Methods of Encryption Cryptographic Keys.mp4
44.2 MB
~Get Your Files Here !/11. Learn and Understand Operating Systems/3. Learning Operating Systems Learning the Architectures.mp4
44.1 MB
~Get Your Files Here !/11. Learn and Understand Operating Systems/10. Learning Operating Systems Learning Security Kernel and Reference Monitor.mp4
43.5 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/16. Learning Information Systems Architecture Database Middleware - 1.mp4
43.2 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/16. Methods of Encryption Advanced Encryption Standard (AES).mp4
42.9 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/8. Protecting Assets Using Accepted Standards - 1.mp4
42.9 MB
~Get Your Files Here !/10. Learning System & Computer Architecture/5. System and Computer Architecture Computer Systems.mp4
42.5 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/19. Learning Information Systems Architecture Data aggregation and Data mining.mp4
41.7 MB
~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/7. Section Outro.mp4
41.5 MB
~Get Your Files Here !/11. Learn and Understand Operating Systems/5. Learning Operating Systems Operating System Architectures.mp4
41.4 MB
~Get Your Files Here !/18. Learn More About Cryptography/7. Learn More About Cryptography Secure Electronic Transaction.mp4
41.3 MB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/10. Methods of Encryption Secure Sockets Layer.mp4
41.3 MB
~Get Your Files Here !/19. Understanding Cryptography - Attacks/3. Understanding Attacks Cracking Crypto - 2.mp4
40.4 MB
~Get Your Files Here !/15. Understanding Message Integrity/3. Understanding Message Integrity Various Hashing Algorithms - 2.mp4
40.3 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/15. Methods of Encryption Data Encryption Standard (DES).mp4
40.2 MB
~Get Your Files Here !/3. Learning Layers of Responsibility/1. Introduction.mp4
40.1 MB
~Get Your Files Here !/4. Learn About Information Classification/10. Learning Information Classification Apply Classification Labels.mp4
40.0 MB
~Get Your Files Here !/18. Learn More About Cryptography/8. Section Outro.mp4
39.3 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/13. Methods of Encryption Crypto Machines.mp4
38.6 MB
~Get Your Files Here !/20. Cyber Security - Physical System Security/3. Cyber Security Physical Security Goals.mp4
38.5 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/21. Learning Information Systems Architecture Learn and Understand Mobile Code.mp4
38.5 MB
~Get Your Files Here !/11. Learn and Understand Operating Systems/4. Learning Operating Systems Learning Kernel Mode Execution and Rootkits.mp4
38.3 MB
~Get Your Files Here !/4. Learn About Information Classification/1. Introduction.mp4
38.1 MB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/3. Methods of Encryption Asymmetric Keys and Authentication.mp4
37.6 MB
~Get Your Files Here !/2. Understanding Information Life Cycle/4. Information Life Cycle What Allows Access.mp4
37.5 MB
~Get Your Files Here !/3. Learning Layers of Responsibility/2. Learning Layers of Responsibility Security Administrator.mp4
37.4 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/23. Learning Information Systems Architecture Java applets and ActiveX control.mp4
37.1 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/5. Protecting Assets Subtypes - 1.mp4
36.9 MB
~Get Your Files Here !/4. Learn About Information Classification/2. Learning Information Classification Classifications Levels.mp4
36.8 MB
~Get Your Files Here !/20. Cyber Security - Physical System Security/7. Cyber Security Classes of Fire.mp4
36.7 MB
~Get Your Files Here !/20. Cyber Security - Physical System Security/6. Cyber Security Physical Environment.mp4
36.4 MB
~Get Your Files Here !/15. Understanding Message Integrity/1. Introduction.mp4
36.1 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/8. Security Models Learning Clark-Wilson Model - 1.mp4
36.1 MB
~Get Your Files Here !/20. Cyber Security - Physical System Security/9. Cyber Security Rating, Placement, Inspection, Training.mp4
36.1 MB
~Get Your Files Here !/5. Learn and Understand Retention Policies/2. Learning Retention Policies Data Must Be Securely Maintained - 2.mp4
35.9 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/17. Learning Information Systems Architecture Database Middleware - 2.mp4
35.6 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/6. Learning Information Systems Architecture Private Cloud and Public Cloud.mp4
35.3 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/11. Learning Information Systems Architecture Understanding Database Types.mp4
34.4 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/7. Security Models Learn How to Use these Models.mp4
34.3 MB
~Get Your Files Here !/18. Learn More About Cryptography/6. Learn More About Cryptography Pretty Good Privacy.mp4
34.3 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/4. Security Models Learning Bell-LaPadula Model - 1.mp4
33.7 MB
~Get Your Files Here !/10. Learning System & Computer Architecture/6. System and Computer Architecture Memory Types - 1.mp4
33.5 MB
~Get Your Files Here !/20. Cyber Security - Physical System Security/10. Section Outro.mp4
33.4 MB
~Get Your Files Here !/11. Learn and Understand Operating Systems/2. Learning Operating Systems User Mode & Kernel Mode.mp4
33.4 MB
