MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

[ CourseMega.com ] Udemy - Cyber Security Class - Asset Security & Security Engineering

磁力链接/BT种子名称

[ CourseMega.com ] Udemy - Cyber Security Class - Asset Security & Security Engineering

磁力链接/BT种子简介

种子哈希:1c1b4041602dc272350793c4aa6f1cd1c8cbb332
文件大小: 5.54G
已经下载:2230次
下载速度:极快
收录时间:2022-01-09
最近下载:2025-09-19

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:1C1B4041602DC272350793C4AA6F1CD1C8CBB332
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 91视频 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 抖阴破解版 极乐禁地 91短视频 暗网Xvideo TikTok成人版 PornHub 听泉鉴鲍 少女日记 草榴社区 哆哔涩漫 呦乐园 萝莉岛 悠悠禁区 拔萝卜 疯马秀

最近搜索

闺蜜来玩 新萝莉 bluray 中文 破 魔女的侵袭 里有 平面 最近 小只 国手 尤物 欲火 嗲 爱萝莉 猪猪 【想想】 肉鸡 少妇骑 张美 做头 女神 啪啪 美熟女 极品人妻 女儿内射 洋洋 体内 2024最新 コミケ 姐妹花 脱内裤

文件列表

  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/9. Methods of Encryption Symmetric Cryptography.mp4 90.5 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/14. Protecting Assets Understanding Configuration Management - 2.mp4 67.1 MB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/11. Section Outro.mp4 66.6 MB
  • ~Get Your Files Here !/2. Understanding Information Life Cycle/1. Introduction.mp4 63.7 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/23. Methods of Encryption Hash Message Authentication Code.mp4 62.7 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/13. Protecting Assets Understanding Configuration Management - 1.mp4 61.9 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/7. Methods of Encryption Understanding Symmetric Algorithms.mp4 60.7 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/12. Protecting Assets Learning System Configuration.mp4 60.4 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/11. Methods of Encryption Exclusive OR (XOR).mp4 57.7 MB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/1. Introduction.mp4 56.1 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/18. Protecting Assets Tools to Securely Delete Content.mp4 55.3 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/19. Section Outro.mp4 54.3 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/10. Protecting Assets Learn About ASD.mp4 52.4 MB
  • ~Get Your Files Here !/2. Understanding Information Life Cycle/2. Information Life Cycle The Valuable Information Assets - 1.mp4 51.9 MB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/12. Section Outro.mp4 50.9 MB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/11. Methods of Encryption Learning Asymmetric Key Algorithms.mp4 50.7 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/11. Security Models Learning the Trusted Computing Base.mp4 50.5 MB
  • ~Get Your Files Here !/2. Understanding Information Life Cycle/3. Information Life Cycle The Valuable Information Assets - 2.mp4 50.1 MB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/8. System and Computer Architecture Memory Types - 3.mp4 49.8 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/20. Learning Information Systems Architecture SSO For Web Applications.mp4 48.6 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/22. Learning Information Systems Architecture Cross site scripting attacks.mp4 48.5 MB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/12. Methods of Encryption Rivest Shamir Adleman.mp4 47.9 MB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/6. Learning Operating Systems Understanding Processes & Buffers.mp4 46.9 MB
  • ~Get Your Files Here !/3. Learning Layers of Responsibility/5. Section Outro.mp4 46.6 MB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/8. Methods of Encryption Confidentiality - 1.mp4 46.2 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/6. Security Models Learning Biba Model.mp4 45.1 MB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/11. Learning Operating Systems Operating System Security.mp4 44.7 MB
  • ~Get Your Files Here !/4. Learn About Information Classification/9. Learning Information Classification Define Appropriate Protections.mp4 44.7 MB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/6. Methods of Encryption Learning Secure Key Distribution.mp4 44.5 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/17. Protecting Assets Learn and Understand Data Remanence - 2.mp4 44.3 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/7. Protecting Assets Subtypes - 3.mp4 44.3 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/10. Learning Information Systems Architecture Applications.mp4 44.2 MB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/5. Methods of Encryption Cryptographic Keys.mp4 44.2 MB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/3. Learning Operating Systems Learning the Architectures.mp4 44.1 MB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/10. Learning Operating Systems Learning Security Kernel and Reference Monitor.mp4 43.5 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/16. Learning Information Systems Architecture Database Middleware - 1.mp4 43.2 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/16. Methods of Encryption Advanced Encryption Standard (AES).mp4 42.9 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/8. Protecting Assets Using Accepted Standards - 1.mp4 42.9 MB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/5. System and Computer Architecture Computer Systems.mp4 42.5 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/19. Learning Information Systems Architecture Data aggregation and Data mining.mp4 41.7 MB
  • ~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/7. Section Outro.mp4 41.5 MB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/5. Learning Operating Systems Operating System Architectures.mp4 41.4 MB
  • ~Get Your Files Here !/18. Learn More About Cryptography/7. Learn More About Cryptography Secure Electronic Transaction.mp4 41.3 MB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/10. Methods of Encryption Secure Sockets Layer.mp4 41.3 MB
