BITCQ

Pluralsight - CISSP - Security and Risk Management

Size: 434 MB
Magnet link

Name Size
Pluralsight - CISSP - Security and Risk Management/00.Course Overview/0001.Course Overview.mp4 6.4 MB
Pluralsight - CISSP - Security and Risk Management/01.Introduction/0101.Introduction.mp4 8.9 MB
Pluralsight - CISSP - Security and Risk Management/02.Fundamental Security Principles/0204.The CIA Triad.mp4 15.5 MB
Pluralsight - CISSP - Security and Risk Management/02.Fundamental Security Principles/0205.Accountability and Assurance.mp4 8.8 MB
Pluralsight - CISSP - Security and Risk Management/02.Fundamental Security Principles/0202.Security and Risk Management Fundamentals.mp4 8.2 MB
Pluralsight - CISSP - Security and Risk Management/02.Fundamental Security Principles/0207.Delaying, Preventing, or Detecting Attacks.mp4 7.1 MB
Pluralsight - CISSP - Security and Risk Management/02.Fundamental Security Principles/0209.Ethics.mp4 4.7 MB
Pluralsight - CISSP - Security and Risk Management/02.Fundamental Security Principles/0208.Due Care and Due Diligence.mp4 3.5 MB
Pluralsight - CISSP - Security and Risk Management/02.Fundamental Security Principles/0201.Introduction.mp4 3.2 MB
Pluralsight - CISSP - Security and Risk Management/02.Fundamental Security Principles/0203.Balancing Business and Security.mp4 3.2 MB
Pluralsight - CISSP - Security and Risk Management/02.Fundamental Security Principles/0206.Control Types.mp4 3 MB
Pluralsight - CISSP - Security and Risk Management/02.Fundamental Security Principles/0210.Conclusion.mp4 1.2 MB
Pluralsight - CISSP - Security and Risk Management/03.Legal and Regulatory/0305.Important Laws.mp4 11.7 MB
Pluralsight - CISSP - Security and Risk Management/03.Legal and Regulatory/0303.Criminal and Civil Law.mp4 3.7 MB
Pluralsight - CISSP - Security and Risk Management/03.Legal and Regulatory/0304.Administrative Law.mp4 3.4 MB
Pluralsight - CISSP - Security and Risk Management/03.Legal and Regulatory/0301.Introduction.mp4 1.6 MB
Pluralsight - CISSP - Security and Risk Management/03.Legal and Regulatory/0302.Legal Systems.mp4 976 KB
Pluralsight - CISSP - Security and Risk Management/03.Legal and Regulatory/0306.Summary.mp4 626 KB
Pluralsight - CISSP - Security and Risk Management/04.Computer Crime/0406.Payback and Government Hackers.mp4 5.5 MB
Pluralsight - CISSP - Security and Risk Management/04.Computer Crime/0402.Computers Can Be Used for EVIL.mp4 5.4 MB
Pluralsight - CISSP - Security and Risk Management/04.Computer Crime/0405.Spies Are Real.mp4 5 MB
Pluralsight - CISSP - Security and Risk Management/04.Computer Crime/0408.Fraud, Spam, and Slander.mp4 4.5 MB
Pluralsight - CISSP - Security and Risk Management/04.Computer Crime/0404.It's All About the Money.mp4 4 MB
Pluralsight - CISSP - Security and Risk Management/04.Computer Crime/0403.Some Hack Just Because They Can.mp4 2.9 MB
Pluralsight - CISSP - Security and Risk Management/04.Computer Crime/0407.Theft, Vandalism, and Trespass.mp4 2.8 MB
Pluralsight - CISSP - Security and Risk Management/04.Computer Crime/0409.Conclusion.mp4 2.6 MB
Pluralsight - CISSP - Security and Risk Management/04.Computer Crime/0401.Introduction.mp4 1.3 MB
Pluralsight - CISSP - Security and Risk Management/05.Intellectual Property/0502.Patents.mp4 3.6 MB
Pluralsight - CISSP - Security and Risk Management/05.Intellectual Property/0504.Copyrights.mp4 2.7 MB
Pluralsight - CISSP - Security and Risk Management/05.Intellectual Property/0503.Trademarks and Trade Secrets.mp4 2.3 MB