~Get Your Files Here !/12. Understanding Computing Systems Virtualization/4. Computing Systems Virtualization Virtual Desktop Infrastructure.mp4
32.9 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/12. Methods of Encryption Understanding The Principles.mp4
32.8 MB
~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/5. Definitions and Concepts The Strength of the Cryptosystem & Crypto Terms.mp4
32.5 MB
~Get Your Files Here !/11. Learn and Understand Operating Systems/9. Learning Operating Systems Memory Management.mp4
32.5 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/12. Learning Information Systems Architecture Object oriented - Database.mp4
31.9 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/3. Security Models Three Foundational Models.mp4
31.4 MB
~Get Your Files Here !/4. Learn About Information Classification/11. Implement Protective and Monitoring Technologies - 1.mp4
31.2 MB
~Get Your Files Here !/18. Learn More About Cryptography/4. Learn More About Cryptography Public Key Infrastructure - 3.mp4
31.2 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/15. Section Outro.mp4
31.2 MB
~Get Your Files Here !/15. Understanding Message Integrity/2. Understanding Message Integrity Various Hashing Algorithms - 1.mp4
30.9 MB
~Get Your Files Here !/20. Cyber Security - Physical System Security/2. Cyber Security Threats.mp4
30.9 MB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/13. Section Outro.mp4
30.8 MB
~Get Your Files Here !/20. Cyber Security - Physical System Security/4. Cyber Security Perimeter Intrusion Detection.mp4
30.8 MB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/7. Methods of Encryption Learn and Understand Digital Signature Verification.mp4
30.3 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/19. Methods of Encryption Output Feedback Mode (OFB).mp4
30.3 MB
~Get Your Files Here !/18. Learn More About Cryptography/5. Learn More About Cryptography Public Key Infrastructure - 4.mp4
30.2 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/3. Learning Information Systems Architecture Mobile Device Management - 2.mp4
29.8 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/22. Methods of Encryption Understanding MAC.mp4
29.6 MB
~Get Your Files Here !/3. Learning Layers of Responsibility/4. Learning Layers of Responsibility Data Custodian & User.mp4
29.2 MB
~Get Your Files Here !/12. Understanding Computing Systems Virtualization/2. Computing Systems Virtualization Virtual Machines.mp4
29.1 MB
~Get Your Files Here !/12. Understanding Computing Systems Virtualization/1. Introduction.mp4
29.0 MB
~Get Your Files Here !/4. Learn About Information Classification/12. Implement Protective and Monitoring Technologies - 2.mp4
28.9 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/18. Learning Information Systems Architecture Data warehouse and Data mart.mp4
28.8 MB
~Get Your Files Here !/18. Learn More About Cryptography/3. Learn More About Cryptography Public Key Infrastructure - 2.mp4
28.7 MB
~Get Your Files Here !/4. Learn About Information Classification/3. Understanding Information Classification - 1.mp4
28.4 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/24. Section Outro.mp4
28.4 MB
~Get Your Files Here !/15. Understanding Message Integrity/5. Understanding Message Integrity Symmetric Algorithms.mp4
28.4 MB
~Get Your Files Here !/4. Learn About Information Classification/8. Learning Information Classification Define Classifications.mp4
28.4 MB
~Get Your Files Here !/20. Cyber Security - Physical System Security/5. Cyber Security Understanding Zones.mp4
27.9 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/14. Methods of Encryption Understanding The Ciphers.mp4
27.3 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/6. Protecting Assets Subtypes - 2.mp4
27.2 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/11. Protecting Assets Standards and Baselines.mp4
27.0 MB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/9. Methods of Encryption Confidentiality - 2.mp4
26.7 MB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/2. Methods of Encryption Cryptographic Services.mp4
26.6 MB
~Get Your Files Here !/3. Learning Layers of Responsibility/3. Learning Layers of Responsibility Data Owner & System Custodian.mp4
26.3 MB
~Get Your Files Here !/4. Learn About Information Classification/4. Understanding Information Classification - 2.mp4
26.0 MB
~Get Your Files Here !/19. Understanding Cryptography - Attacks/1. Introduction.mp4
25.5 MB
~Get Your Files Here !/10. Learning System & Computer Architecture/10. System and Computer Architecture Memory Types - 4.mp4
25.4 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/6. Methods of Encryption Symmetric Key Distribution.mp4
25.3 MB
~Get Your Files Here !/21. Part II - Security Engineering Summary/1. Summary.mp4
25.0 MB
~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/3. Definitions and Concepts Crypto to Protect the Data.mp4
24.8 MB
~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/6. Definitions and Concepts Understanding Keys.mp4
24.5 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/13. Security Models The Requirements.mp4
24.3 MB
~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/2. Definitions and Concepts Cryptographic Services.mp4
24.1 MB
~Get Your Files Here !/4. Learn About Information Classification/13. Learning Information Classification Data Classification - Provide Training.mp4