  • ~Get Your Files Here !/19. Understanding Cryptography - Attacks/3. Understanding Attacks Cracking Crypto - 2.mp4 40.4 MB
  • ~Get Your Files Here !/15. Understanding Message Integrity/3. Understanding Message Integrity Various Hashing Algorithms - 2.mp4 40.3 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/15. Methods of Encryption Data Encryption Standard (DES).mp4 40.2 MB
  • ~Get Your Files Here !/3. Learning Layers of Responsibility/1. Introduction.mp4 40.1 MB
  • ~Get Your Files Here !/4. Learn About Information Classification/10. Learning Information Classification Apply Classification Labels.mp4 40.0 MB
  • ~Get Your Files Here !/18. Learn More About Cryptography/8. Section Outro.mp4 39.3 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/13. Methods of Encryption Crypto Machines.mp4 38.6 MB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/3. Cyber Security Physical Security Goals.mp4 38.5 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/21. Learning Information Systems Architecture Learn and Understand Mobile Code.mp4 38.5 MB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/4. Learning Operating Systems Learning Kernel Mode Execution and Rootkits.mp4 38.3 MB
  • ~Get Your Files Here !/4. Learn About Information Classification/1. Introduction.mp4 38.1 MB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/3. Methods of Encryption Asymmetric Keys and Authentication.mp4 37.6 MB
  • ~Get Your Files Here !/2. Understanding Information Life Cycle/4. Information Life Cycle What Allows Access.mp4 37.5 MB
  • ~Get Your Files Here !/3. Learning Layers of Responsibility/2. Learning Layers of Responsibility Security Administrator.mp4 37.4 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/23. Learning Information Systems Architecture Java applets and ActiveX control.mp4 37.1 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/5. Protecting Assets Subtypes - 1.mp4 36.9 MB
  • ~Get Your Files Here !/4. Learn About Information Classification/2. Learning Information Classification Classifications Levels.mp4 36.8 MB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/7. Cyber Security Classes of Fire.mp4 36.7 MB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/6. Cyber Security Physical Environment.mp4 36.4 MB
  • ~Get Your Files Here !/15. Understanding Message Integrity/1. Introduction.mp4 36.1 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/8. Security Models Learning Clark-Wilson Model - 1.mp4 36.1 MB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/9. Cyber Security Rating, Placement, Inspection, Training.mp4 36.1 MB
  • ~Get Your Files Here !/5. Learn and Understand Retention Policies/2. Learning Retention Policies Data Must Be Securely Maintained - 2.mp4 35.9 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/17. Learning Information Systems Architecture Database Middleware - 2.mp4 35.6 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/6. Learning Information Systems Architecture Private Cloud and Public Cloud.mp4 35.3 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/11. Learning Information Systems Architecture Understanding Database Types.mp4 34.4 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/7. Security Models Learn How to Use these Models.mp4 34.3 MB
  • ~Get Your Files Here !/18. Learn More About Cryptography/6. Learn More About Cryptography Pretty Good Privacy.mp4 34.3 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/4. Security Models Learning Bell-LaPadula Model - 1.mp4 33.7 MB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/6. System and Computer Architecture Memory Types - 1.mp4 33.5 MB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/10. Section Outro.mp4 33.4 MB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/2. Learning Operating Systems User Mode & Kernel Mode.mp4 33.4 MB
  • ~Get Your Files Here !/12. Understanding Computing Systems Virtualization/4. Computing Systems Virtualization Virtual Desktop Infrastructure.mp4 32.9 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/12. Methods of Encryption Understanding The Principles.mp4 32.8 MB
  • ~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/5. Definitions and Concepts The Strength of the Cryptosystem & Crypto Terms.mp4 32.5 MB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/9. Learning Operating Systems Memory Management.mp4 32.5 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/12. Learning Information Systems Architecture Object oriented - Database.mp4 31.9 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/3. Security Models Three Foundational Models.mp4 31.4 MB
  • ~Get Your Files Here !/4. Learn About Information Classification/11. Implement Protective and Monitoring Technologies - 1.mp4 31.2 MB
  • ~Get Your Files Here !/18. Learn More About Cryptography/4. Learn More About Cryptography Public Key Infrastructure - 3.mp4 31.2 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/15. Section Outro.mp4 31.2 MB
  • ~Get Your Files Here !/15. Understanding Message Integrity/2. Understanding Message Integrity Various Hashing Algorithms - 1.mp4 30.9 MB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/2. Cyber Security Threats.mp4 30.9 MB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/13. Section Outro.mp4 30.8 MB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/4. Cyber Security Perimeter Intrusion Detection.mp4 30.8 MB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/7. Methods of Encryption Learn and Understand Digital Signature Verification.mp4 30.3 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/19. Methods of Encryption Output Feedback Mode (OFB).mp4 30.3 MB
  • ~Get Your Files Here !/18. Learn More About Cryptography/5. Learn More About Cryptography Public Key Infrastructure - 4.mp4 30.2 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/3. Learning Information Systems Architecture Mobile Device Management - 2.mp4 29.8 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/22. Methods of Encryption Understanding MAC.mp4 29.6 MB