Pluralsight - CISSP - Security and Risk Management/05.Intellectual Property/0501.Introduction.mp4 1.1 MB
Pluralsight - CISSP - Security and Risk Management/05.Intellectual Property/0505.Summary.mp4 632 KB
Pluralsight - CISSP - Security and Risk Management/06.Privacy/0603.Privacy Law Examples.mp4 14.6 MB
Pluralsight - CISSP - Security and Risk Management/06.Privacy/0602.Privacy Matters.mp4 8.1 MB
Pluralsight - CISSP - Security and Risk Management/06.Privacy/0601.Introduction.mp4 1.7 MB
Pluralsight - CISSP - Security and Risk Management/06.Privacy/0604.Conclusion.mp4 1.6 MB
Pluralsight - CISSP - Security and Risk Management/07.Licensing/0705.Commercial Versus Non-commercial Licensing.mp4 4.7 MB
Pluralsight - CISSP - Security and Risk Management/07.Licensing/0707.Free Software.mp4 4.6 MB
Pluralsight - CISSP - Security and Risk Management/07.Licensing/0704.Open Versus Closed Source Licensing.mp4 4 MB
Pluralsight - CISSP - Security and Risk Management/07.Licensing/0702.Reasons for Licensing.mp4 3.2 MB
Pluralsight - CISSP - Security and Risk Management/07.Licensing/0709.Shareware.mp4 1.8 MB
Pluralsight - CISSP - Security and Risk Management/07.Licensing/0708.Demo and Trial Licenses.mp4 1.7 MB
Pluralsight - CISSP - Security and Risk Management/07.Licensing/0710.Academic Software Licensing.mp4 1.2 MB
Pluralsight - CISSP - Security and Risk Management/07.Licensing/0711.Summary.mp4 1.2 MB
Pluralsight - CISSP - Security and Risk Management/07.Licensing/0701.Introduction.mp4 1.1 MB
Pluralsight - CISSP - Security and Risk Management/07.Licensing/0706.End User License Agreements.mp4 1.1 MB
Pluralsight - CISSP - Security and Risk Management/07.Licensing/0703.License Types.mp4 496 KB
Pluralsight - CISSP - Security and Risk Management/08.Trans-border Data Flow/0802.Trans-border Data Flow.mp4 8.2 MB
Pluralsight - CISSP - Security and Risk Management/08.Trans-border Data Flow/0803.Import and Export Controls.mp4 4.7 MB
Pluralsight - CISSP - Security and Risk Management/08.Trans-border Data Flow/0804.Summary.mp4 1.8 MB
Pluralsight - CISSP - Security and Risk Management/08.Trans-border Data Flow/0801.Introduction.mp4 1.4 MB
Pluralsight - CISSP - Security and Risk Management/09.Security Awareness/0902.Develop a Culture of Security Awareness.mp4 8.6 MB
Pluralsight - CISSP - Security and Risk Management/09.Security Awareness/0905.Awareness Validation.mp4 8.1 MB
Pluralsight - CISSP - Security and Risk Management/09.Security Awareness/0903.Types of Security Awareness.mp4 5 MB
Pluralsight - CISSP - Security and Risk Management/09.Security Awareness/0904.Expected Impact of Training.mp4 3.9 MB
Pluralsight - CISSP - Security and Risk Management/09.Security Awareness/0901.Introduction.mp4 1.7 MB
Pluralsight - CISSP - Security and Risk Management/09.Security Awareness/0906.Summary.mp4 1.3 MB
Pluralsight - CISSP - Security and Risk Management/10.Aligning Security to the Organization/1003.Roles and Responsibilities.mp4 11.3 MB
Pluralsight - CISSP - Security and Risk Management/10.Aligning Security to the Organization/1005.Security Goals.mp4 5.9 MB
Pluralsight - CISSP - Security and Risk Management/10.Aligning Security to the Organization/1004.Organizational Objectives.mp4 2.8 MB
Pluralsight - CISSP - Security and Risk Management/10.Aligning Security to the Organization/1006.Security Mission.mp4 2.4 MB
Pluralsight - CISSP - Security and Risk Management/10.Aligning Security to the Organization/1001.Introduction.mp4 1.8 MB
Pluralsight - CISSP - Security and Risk Management/10.Aligning Security to the Organization/1007.Conclusion.mp4 1.3 MB