24.0 MB
~Get Your Files Here !/20. Cyber Security - Physical System Security/8. Cyber Security Understanding Fire Detectors.mp4
23.8 MB
~Get Your Files Here !/5. Learn and Understand Retention Policies/1. Learning Retention Policies Data Must Be Securely Maintained - 1.mp4
23.7 MB
~Get Your Files Here !/4. Learn About Information Classification/7. Learning Information Classification Assign an Accurate Value to Each Asset.mp4
23.6 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/7. Learning Information Systems Architecture Terms to Consider.mp4
23.4 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/5. Learning Information Systems Architecture Distributed Systems.mp4
23.4 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/16. Protecting Assets Learn and Understand Data Remanence - 1.mp4
23.3 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/3. Protecting Assets Technical.mp4
23.3 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/15. Protecting Assets Handling Data & Removable Media.mp4
23.2 MB
~Get Your Files Here !/10. Learning System & Computer Architecture/7. System and Computer Architecture Memory Types - 2.mp4
23.1 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/5. Security Models Learning Bell-LaPadula Model - 2.mp4
22.7 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/9. Protecting Assets Using Accepted Standards - 2.mp4
22.6 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/15. Learning Information Systems Architecture Database Issues.mp4
22.6 MB
~Get Your Files Here !/18. Learn More About Cryptography/2. Learn More About Cryptography Public Key Infrastructure - 1.mp4
22.3 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/2. Methods of Encryption Cryptographic Services.mp4
22.0 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/24. Learning Information Systems Architecture Web Application Issues - 1.mp4
21.7 MB
~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/4. Definitions and Concepts Learn and Understand Algorithms.mp4
21.6 MB
~Get Your Files Here !/11. Learn and Understand Operating Systems/8. Learning Operating Systems States and Management.mp4
21.4 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/12. Security Models The Trusted Computing Security Evaluation Criteria.mp4
21.1 MB
~Get Your Files Here !/2. Understanding Information Life Cycle/5. Information Life Cycle Confidentiality, Integrity, and Availability - 1.mp4
20.9 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/14. Security Models Information Technology Security Evaluation Criteria.mp4
20.6 MB
~Get Your Files Here !/11. Learn and Understand Operating Systems/1. Introduction.mp4
20.2 MB
~Get Your Files Here !/4. Learn About Information Classification/14. Section Outro.mp4
19.9 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/2. Learning Information Systems Architecture Mobile Device Management - 1.mp4
19.7 MB
~Get Your Files Here !/4. Learn About Information Classification/6. Learning Information Classification Data At Rest.mp4
19.7 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/18. Methods of Encryption Cipher Block Chaining Mode (CBC).mp4
19.6 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/9. Learning Information Systems Architecture The Internet of Things.mp4
19.4 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/20. Methods of Encryption Cipher Feedback Mode (CFB).mp4
19.3 MB
~Get Your Files Here !/7. Part I - Asset Security Summary/1. Summary.mp4
19.3 MB
~Get Your Files Here !/15. Understanding Message Integrity/4. Understanding Message Integrity Understanding Good Hashing Algorithms.mp4
19.2 MB
~Get Your Files Here !/10. Learning System & Computer Architecture/9. System and Computer Architecture Read-only Memory (ROM).mp4
19.2 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/8. Methods of Encryption Cryptanalysis.mp4
19.0 MB
~Get Your Files Here !/19. Understanding Cryptography - Attacks/6. Understanding Attacks Chosen-Plaintext Attacks.mp4
19.0 MB
~Get Your Files Here !/4. Learn About Information Classification/5. Learning Information Classification Develop An Inventory of Data Assets.mp4
18.8 MB
~Get Your Files Here !/11. Learn and Understand Operating Systems/7. Learning Operating Systems The Buffer Overflow Attack.mp4
18.4 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/21. Methods of Encryption Counter Mode (CTR).mp4
18.0 MB
~Get Your Files Here !/18. Learn More About Cryptography/1. Introduction.mp4
17.9 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/17. Methods of Encryption Electronic Code Book Mode (ECB).mp4
17.7 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/1. Introduction.mp4
17.7 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/4. Protecting Assets Physical.mp4
17.2 MB
~Get Your Files Here !/12. Understanding Computing Systems Virtualization/3. Computing Systems Virtualization Understanding Softwares.mp4
16.8 MB
~Get Your Files Here !/10. Learning System & Computer Architecture/3. System and Computer Architecture CPU Instruction Sets.mp4
16.8 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/1. Introduction.mp4
16.4 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/2. Security Models Models & Standards & Protocols.mp4
16.3 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/10. Security Models Learning Brewer and Nash Model.mp4