  • ~Get Your Files Here !/3. Learning Layers of Responsibility/4. Learning Layers of Responsibility Data Custodian & User.mp4 29.2 MB
  • ~Get Your Files Here !/12. Understanding Computing Systems Virtualization/2. Computing Systems Virtualization Virtual Machines.mp4 29.1 MB
  • ~Get Your Files Here !/12. Understanding Computing Systems Virtualization/1. Introduction.mp4 29.0 MB
  • ~Get Your Files Here !/4. Learn About Information Classification/12. Implement Protective and Monitoring Technologies - 2.mp4 28.9 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/18. Learning Information Systems Architecture Data warehouse and Data mart.mp4 28.8 MB
  • ~Get Your Files Here !/18. Learn More About Cryptography/3. Learn More About Cryptography Public Key Infrastructure - 2.mp4 28.7 MB
  • ~Get Your Files Here !/4. Learn About Information Classification/3. Understanding Information Classification - 1.mp4 28.4 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/24. Section Outro.mp4 28.4 MB
  • ~Get Your Files Here !/15. Understanding Message Integrity/5. Understanding Message Integrity Symmetric Algorithms.mp4 28.4 MB
  • ~Get Your Files Here !/4. Learn About Information Classification/8. Learning Information Classification Define Classifications.mp4 28.4 MB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/5. Cyber Security Understanding Zones.mp4 27.9 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/14. Methods of Encryption Understanding The Ciphers.mp4 27.3 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/6. Protecting Assets Subtypes - 2.mp4 27.2 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/11. Protecting Assets Standards and Baselines.mp4 27.0 MB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/9. Methods of Encryption Confidentiality - 2.mp4 26.7 MB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/2. Methods of Encryption Cryptographic Services.mp4 26.6 MB
  • ~Get Your Files Here !/3. Learning Layers of Responsibility/3. Learning Layers of Responsibility Data Owner & System Custodian.mp4 26.3 MB
  • ~Get Your Files Here !/4. Learn About Information Classification/4. Understanding Information Classification - 2.mp4 26.0 MB
  • ~Get Your Files Here !/19. Understanding Cryptography - Attacks/1. Introduction.mp4 25.5 MB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/10. System and Computer Architecture Memory Types - 4.mp4 25.4 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/6. Methods of Encryption Symmetric Key Distribution.mp4 25.3 MB
  • ~Get Your Files Here !/21. Part II - Security Engineering Summary/1. Summary.mp4 25.0 MB
  • ~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/3. Definitions and Concepts Crypto to Protect the Data.mp4 24.8 MB
  • ~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/6. Definitions and Concepts Understanding Keys.mp4 24.5 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/13. Security Models The Requirements.mp4 24.3 MB
  • ~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/2. Definitions and Concepts Cryptographic Services.mp4 24.1 MB
  • ~Get Your Files Here !/4. Learn About Information Classification/13. Learning Information Classification Data Classification - Provide Training.mp4 24.0 MB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/8. Cyber Security Understanding Fire Detectors.mp4 23.8 MB
  • ~Get Your Files Here !/5. Learn and Understand Retention Policies/1. Learning Retention Policies Data Must Be Securely Maintained - 1.mp4 23.7 MB
  • ~Get Your Files Here !/4. Learn About Information Classification/7. Learning Information Classification Assign an Accurate Value to Each Asset.mp4 23.6 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/7. Learning Information Systems Architecture Terms to Consider.mp4 23.4 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/5. Learning Information Systems Architecture Distributed Systems.mp4 23.4 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/16. Protecting Assets Learn and Understand Data Remanence - 1.mp4 23.3 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/3. Protecting Assets Technical.mp4 23.3 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/15. Protecting Assets Handling Data & Removable Media.mp4 23.2 MB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/7. System and Computer Architecture Memory Types - 2.mp4 23.1 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/5. Security Models Learning Bell-LaPadula Model - 2.mp4 22.7 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/9. Protecting Assets Using Accepted Standards - 2.mp4 22.6 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/15. Learning Information Systems Architecture Database Issues.mp4 22.6 MB
  • ~Get Your Files Here !/18. Learn More About Cryptography/2. Learn More About Cryptography Public Key Infrastructure - 1.mp4 22.3 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/2. Methods of Encryption Cryptographic Services.mp4 22.0 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/24. Learning Information Systems Architecture Web Application Issues - 1.mp4 21.7 MB
  • ~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/4. Definitions and Concepts Learn and Understand Algorithms.mp4 21.6 MB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/8. Learning Operating Systems States and Management.mp4 21.4 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/12. Security Models The Trusted Computing Security Evaluation Criteria.mp4 21.1 MB
  • ~Get Your Files Here !/2. Understanding Information Life Cycle/5. Information Life Cycle Confidentiality, Integrity, and Availability - 1.mp4 20.9 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/14. Security Models Information Technology Security Evaluation Criteria.mp4 20.6 MB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/1. Introduction.mp4 20.2 MB