Pluralsight - CISSP - Security and Risk Management/10.Aligning Security to the Organization/1002.Governance.mp4 1 MB
Pluralsight - CISSP - Security and Risk Management/11.Creating Policies, Procedures, Guidelines, and Baselines/1102.Security Frameworks Introduction.mp4 7.6 MB
Pluralsight - CISSP - Security and Risk Management/11.Creating Policies, Procedures, Guidelines, and Baselines/1103.Effective Policies and Procedures.mp4 7.5 MB
Pluralsight - CISSP - Security and Risk Management/11.Creating Policies, Procedures, Guidelines, and Baselines/1104.Policy Sections.mp4 5.3 MB
Pluralsight - CISSP - Security and Risk Management/11.Creating Policies, Procedures, Guidelines, and Baselines/1105.Procedures.mp4 4.9 MB
Pluralsight - CISSP - Security and Risk Management/11.Creating Policies, Procedures, Guidelines, and Baselines/1107.Baselines.mp4 3.8 MB
Pluralsight - CISSP - Security and Risk Management/11.Creating Policies, Procedures, Guidelines, and Baselines/1108.Summary.mp4 2.4 MB
Pluralsight - CISSP - Security and Risk Management/11.Creating Policies, Procedures, Guidelines, and Baselines/1101.Introduction.mp4 1.9 MB
Pluralsight - CISSP - Security and Risk Management/11.Creating Policies, Procedures, Guidelines, and Baselines/1106.Guidelines.mp4 1.9 MB
Pluralsight - CISSP - Security and Risk Management/12.Continuity Planning and Disaster Recovery/1208.Disaster Recovery Controls.mp4 3.6 MB
Pluralsight - CISSP - Security and Risk Management/12.Continuity Planning and Disaster Recovery/1204.Disaster Recovery Planning vs. Business Continuity Planning.mp4 2.8 MB
Pluralsight - CISSP - Security and Risk Management/12.Continuity Planning and Disaster Recovery/1205.Testing Your Plans.mp4 2.5 MB
Pluralsight - CISSP - Security and Risk Management/12.Continuity Planning and Disaster Recovery/1201.Introduction.mp4 1.9 MB
Pluralsight - CISSP - Security and Risk Management/12.Continuity Planning and Disaster Recovery/1203.Conducting a Business Impact Analysis.mp4 1.8 MB
Pluralsight - CISSP - Security and Risk Management/12.Continuity Planning and Disaster Recovery/1202.Business Continuity Process.mp4 1.7 MB
Pluralsight - CISSP - Security and Risk Management/12.Continuity Planning and Disaster Recovery/1207.Recovering from Disaster.mp4 1.4 MB
Pluralsight - CISSP - Security and Risk Management/12.Continuity Planning and Disaster Recovery/1206.Disaster Events.mp4 958 KB
Pluralsight - CISSP - Security and Risk Management/12.Continuity Planning and Disaster Recovery/1209.Conclusion.mp4 632 KB
Pluralsight - CISSP - Security and Risk Management/13.Threat Modeling/1307.Threat Identification using STRIDE.mp4 4.9 MB
Pluralsight - CISSP - Security and Risk Management/13.Threat Modeling/1303.Threat Modeling Focus.mp4 4.6 MB
Pluralsight - CISSP - Security and Risk Management/13.Threat Modeling/1302.Threat Modeling Overview.mp4 3.7 MB
Pluralsight - CISSP - Security and Risk Management/13.Threat Modeling/1304.Threat Model - Scoping.mp4 3.3 MB
Pluralsight - CISSP - Security and Risk Management/13.Threat Modeling/1301.Introduction.mp4 1.9 MB
Pluralsight - CISSP - Security and Risk Management/13.Threat Modeling/1305.Reviewing the Architecture.mp4 1.9 MB
Pluralsight - CISSP - Security and Risk Management/13.Threat Modeling/1308.Defining and Documenting Countermeasures.mp4 1.8 MB
Pluralsight - CISSP - Security and Risk Management/13.Threat Modeling/1310.Summary.mp4 1.6 MB
Pluralsight - CISSP - Security and Risk Management/13.Threat Modeling/1306.Decomposing.mp4 1.6 MB