16.1 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/4. Learning Information Systems Architecture P2P Computing.mp4
16.0 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/9. Security Models Learning Clark-Wilson Model - 2.mp4
15.9 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/25. Learning Information Systems Architecture Web Application Issues - 2.mp4
15.7 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/1. Introduction.mp4
15.4 MB
~Get Your Files Here !/8. Part II - Security Engineering/1. Introduction to Security Engineering.mp4
15.3 MB
~Get Your Files Here !/10. Learning System & Computer Architecture/4. System and Computer Architecture CPU Capabilities.mp4
15.2 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/2. Protecting Assets Administrative.mp4
15.2 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/13. Learning Information Systems Architecture Integrity.mp4
14.8 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/3. Methods of Encryption Symmetric Key Algorithms For Confidentiality.mp4
14.6 MB
~Get Your Files Here !/15. Understanding Message Integrity/6. Section Outro.mp4
14.2 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/4. Methods of Encryption Symmetric Key Algorithms For Authentication.mp4
14.2 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/14. Learning Information Systems Architecture Redundancy.mp4
14.2 MB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/1. Introduction.mp4
14.1 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/26. Section Outro.mp4
14.0 MB
~Get Your Files Here !/5. Learn and Understand Retention Policies/3. Ensure Retention Policies Meet Compliance Requirements - 1.mp4
13.7 MB
~Get Your Files Here !/19. Understanding Cryptography - Attacks/7. Understanding Attacks Chosen-Ciphertext Attacks.mp4
13.6 MB
~Get Your Files Here !/10. Learning System & Computer Architecture/2. System and Computer Architecture The Central Processing Unit.mp4
13.4 MB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/4. Methods of Encryption Asymmetric Keys and Integrity.mp4
13.2 MB
~Get Your Files Here !/5. Learn and Understand Retention Policies/4. Ensure Retention Policies Meet Compliance Requirements - 2.mp4
13.1 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/8. Learning Information Systems Architecture Grid Computing.mp4
12.4 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/1. Getting Started.mp4
11.6 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/10. Methods of Encryption Understanding Boolean Logic.mp4
11.6 MB
~Get Your Files Here !/19. Understanding Cryptography - Attacks/2. Understanding Attacks Cracking Crypto - 1.mp4
10.5 MB
~Get Your Files Here !/19. Understanding Cryptography - Attacks/4. Understanding Attacks Ciphertext-Only Attacks.mp4
9.7 MB
~Get Your Files Here !/2. Understanding Information Life Cycle/6. Information Life Cycle Confidentiality, Integrity, and Availability - 2.mp4
8.8 MB
~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/1. Introduction.mp4
8.8 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/5. Methods of Encryption Symmetric Key Algorithms For Integrity.mp4
8.4 MB
~Get Your Files Here !/19. Understanding Cryptography - Attacks/5. Understanding Attacks Known-Plaintext Attacks.mp4
6.5 MB
~Get Your Files Here !/20. Cyber Security - Physical System Security/1. Introduction.mp4
3.5 MB
~Get Your Files Here !/1. Welcome Part I - Asset Security/1. Introduction.mp4
2.3 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/11. Security Models Learning the Trusted Computing Base.srt
14.2 kB
~Get Your Files Here !/10. Learning System & Computer Architecture/11. Section Outro.srt
13.6 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/14. Protecting Assets Understanding Configuration Management - 2.srt
13.5 kB
~Get Your Files Here !/2. Understanding Information Life Cycle/1. Introduction.srt
12.7 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/13. Protecting Assets Understanding Configuration Management - 1.srt
12.6 kB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/6. Security Models Learning Biba Model.srt
12.2 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/19. Section Outro.srt
12.1 kB
~Get Your Files Here !/2. Understanding Information Life Cycle/3. Information Life Cycle The Valuable Information Assets - 2.srt
11.9 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/12. Protecting Assets Learning System Configuration.srt
11.7 kB
~Get Your Files Here !/2. Understanding Information Life Cycle/2. Information Life Cycle The Valuable Information Assets - 1.srt
11.7 kB
~Get Your Files Here !/11. Learn and Understand Operating Systems/12. Section Outro.srt
11.4 kB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/7. Security Models Learn How to Use these Models.srt
11.4 kB
~Get Your Files Here !/10. Learning System & Computer Architecture/1. Introduction.srt
11.4 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/8. Protecting Assets Using Accepted Standards - 1.srt
11.3 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/17. Protecting Assets Learn and Understand Data Remanence - 2.srt
11.3 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/7. Protecting Assets Subtypes - 3.srt
11.3 kB
~Get Your Files Here !/11. Learn and Understand Operating Systems/4. Learning Operating Systems Learning Kernel Mode Execution and Rootkits.srt