  • ~Get Your Files Here !/4. Learn About Information Classification/14. Section Outro.mp4 19.9 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/2. Learning Information Systems Architecture Mobile Device Management - 1.mp4 19.7 MB
  • ~Get Your Files Here !/4. Learn About Information Classification/6. Learning Information Classification Data At Rest.mp4 19.7 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/18. Methods of Encryption Cipher Block Chaining Mode (CBC).mp4 19.6 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/9. Learning Information Systems Architecture The Internet of Things.mp4 19.4 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/20. Methods of Encryption Cipher Feedback Mode (CFB).mp4 19.3 MB
  • ~Get Your Files Here !/7. Part I - Asset Security Summary/1. Summary.mp4 19.3 MB
  • ~Get Your Files Here !/15. Understanding Message Integrity/4. Understanding Message Integrity Understanding Good Hashing Algorithms.mp4 19.2 MB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/9. System and Computer Architecture Read-only Memory (ROM).mp4 19.2 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/8. Methods of Encryption Cryptanalysis.mp4 19.0 MB
  • ~Get Your Files Here !/19. Understanding Cryptography - Attacks/6. Understanding Attacks Chosen-Plaintext Attacks.mp4 19.0 MB
  • ~Get Your Files Here !/4. Learn About Information Classification/5. Learning Information Classification Develop An Inventory of Data Assets.mp4 18.8 MB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/7. Learning Operating Systems The Buffer Overflow Attack.mp4 18.4 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/21. Methods of Encryption Counter Mode (CTR).mp4 18.0 MB
  • ~Get Your Files Here !/18. Learn More About Cryptography/1. Introduction.mp4 17.9 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/17. Methods of Encryption Electronic Code Book Mode (ECB).mp4 17.7 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/1. Introduction.mp4 17.7 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/4. Protecting Assets Physical.mp4 17.2 MB
  • ~Get Your Files Here !/12. Understanding Computing Systems Virtualization/3. Computing Systems Virtualization Understanding Softwares.mp4 16.8 MB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/3. System and Computer Architecture CPU Instruction Sets.mp4 16.8 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/1. Introduction.mp4 16.4 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/2. Security Models Models & Standards & Protocols.mp4 16.3 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/10. Security Models Learning Brewer and Nash Model.mp4 16.1 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/4. Learning Information Systems Architecture P2P Computing.mp4 16.0 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/9. Security Models Learning Clark-Wilson Model - 2.mp4 15.9 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/25. Learning Information Systems Architecture Web Application Issues - 2.mp4 15.7 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/1. Introduction.mp4 15.4 MB
  • ~Get Your Files Here !/8. Part II - Security Engineering/1. Introduction to Security Engineering.mp4 15.3 MB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/4. System and Computer Architecture CPU Capabilities.mp4 15.2 MB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/2. Protecting Assets Administrative.mp4 15.2 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/13. Learning Information Systems Architecture Integrity.mp4 14.8 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/3. Methods of Encryption Symmetric Key Algorithms For Confidentiality.mp4 14.6 MB
  • ~Get Your Files Here !/15. Understanding Message Integrity/6. Section Outro.mp4 14.2 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/4. Methods of Encryption Symmetric Key Algorithms For Authentication.mp4 14.2 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/14. Learning Information Systems Architecture Redundancy.mp4 14.2 MB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/1. Introduction.mp4 14.1 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/26. Section Outro.mp4 14.0 MB
  • ~Get Your Files Here !/5. Learn and Understand Retention Policies/3. Ensure Retention Policies Meet Compliance Requirements - 1.mp4 13.7 MB
  • ~Get Your Files Here !/19. Understanding Cryptography - Attacks/7. Understanding Attacks Chosen-Ciphertext Attacks.mp4 13.6 MB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/2. System and Computer Architecture The Central Processing Unit.mp4 13.4 MB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/4. Methods of Encryption Asymmetric Keys and Integrity.mp4 13.2 MB
  • ~Get Your Files Here !/5. Learn and Understand Retention Policies/4. Ensure Retention Policies Meet Compliance Requirements - 2.mp4 13.1 MB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/8. Learning Information Systems Architecture Grid Computing.mp4 12.4 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/1. Getting Started.mp4 11.6 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/10. Methods of Encryption Understanding Boolean Logic.mp4 11.6 MB
  • ~Get Your Files Here !/19. Understanding Cryptography - Attacks/2. Understanding Attacks Cracking Crypto - 1.mp4 10.5 MB
  • ~Get Your Files Here !/19. Understanding Cryptography - Attacks/4. Understanding Attacks Ciphertext-Only Attacks.mp4 9.7 MB
  • ~Get Your Files Here !/2. Understanding Information Life Cycle/6. Information Life Cycle Confidentiality, Integrity, and Availability - 2.mp4 8.8 MB
  • ~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/1. Introduction.mp4 8.8 MB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/5. Methods of Encryption Symmetric Key Algorithms For Integrity.mp4 8.4 MB