Pluralsight - CISSP - Security and Risk Management/13.Threat Modeling/1309.Prioritization with DREAD.mp4 1 MB
Pluralsight - CISSP - Security and Risk Management/14.Risk Assessment Concepts/1408.Real World Threats and Vulnerabilities.mp4 3.3 MB
Pluralsight - CISSP - Security and Risk Management/14.Risk Assessment Concepts/1411.Risk Acceptance and Assignment.mp4 3.2 MB
Pluralsight - CISSP - Security and Risk Management/14.Risk Assessment Concepts/1403.Threat Source.mp4 2.8 MB
Pluralsight - CISSP - Security and Risk Management/14.Risk Assessment Concepts/1406.Risk Assessments.mp4 2.8 MB
Pluralsight - CISSP - Security and Risk Management/14.Risk Assessment Concepts/1402.Threats.mp4 2.6 MB
Pluralsight - CISSP - Security and Risk Management/14.Risk Assessment Concepts/1407.Risk Assessment Methodologies.mp4 2.6 MB
Pluralsight - CISSP - Security and Risk Management/14.Risk Assessment Concepts/1401.Introduction.mp4 2 MB
Pluralsight - CISSP - Security and Risk Management/14.Risk Assessment Concepts/1404.Vulnerabilities.mp4 2 MB
Pluralsight - CISSP - Security and Risk Management/14.Risk Assessment Concepts/1412.Common Calculations.mp4 1.5 MB
Pluralsight - CISSP - Security and Risk Management/14.Risk Assessment Concepts/1413.Conclusion.mp4 1.1 MB
Pluralsight - CISSP - Security and Risk Management/14.Risk Assessment Concepts/1410.Analysis Approach.mp4 1 MB
Pluralsight - CISSP - Security and Risk Management/14.Risk Assessment Concepts/1409.Assessment Approach.mp4 870 KB
Pluralsight - CISSP - Security and Risk Management/14.Risk Assessment Concepts/1405.Risk.mp4 754 KB
Pluralsight - CISSP - Security and Risk Management/15.Countermeasure Selection Process/1508.Example Countermeasures.mp4 5.8 MB
Pluralsight - CISSP - Security and Risk Management/15.Countermeasure Selection Process/1506.Assessing Control Strength.mp4 3.3 MB
Pluralsight - CISSP - Security and Risk Management/15.Countermeasure Selection Process/1505.Control Considerations.mp4 2.9 MB
Pluralsight - CISSP - Security and Risk Management/15.Countermeasure Selection Process/1504.Control Types.mp4 2.4 MB
Pluralsight - CISSP - Security and Risk Management/15.Countermeasure Selection Process/1502.What Is a Countermeasure.mp4 2 MB
Pluralsight - CISSP - Security and Risk Management/15.Countermeasure Selection Process/1503.Control Variations.mp4 2 MB
Pluralsight - CISSP - Security and Risk Management/15.Countermeasure Selection Process/1501.Introduction.mp4 2 MB
Pluralsight - CISSP - Security and Risk Management/15.Countermeasure Selection Process/1509.Conclusion.mp4 1.2 MB
Pluralsight - CISSP - Security and Risk Management/15.Countermeasure Selection Process/1507.Countermeasure Assurance.mp4 1.1 MB
Pluralsight - CISSP - Security and Risk Management/16.Frameworks/1604.NIST Risk Management Framework RMF.mp4 8.6 MB
Pluralsight - CISSP - Security and Risk Management/16.Frameworks/1605.FAIR.mp4 4.1 MB
Pluralsight - CISSP - Security and Risk Management/16.Frameworks/1606.OCTAVE Allegro.mp4 3.1 MB
Pluralsight - CISSP - Security and Risk Management/16.Frameworks/1601.Introduction.mp4 2.6 MB
Pluralsight - CISSP - Security and Risk Management/16.Frameworks/1603.Leveraging Frameworks.mp4 1.9 MB
Pluralsight - CISSP - Security and Risk Management/16.Frameworks/1602.Risk Management Framework.mp4 1.2 MB
Pluralsight - CISSP - Security and Risk Management/16.Frameworks/1607.Summary.mp4 897 KB
Pluralsight - CISSP - Security and Risk Management/Files/cissp-security-risk-management.zip 21.2 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce

Loading...