11.2 kB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/10. Methods of Encryption Secure Sockets Layer.srt
11.2 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/10. Protecting Assets Learn About ASD.srt
11.0 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/22. Learning Information Systems Architecture Cross site scripting attacks.srt
10.8 kB
~Get Your Files Here !/10. Learning System & Computer Architecture/6. System and Computer Architecture Memory Types - 1.srt
10.5 kB
~Get Your Files Here !/11. Learn and Understand Operating Systems/11. Learning Operating Systems Operating System Security.srt
10.3 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/23. Learning Information Systems Architecture Java applets and ActiveX control.srt
10.2 kB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/8. Security Models Learning Clark-Wilson Model - 1.srt
10.2 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/20. Learning Information Systems Architecture SSO For Web Applications.srt
10.0 kB
~Get Your Files Here !/20. Cyber Security - Physical System Security/3. Cyber Security Physical Security Goals.srt
10.0 kB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/11. Methods of Encryption Learning Asymmetric Key Algorithms.srt
9.7 kB
~Get Your Files Here !/11. Learn and Understand Operating Systems/6. Learning Operating Systems Understanding Processes & Buffers.srt
9.7 kB
~Get Your Files Here !/15. Understanding Message Integrity/3. Understanding Message Integrity Various Hashing Algorithms - 2.srt
9.7 kB
~Get Your Files Here !/3. Learning Layers of Responsibility/5. Section Outro.srt
9.7 kB
~Get Your Files Here !/10. Learning System & Computer Architecture/8. System and Computer Architecture Memory Types - 3.srt
9.5 kB
~Get Your Files Here !/4. Learn About Information Classification/2. Learning Information Classification Classifications Levels.srt
9.5 kB
~Get Your Files Here !/11. Learn and Understand Operating Systems/10. Learning Operating Systems Learning Security Kernel and Reference Monitor.srt
9.5 kB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/12. Methods of Encryption Rivest Shamir Adleman.srt
9.5 kB
~Get Your Files Here !/3. Learning Layers of Responsibility/1. Introduction.srt
9.4 kB
~Get Your Files Here !/4. Learn About Information Classification/9. Learning Information Classification Define Appropriate Protections.srt
9.4 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/15. Methods of Encryption Data Encryption Standard (DES).srt
9.4 kB
~Get Your Files Here !/11. Learn and Understand Operating Systems/5. Learning Operating Systems Operating System Architectures.srt
9.4 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/7. Methods of Encryption Understanding Symmetric Algorithms.srt
9.3 kB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/13. Section Outro.srt
9.2 kB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/8. Methods of Encryption Confidentiality - 1.srt
9.2 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/16. Methods of Encryption Advanced Encryption Standard (AES).srt
9.1 kB
~Get Your Files Here !/4. Learn About Information Classification/10. Learning Information Classification Apply Classification Labels.srt
9.1 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/19. Learning Information Systems Architecture Data aggregation and Data mining.srt
9.1 kB
~Get Your Files Here !/2. Understanding Information Life Cycle/4. Information Life Cycle What Allows Access.srt
8.9 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/18. Protecting Assets Tools to Securely Delete Content.srt
8.9 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/9. Methods of Encryption Symmetric Cryptography.srt
8.9 kB
~Get Your Files Here !/3. Learning Layers of Responsibility/2. Learning Layers of Responsibility Security Administrator.srt
8.8 kB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/4. Security Models Learning Bell-LaPadula Model - 1.srt
8.8 kB
~Get Your Files Here !/4. Learn About Information Classification/1. Introduction.srt
8.8 kB
~Get Your Files Here !/19. Understanding Cryptography - Attacks/3. Understanding Attacks Cracking Crypto - 2.srt
8.8 kB
~Get Your Files Here !/11. Learn and Understand Operating Systems/3. Learning Operating Systems Learning the Architectures.srt
8.7 kB
~Get Your Files Here !/20. Cyber Security - Physical System Security/4. Cyber Security Perimeter Intrusion Detection.srt
8.7 kB
~Get Your Files Here !/15. Understanding Message Integrity/1. Introduction.srt
8.7 kB
~Get Your Files Here !/20. Cyber Security - Physical System Security/10. Section Outro.srt
8.6 kB
~Get Your Files Here !/20. Cyber Security - Physical System Security/5. Cyber Security Understanding Zones.srt
8.6 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/21. Learning Information Systems Architecture Learn and Understand Mobile Code.srt
8.6 kB
~Get Your Files Here !/20. Cyber Security - Physical System Security/6. Cyber Security Physical Environment.srt
8.6 kB
~Get Your Files Here !/21. Part II - Security Engineering Summary/1. Summary.srt
8.5 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/23. Methods of Encryption Hash Message Authentication Code.srt
8.5 kB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/5. Methods of Encryption Cryptographic Keys.srt
8.4 kB
~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/7. Section Outro.srt