  • ~Get Your Files Here !/19. Understanding Cryptography - Attacks/5. Understanding Attacks Known-Plaintext Attacks.mp4 6.5 MB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/1. Introduction.mp4 3.5 MB
  • ~Get Your Files Here !/1. Welcome Part I - Asset Security/1. Introduction.mp4 2.3 MB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/11. Security Models Learning the Trusted Computing Base.srt 14.2 kB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/11. Section Outro.srt 13.6 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/14. Protecting Assets Understanding Configuration Management - 2.srt 13.5 kB
  • ~Get Your Files Here !/2. Understanding Information Life Cycle/1. Introduction.srt 12.7 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/13. Protecting Assets Understanding Configuration Management - 1.srt 12.6 kB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/6. Security Models Learning Biba Model.srt 12.2 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/19. Section Outro.srt 12.1 kB
  • ~Get Your Files Here !/2. Understanding Information Life Cycle/3. Information Life Cycle The Valuable Information Assets - 2.srt 11.9 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/12. Protecting Assets Learning System Configuration.srt 11.7 kB
  • ~Get Your Files Here !/2. Understanding Information Life Cycle/2. Information Life Cycle The Valuable Information Assets - 1.srt 11.7 kB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/12. Section Outro.srt 11.4 kB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/7. Security Models Learn How to Use these Models.srt 11.4 kB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/1. Introduction.srt 11.4 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/8. Protecting Assets Using Accepted Standards - 1.srt 11.3 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/17. Protecting Assets Learn and Understand Data Remanence - 2.srt 11.3 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/7. Protecting Assets Subtypes - 3.srt 11.3 kB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/4. Learning Operating Systems Learning Kernel Mode Execution and Rootkits.srt 11.2 kB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/10. Methods of Encryption Secure Sockets Layer.srt 11.2 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/10. Protecting Assets Learn About ASD.srt 11.0 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/22. Learning Information Systems Architecture Cross site scripting attacks.srt 10.8 kB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/6. System and Computer Architecture Memory Types - 1.srt 10.5 kB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/11. Learning Operating Systems Operating System Security.srt 10.3 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/23. Learning Information Systems Architecture Java applets and ActiveX control.srt 10.2 kB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/8. Security Models Learning Clark-Wilson Model - 1.srt 10.2 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/20. Learning Information Systems Architecture SSO For Web Applications.srt 10.0 kB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/3. Cyber Security Physical Security Goals.srt 10.0 kB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/11. Methods of Encryption Learning Asymmetric Key Algorithms.srt 9.7 kB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/6. Learning Operating Systems Understanding Processes & Buffers.srt 9.7 kB
  • ~Get Your Files Here !/15. Understanding Message Integrity/3. Understanding Message Integrity Various Hashing Algorithms - 2.srt 9.7 kB
  • ~Get Your Files Here !/3. Learning Layers of Responsibility/5. Section Outro.srt 9.7 kB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/8. System and Computer Architecture Memory Types - 3.srt 9.5 kB
  • ~Get Your Files Here !/4. Learn About Information Classification/2. Learning Information Classification Classifications Levels.srt 9.5 kB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/10. Learning Operating Systems Learning Security Kernel and Reference Monitor.srt 9.5 kB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/12. Methods of Encryption Rivest Shamir Adleman.srt 9.5 kB
  • ~Get Your Files Here !/3. Learning Layers of Responsibility/1. Introduction.srt 9.4 kB
  • ~Get Your Files Here !/4. Learn About Information Classification/9. Learning Information Classification Define Appropriate Protections.srt 9.4 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/15. Methods of Encryption Data Encryption Standard (DES).srt 9.4 kB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/5. Learning Operating Systems Operating System Architectures.srt 9.4 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/7. Methods of Encryption Understanding Symmetric Algorithms.srt 9.3 kB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/13. Section Outro.srt 9.2 kB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/8. Methods of Encryption Confidentiality - 1.srt 9.2 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/16. Methods of Encryption Advanced Encryption Standard (AES).srt 9.1 kB
  • ~Get Your Files Here !/4. Learn About Information Classification/10. Learning Information Classification Apply Classification Labels.srt 9.1 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/19. Learning Information Systems Architecture Data aggregation and Data mining.srt 9.1 kB
  • ~Get Your Files Here !/2. Understanding Information Life Cycle/4. Information Life Cycle What Allows Access.srt 8.9 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/18. Protecting Assets Tools to Securely Delete Content.srt 8.9 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/9. Methods of Encryption Symmetric Cryptography.srt 8.9 kB
  • ~Get Your Files Here !/3. Learning Layers of Responsibility/2. Learning Layers of Responsibility Security Administrator.srt 8.8 kB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/4. Security Models Learning Bell-LaPadula Model - 1.srt 8.8 kB
  • ~Get Your Files Here !/4. Learn About Information Classification/1. Introduction.srt 8.8 kB
  • ~Get Your Files Here !/19. Understanding Cryptography - Attacks/3. Understanding Attacks Cracking Crypto - 2.srt 8.8 kB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/3. Learning Operating Systems Learning the Architectures.srt 8.7 kB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/4. Cyber Security Perimeter Intrusion Detection.srt 8.7 kB
  • ~Get Your Files Here !/15. Understanding Message Integrity/1. Introduction.srt 8.7 kB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/10. Section Outro.srt 8.6 kB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/5. Cyber Security Understanding Zones.srt 8.6 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/21. Learning Information Systems Architecture Learn and Understand Mobile Code.srt 8.6 kB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/6. Cyber Security Physical Environment.srt 8.6 kB
  • ~Get Your Files Here !/21. Part II - Security Engineering Summary/1. Summary.srt 8.5 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/23. Methods of Encryption Hash Message Authentication Code.srt 8.5 kB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/5. Methods of Encryption Cryptographic Keys.srt 8.4 kB
  • ~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/7. Section Outro.srt 8.4 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/11. Learning Information Systems Architecture Understanding Database Types.srt 8.4 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/10. Learning Information Systems Architecture Applications.srt 8.3 kB
  • ~Get Your Files Here !/5. Learn and Understand Retention Policies/2. Learning Retention Policies Data Must Be Securely Maintained - 2.srt 8.3 kB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/6. Methods of Encryption Learning Secure Key Distribution.srt 8.2 kB
  • ~Get Your Files Here !/12. Understanding Computing Systems Virtualization/4. Computing Systems Virtualization Virtual Desktop Infrastructure.srt 8.2 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/16. Learning Information Systems Architecture Database Middleware - 1.srt 8.1 kB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/9. Cyber Security Rating, Placement, Inspection, Training.srt 8.0 kB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/15. Section Outro.srt 8.0 kB
  • ~Get Your Files Here !/18. Learn More About Cryptography/8. Section Outro.srt 7.8 kB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/2. Learning Operating Systems User Mode & Kernel Mode.srt 7.8 kB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/9. Learning Operating Systems Memory Management.srt 7.7 kB
  • ~Get Your Files Here !/18. Learn More About Cryptography/5. Learn More About Cryptography Public Key Infrastructure - 4.srt 7.6 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/6. Learning Information Systems Architecture Private Cloud and Public Cloud.srt 7.5 kB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/5. System and Computer Architecture Computer Systems.srt 7.4 kB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/2. Cyber Security Threats.srt 7.4 kB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/3. Security Models Three Foundational Models.srt 7.3 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/17. Learning Information Systems Architecture Database Middleware - 2.srt 7.3 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/12. Learning Information Systems Architecture Object oriented - Database.srt 7.2 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/14. Methods of Encryption Understanding The Ciphers.srt 7.1 kB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/13. Security Models The Requirements.srt 7.1 kB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/3. Methods of Encryption Asymmetric Keys and Authentication.srt 7.0 kB
  • ~Get Your Files Here !/18. Learn More About Cryptography/7. Learn More About Cryptography Secure Electronic Transaction.srt 7.0 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/3. Learning Information Systems Architecture Mobile Device Management - 2.srt 7.0 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/12. Methods of Encryption Understanding The Principles.srt 7.0 kB
  • ~Get Your Files Here !/4. Learn About Information Classification/8. Learning Information Classification Define Classifications.srt 6.9 kB
  • ~Get Your Files Here !/18. Learn More About Cryptography/6. Learn More About Cryptography Pretty Good Privacy.srt 6.8 kB
  • ~Get Your Files Here !/4. Learn About Information Classification/11. Implement Protective and Monitoring Technologies - 1.srt 6.8 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/5. Protecting Assets Subtypes - 1.srt 6.8 kB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/7. Methods of Encryption Learn and Understand Digital Signature Verification.srt 6.7 kB
  • ~Get Your Files Here !/12. Understanding Computing Systems Virtualization/1. Introduction.srt 6.7 kB
  • ~Get Your Files Here !/3. Learning Layers of Responsibility/4. Learning Layers of Responsibility Data Custodian & User.srt 6.7 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/13. Methods of Encryption Crypto Machines.srt 6.7 kB
  • ~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/5. Definitions and Concepts The Strength of the Cryptosystem & Crypto Terms.srt 6.6 kB
  • ~Get Your Files Here !/4. Learn About Information Classification/3. Understanding Information Classification - 1.srt 6.6 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/19. Methods of Encryption Output Feedback Mode (OFB).srt 6.6 kB