8.4 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/11. Learning Information Systems Architecture Understanding Database Types.srt
8.4 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/10. Learning Information Systems Architecture Applications.srt
8.3 kB
~Get Your Files Here !/5. Learn and Understand Retention Policies/2. Learning Retention Policies Data Must Be Securely Maintained - 2.srt
8.3 kB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/6. Methods of Encryption Learning Secure Key Distribution.srt
8.2 kB
~Get Your Files Here !/12. Understanding Computing Systems Virtualization/4. Computing Systems Virtualization Virtual Desktop Infrastructure.srt
8.2 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/16. Learning Information Systems Architecture Database Middleware - 1.srt
8.1 kB
~Get Your Files Here !/20. Cyber Security - Physical System Security/9. Cyber Security Rating, Placement, Inspection, Training.srt
8.0 kB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/15. Section Outro.srt
8.0 kB
~Get Your Files Here !/18. Learn More About Cryptography/8. Section Outro.srt
7.8 kB
~Get Your Files Here !/11. Learn and Understand Operating Systems/2. Learning Operating Systems User Mode & Kernel Mode.srt
7.8 kB
~Get Your Files Here !/11. Learn and Understand Operating Systems/9. Learning Operating Systems Memory Management.srt
7.7 kB
~Get Your Files Here !/18. Learn More About Cryptography/5. Learn More About Cryptography Public Key Infrastructure - 4.srt
7.6 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/6. Learning Information Systems Architecture Private Cloud and Public Cloud.srt
7.5 kB
~Get Your Files Here !/10. Learning System & Computer Architecture/5. System and Computer Architecture Computer Systems.srt
7.4 kB
~Get Your Files Here !/20. Cyber Security - Physical System Security/2. Cyber Security Threats.srt
7.4 kB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/3. Security Models Three Foundational Models.srt
7.3 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/17. Learning Information Systems Architecture Database Middleware - 2.srt
7.3 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/12. Learning Information Systems Architecture Object oriented - Database.srt
7.2 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/14. Methods of Encryption Understanding The Ciphers.srt
7.1 kB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/13. Security Models The Requirements.srt
7.1 kB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/3. Methods of Encryption Asymmetric Keys and Authentication.srt
7.0 kB
~Get Your Files Here !/18. Learn More About Cryptography/7. Learn More About Cryptography Secure Electronic Transaction.srt
7.0 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/3. Learning Information Systems Architecture Mobile Device Management - 2.srt
7.0 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/12. Methods of Encryption Understanding The Principles.srt
7.0 kB
~Get Your Files Here !/4. Learn About Information Classification/8. Learning Information Classification Define Classifications.srt
6.9 kB
~Get Your Files Here !/18. Learn More About Cryptography/6. Learn More About Cryptography Pretty Good Privacy.srt
6.8 kB
~Get Your Files Here !/4. Learn About Information Classification/11. Implement Protective and Monitoring Technologies - 1.srt
6.8 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/5. Protecting Assets Subtypes - 1.srt
6.8 kB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/7. Methods of Encryption Learn and Understand Digital Signature Verification.srt
6.7 kB
~Get Your Files Here !/12. Understanding Computing Systems Virtualization/1. Introduction.srt
6.7 kB
~Get Your Files Here !/3. Learning Layers of Responsibility/4. Learning Layers of Responsibility Data Custodian & User.srt
6.7 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/13. Methods of Encryption Crypto Machines.srt
6.7 kB
~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/5. Definitions and Concepts The Strength of the Cryptosystem & Crypto Terms.srt
6.6 kB
~Get Your Files Here !/4. Learn About Information Classification/3. Understanding Information Classification - 1.srt
6.6 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/19. Methods of Encryption Output Feedback Mode (OFB).srt
6.6 kB
~Get Your Files Here !/4. Learn About Information Classification/12. Implement Protective and Monitoring Technologies - 2.srt
6.6 kB
~Get Your Files Here !/20. Cyber Security - Physical System Security/7. Cyber Security Classes of Fire.srt
6.3 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/7. Learning Information Systems Architecture Terms to Consider.srt
6.3 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/5. Learning Information Systems Architecture Distributed Systems.srt
6.2 kB
~Get Your Files Here !/12. Understanding Computing Systems Virtualization/2. Computing Systems Virtualization Virtual Machines.srt
6.2 kB
~Get Your Files Here !/10. Learning System & Computer Architecture/10. System and Computer Architecture Memory Types - 4.srt
6.2 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/24. Learning Information Systems Architecture Web Application Issues - 1.srt
6.1 kB
~Get Your Files Here !/4. Learn About Information Classification/13. Learning Information Classification Data Classification - Provide Training.srt