  • ~Get Your Files Here !/4. Learn About Information Classification/12. Implement Protective and Monitoring Technologies - 2.srt 6.6 kB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/7. Cyber Security Classes of Fire.srt 6.3 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/7. Learning Information Systems Architecture Terms to Consider.srt 6.3 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/5. Learning Information Systems Architecture Distributed Systems.srt 6.2 kB
  • ~Get Your Files Here !/12. Understanding Computing Systems Virtualization/2. Computing Systems Virtualization Virtual Machines.srt 6.2 kB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/10. System and Computer Architecture Memory Types - 4.srt 6.2 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/24. Learning Information Systems Architecture Web Application Issues - 1.srt 6.1 kB
  • ~Get Your Files Here !/4. Learn About Information Classification/13. Learning Information Classification Data Classification - Provide Training.srt 6.1 kB
  • ~Get Your Files Here !/4. Learn About Information Classification/4. Understanding Information Classification - 2.srt 6.0 kB
  • ~Get Your Files Here !/15. Understanding Message Integrity/2. Understanding Message Integrity Various Hashing Algorithms - 1.srt 6.0 kB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/8. Cyber Security Understanding Fire Detectors.srt 6.0 kB
  • ~Get Your Files Here !/2. Understanding Information Life Cycle/5. Information Life Cycle Confidentiality, Integrity, and Availability - 1.srt 5.9 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/6. Protecting Assets Subtypes - 2.srt 5.9 kB
  • ~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/3. Definitions and Concepts Crypto to Protect the Data.srt 5.8 kB
  • ~Get Your Files Here !/18. Learn More About Cryptography/4. Learn More About Cryptography Public Key Infrastructure - 3.srt 5.8 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/11. Methods of Encryption Exclusive OR (XOR).srt 5.8 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/3. Protecting Assets Technical.srt 5.8 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/16. Protecting Assets Learn and Understand Data Remanence - 1.srt 5.7 kB
  • ~Get Your Files Here !/5. Learn and Understand Retention Policies/1. Learning Retention Policies Data Must Be Securely Maintained - 1.srt 5.7 kB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/9. System and Computer Architecture Read-only Memory (ROM).srt 5.7 kB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/14. Security Models Information Technology Security Evaluation Criteria.srt 5.6 kB
  • ~Get Your Files Here !/19. Understanding Cryptography - Attacks/1. Introduction.srt 5.6 kB
  • ~Get Your Files Here !/3. Learning Layers of Responsibility/3. Learning Layers of Responsibility Data Owner & System Custodian.srt 5.5 kB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/1. Introduction.srt 5.5 kB
  • ~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/2. Definitions and Concepts Cryptographic Services.srt 5.4 kB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/8. Learning Operating Systems States and Management.srt 5.4 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/18. Learning Information Systems Architecture Data warehouse and Data mart.srt 5.3 kB
  • ~Get Your Files Here !/7. Part I - Asset Security Summary/1. Summary.srt 5.3 kB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/7. System and Computer Architecture Memory Types - 2.srt 5.3 kB
  • ~Get Your Files Here !/4. Learn About Information Classification/6. Learning Information Classification Data At Rest.srt 5.3 kB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/5. Security Models Learning Bell-LaPadula Model - 2.srt 5.3 kB
  • ~Get Your Files Here !/18. Learn More About Cryptography/3. Learn More About Cryptography Public Key Infrastructure - 2.srt 5.3 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/6. Methods of Encryption Symmetric Key Distribution.srt 5.3 kB
  • ~Get Your Files Here !/15. Understanding Message Integrity/5. Understanding Message Integrity Symmetric Algorithms.srt 5.3 kB
  • ~Get Your Files Here !/4. Learn About Information Classification/7. Learning Information Classification Assign an Accurate Value to Each Asset.srt 5.2 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/9. Protecting Assets Using Accepted Standards - 2.srt 5.1 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/24. Section Outro.srt 5.1 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/15. Protecting Assets Handling Data & Removable Media.srt 5.0 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/11. Protecting Assets Standards and Baselines.srt 5.0 kB
  • ~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/6. Definitions and Concepts Understanding Keys.srt 5.0 kB
  • ~Get Your Files Here !/4. Learn About Information Classification/5. Learning Information Classification Develop An Inventory of Data Assets.srt 4.9 kB
  • ~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/4. Definitions and Concepts Learn and Understand Algorithms.srt 4.9 kB
  • ~Get Your Files Here !/4. Learn About Information Classification/14. Section Outro.srt 4.9 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/9. Learning Information Systems Architecture The Internet of Things.srt 4.7 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/21. Methods of Encryption Counter Mode (CTR).srt 4.7 kB
  • ~Get Your Files Here !/18. Learn More About Cryptography/1. Introduction.srt 4.7 kB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/9. Methods of Encryption Confidentiality - 2.srt 4.7 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/22. Methods of Encryption Understanding MAC.srt 4.7 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/2. Learning Information Systems Architecture Mobile Device Management - 1.srt 4.6 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/15. Learning Information Systems Architecture Database Issues.srt 4.6 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/4. Learning Information Systems Architecture P2P Computing.srt 4.6 kB
  • ~Get Your Files Here !/15. Understanding Message Integrity/4. Understanding Message Integrity Understanding Good Hashing Algorithms.srt 4.6 kB
  • ~Get Your Files Here !/12. Understanding Computing Systems Virtualization/3. Computing Systems Virtualization Understanding Softwares.srt 4.4 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/1. Introduction.srt 4.4 kB
  • ~Get Your Files Here !/18. Learn More About Cryptography/2. Learn More About Cryptography Public Key Infrastructure - 1.srt 4.2 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/1. Introduction.srt 4.2 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/25. Learning Information Systems Architecture Web Application Issues - 2.srt 4.2 kB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/12. Security Models The Trusted Computing Security Evaluation Criteria.srt 4.2 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/14. Learning Information Systems Architecture Redundancy.srt 4.2 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/2. Protecting Assets Administrative.srt 4.1 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/2. Methods of Encryption Cryptographic Services.srt 4.0 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/17. Methods of Encryption Electronic Code Book Mode (ECB).srt 3.9 kB
  • ~Get Your Files Here !/19. Understanding Cryptography - Attacks/6. Understanding Attacks Chosen-Plaintext Attacks.srt 3.9 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/8. Methods of Encryption Cryptanalysis.srt 3.9 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/20. Methods of Encryption Cipher Feedback Mode (CFB).srt 3.9 kB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/2. Methods of Encryption Cryptographic Services.srt 3.8 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/1. Introduction.srt 3.7 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/18. Methods of Encryption Cipher Block Chaining Mode (CBC).srt 3.7 kB
  • ~Get Your Files Here !/11. Learn and Understand Operating Systems/7. Learning Operating Systems The Buffer Overflow Attack.srt 3.7 kB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/3. System and Computer Architecture CPU Instruction Sets.srt 3.6 kB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/2. Security Models Models & Standards & Protocols.srt 3.6 kB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/9. Security Models Learning Clark-Wilson Model - 2.srt 3.5 kB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/1. Introduction.srt 3.4 kB
  • ~Get Your Files Here !/2. Understanding Information Life Cycle/6. Information Life Cycle Confidentiality, Integrity, and Availability - 2.srt 3.4 kB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/10. Security Models Learning Brewer and Nash Model.srt 3.4 kB
  • ~Get Your Files Here !/6. Protecting Assets - Data Security Controls/4. Protecting Assets Physical.srt 3.3 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/13. Learning Information Systems Architecture Integrity.srt 3.1 kB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/4. System and Computer Architecture CPU Capabilities.srt 3.1 kB
  • ~Get Your Files Here !/5. Learn and Understand Retention Policies/4. Ensure Retention Policies Meet Compliance Requirements - 2.srt 3.0 kB
  • ~Get Your Files Here !/10. Learning System & Computer Architecture/2. System and Computer Architecture The Central Processing Unit.srt 3.0 kB
  • ~Get Your Files Here !/5. Learn and Understand Retention Policies/3. Ensure Retention Policies Meet Compliance Requirements - 1.srt 2.9 kB
  • ~Get Your Files Here !/8. Part II - Security Engineering/1. Introduction to Security Engineering.srt 2.9 kB
  • ~Get Your Files Here !/19. Understanding Cryptography - Attacks/2. Understanding Attacks Cracking Crypto - 1.srt 2.9 kB
  • ~Get Your Files Here !/15. Understanding Message Integrity/6. Section Outro.srt 2.7 kB
  • ~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/1. Getting Started.srt 2.6 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/3. Methods of Encryption Symmetric Key Algorithms For Confidentiality.srt 2.6 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/8. Learning Information Systems Architecture Grid Computing.srt 2.6 kB
  • ~Get Your Files Here !/13. Understanding Information Systems Architecture/26. Section Outro.srt 2.6 kB
  • ~Get Your Files Here !/19. Understanding Cryptography - Attacks/7. Understanding Attacks Chosen-Ciphertext Attacks.srt 2.5 kB
  • ~Get Your Files Here !/19. Understanding Cryptography - Attacks/4. Understanding Attacks Ciphertext-Only Attacks.srt 2.2 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/10. Methods of Encryption Understanding Boolean Logic.srt 2.2 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/4. Methods of Encryption Symmetric Key Algorithms For Authentication.srt 2.1 kB
  • ~Get Your Files Here !/14. Understanding Cryptography Definitions and Concepts/1. Introduction.srt 2.0 kB
  • ~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/4. Methods of Encryption Asymmetric Keys and Integrity.srt 1.9 kB
  • ~Get Your Files Here !/19. Understanding Cryptography - Attacks/5. Understanding Attacks Known-Plaintext Attacks.srt 1.5 kB
  • ~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/5. Methods of Encryption Symmetric Key Algorithms For Integrity.srt 1.5 kB
  • ~Get Your Files Here !/20. Cyber Security - Physical System Security/1. Introduction.srt 1.2 kB
  • ~Get Your Files Here !/1. Welcome Part I - Asset Security/1. Introduction.srt 677 Bytes
  • ~Get Your Files Here !/Bonus Resources.txt 357 Bytes
  • Get Bonus Downloads Here.url 180 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!