6.1 kB
~Get Your Files Here !/4. Learn About Information Classification/4. Understanding Information Classification - 2.srt
6.0 kB
~Get Your Files Here !/15. Understanding Message Integrity/2. Understanding Message Integrity Various Hashing Algorithms - 1.srt
6.0 kB
~Get Your Files Here !/20. Cyber Security - Physical System Security/8. Cyber Security Understanding Fire Detectors.srt
6.0 kB
~Get Your Files Here !/2. Understanding Information Life Cycle/5. Information Life Cycle Confidentiality, Integrity, and Availability - 1.srt
5.9 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/6. Protecting Assets Subtypes - 2.srt
5.9 kB
~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/3. Definitions and Concepts Crypto to Protect the Data.srt
5.8 kB
~Get Your Files Here !/18. Learn More About Cryptography/4. Learn More About Cryptography Public Key Infrastructure - 3.srt
5.8 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/11. Methods of Encryption Exclusive OR (XOR).srt
5.8 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/3. Protecting Assets Technical.srt
5.8 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/16. Protecting Assets Learn and Understand Data Remanence - 1.srt
5.7 kB
~Get Your Files Here !/5. Learn and Understand Retention Policies/1. Learning Retention Policies Data Must Be Securely Maintained - 1.srt
5.7 kB
~Get Your Files Here !/10. Learning System & Computer Architecture/9. System and Computer Architecture Read-only Memory (ROM).srt
5.7 kB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/14. Security Models Information Technology Security Evaluation Criteria.srt
5.6 kB
~Get Your Files Here !/19. Understanding Cryptography - Attacks/1. Introduction.srt
5.6 kB
~Get Your Files Here !/3. Learning Layers of Responsibility/3. Learning Layers of Responsibility Data Owner & System Custodian.srt
5.5 kB
~Get Your Files Here !/11. Learn and Understand Operating Systems/1. Introduction.srt
5.5 kB
~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/2. Definitions and Concepts Cryptographic Services.srt
5.4 kB
~Get Your Files Here !/11. Learn and Understand Operating Systems/8. Learning Operating Systems States and Management.srt
5.4 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/18. Learning Information Systems Architecture Data warehouse and Data mart.srt
5.3 kB
~Get Your Files Here !/7. Part I - Asset Security Summary/1. Summary.srt
5.3 kB
~Get Your Files Here !/10. Learning System & Computer Architecture/7. System and Computer Architecture Memory Types - 2.srt
5.3 kB
~Get Your Files Here !/4. Learn About Information Classification/6. Learning Information Classification Data At Rest.srt
5.3 kB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/5. Security Models Learning Bell-LaPadula Model - 2.srt
5.3 kB
~Get Your Files Here !/18. Learn More About Cryptography/3. Learn More About Cryptography Public Key Infrastructure - 2.srt
5.3 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/6. Methods of Encryption Symmetric Key Distribution.srt
5.3 kB
~Get Your Files Here !/15. Understanding Message Integrity/5. Understanding Message Integrity Symmetric Algorithms.srt
5.3 kB
~Get Your Files Here !/4. Learn About Information Classification/7. Learning Information Classification Assign an Accurate Value to Each Asset.srt
5.2 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/9. Protecting Assets Using Accepted Standards - 2.srt
5.1 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/24. Section Outro.srt
5.1 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/15. Protecting Assets Handling Data & Removable Media.srt
5.0 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/11. Protecting Assets Standards and Baselines.srt
5.0 kB
~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/6. Definitions and Concepts Understanding Keys.srt
5.0 kB
~Get Your Files Here !/4. Learn About Information Classification/5. Learning Information Classification Develop An Inventory of Data Assets.srt
4.9 kB
~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/4. Definitions and Concepts Learn and Understand Algorithms.srt
4.9 kB
~Get Your Files Here !/4. Learn About Information Classification/14. Section Outro.srt
4.9 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/9. Learning Information Systems Architecture The Internet of Things.srt
4.7 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/21. Methods of Encryption Counter Mode (CTR).srt
4.7 kB
~Get Your Files Here !/18. Learn More About Cryptography/1. Introduction.srt
4.7 kB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/9. Methods of Encryption Confidentiality - 2.srt
4.7 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/22. Methods of Encryption Understanding MAC.srt
4.7 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/2. Learning Information Systems Architecture Mobile Device Management - 1.srt
4.6 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/15. Learning Information Systems Architecture Database Issues.srt
4.6 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/4. Learning Information Systems Architecture P2P Computing.srt
4.6 kB
~Get Your Files Here !/15. Understanding Message Integrity/4. Understanding Message Integrity Understanding Good Hashing Algorithms.srt
4.6 kB
~Get Your Files Here !/12. Understanding Computing Systems Virtualization/3. Computing Systems Virtualization Understanding Softwares.srt
4.4 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/1. Introduction.srt
4.4 kB
~Get Your Files Here !/18. Learn More About Cryptography/2. Learn More About Cryptography Public Key Infrastructure - 1.srt
4.2 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/1. Introduction.srt
4.2 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/25. Learning Information Systems Architecture Web Application Issues - 2.srt
4.2 kB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/12. Security Models The Trusted Computing Security Evaluation Criteria.srt
4.2 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/14. Learning Information Systems Architecture Redundancy.srt
4.2 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/2. Protecting Assets Administrative.srt
4.1 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/2. Methods of Encryption Cryptographic Services.srt
4.0 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/17. Methods of Encryption Electronic Code Book Mode (ECB).srt
3.9 kB
~Get Your Files Here !/19. Understanding Cryptography - Attacks/6. Understanding Attacks Chosen-Plaintext Attacks.srt
3.9 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/8. Methods of Encryption Cryptanalysis.srt
3.9 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/20. Methods of Encryption Cipher Feedback Mode (CFB).srt
3.9 kB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/2. Methods of Encryption Cryptographic Services.srt
3.8 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/1. Introduction.srt
3.7 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/18. Methods of Encryption Cipher Block Chaining Mode (CBC).srt
3.7 kB
~Get Your Files Here !/11. Learn and Understand Operating Systems/7. Learning Operating Systems The Buffer Overflow Attack.srt
3.7 kB
~Get Your Files Here !/10. Learning System & Computer Architecture/3. System and Computer Architecture CPU Instruction Sets.srt
3.6 kB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/2. Security Models Models & Standards & Protocols.srt
3.6 kB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/9. Security Models Learning Clark-Wilson Model - 2.srt
3.5 kB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/1. Introduction.srt
3.4 kB
~Get Your Files Here !/2. Understanding Information Life Cycle/6. Information Life Cycle Confidentiality, Integrity, and Availability - 2.srt
3.4 kB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/10. Security Models Learning Brewer and Nash Model.srt
3.4 kB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/4. Protecting Assets Physical.srt
3.3 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/13. Learning Information Systems Architecture Integrity.srt
3.1 kB
~Get Your Files Here !/10. Learning System & Computer Architecture/4. System and Computer Architecture CPU Capabilities.srt
3.1 kB
~Get Your Files Here !/5. Learn and Understand Retention Policies/4. Ensure Retention Policies Meet Compliance Requirements - 2.srt
3.0 kB
~Get Your Files Here !/10. Learning System & Computer Architecture/2. System and Computer Architecture The Central Processing Unit.srt
3.0 kB
~Get Your Files Here !/5. Learn and Understand Retention Policies/3. Ensure Retention Policies Meet Compliance Requirements - 1.srt
2.9 kB
~Get Your Files Here !/8. Part II - Security Engineering/1. Introduction to Security Engineering.srt
2.9 kB
~Get Your Files Here !/19. Understanding Cryptography - Attacks/2. Understanding Attacks Cracking Crypto - 1.srt
2.9 kB
~Get Your Files Here !/15. Understanding Message Integrity/6. Section Outro.srt
2.7 kB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/1. Getting Started.srt
2.6 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/3. Methods of Encryption Symmetric Key Algorithms For Confidentiality.srt
2.6 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/8. Learning Information Systems Architecture Grid Computing.srt
2.6 kB
~Get Your Files Here !/13. Understanding Information Systems Architecture/26. Section Outro.srt
2.6 kB
~Get Your Files Here !/19. Understanding Cryptography - Attacks/7. Understanding Attacks Chosen-Ciphertext Attacks.srt
2.5 kB
~Get Your Files Here !/19. Understanding Cryptography - Attacks/4. Understanding Attacks Ciphertext-Only Attacks.srt
2.2 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/10. Methods of Encryption Understanding Boolean Logic.srt
2.2 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/4. Methods of Encryption Symmetric Key Algorithms For Authentication.srt
2.1 kB
~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/1. Introduction.srt
2.0 kB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/4. Methods of Encryption Asymmetric Keys and Integrity.srt
1.9 kB
~Get Your Files Here !/19. Understanding Cryptography - Attacks/5. Understanding Attacks Known-Plaintext Attacks.srt
1.5 kB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/5. Methods of Encryption Symmetric Key Algorithms For Integrity.srt
1.5 kB
~Get Your Files Here !/20. Cyber Security - Physical System Security/1. Introduction.srt
1.2 kB
~Get Your Files Here !/1. Welcome Part I - Asset Security/1. Introduction.srt
677 Bytes
~Get Your Files Here !/Bonus Resources.txt
357 Bytes
Get Bonus Downloads Here.url
180 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!