BITCQ

CISSP® - Security Operations

Size: 271.6 MB
Magnet link

Name Size
CISSP® - Security Operations/1. Course Overview/01. Course Overview.mp4 3.4 MB
CISSP® - Security Operations/10. Evidence Handling/31. Introduction.mp4 1.1 MB
CISSP® - Security Operations/10. Evidence Handling/32. Rules of Evidence.mp4 3.8 MB
CISSP® - Security Operations/10. Evidence Handling/33. Conclusion.mp4 743 KB
CISSP® - Security Operations/11. Resource Provisioning/34. Introduction.mp4 1.2 MB
CISSP® - Security Operations/11. Resource Provisioning/35. Provisioning Assets.mp4 8.6 MB
CISSP® - Security Operations/11. Resource Provisioning/36. Conclusion.mp4 1.2 MB
CISSP® - Security Operations/12. Recovery Strategies/37. Introduction.mp4 1.2 MB
CISSP® - Security Operations/12. Recovery Strategies/38. Recovery Strategies.mp4 9 MB
CISSP® - Security Operations/12. Recovery Strategies/39. Conclusion.mp4 724 KB
CISSP® - Security Operations/13. Personnel Privacy and Safety/40. Introduction.mp4 738 KB
CISSP® - Security Operations/13. Personnel Privacy and Safety/41. Privacy.mp4 6.4 MB
CISSP® - Security Operations/13. Personnel Privacy and Safety/42. Safety Matters.mp4 12.2 MB
CISSP® - Security Operations/13. Personnel Privacy and Safety/43. Conclusion.mp4 1.4 MB
CISSP® - Security Operations/14. Business Continuity and Disaster Recovery/44. Introduction.mp4 1.3 MB
CISSP® - Security Operations/14. Business Continuity and Disaster Recovery/45. Disaster Recovery and Business Continuity.mp4 9.2 MB
CISSP® - Security Operations/14. Business Continuity and Disaster Recovery/46. Conclusion.mp4 1.5 MB
CISSP® - Security Operations/15. Internal Physical Security/47. Introduction.mp4 1.1 MB
CISSP® - Security Operations/15. Internal Physical Security/48. Alarms, Access Cards, Biometrics, and Locks.mp4 16.2 MB
CISSP® - Security Operations/15. Internal Physical Security/49. Key Controls.mp4 2.7 MB
CISSP® - Security Operations/15. Internal Physical Security/50. Mantraps, Safes, Vaults, and Turnstiles.mp4 5 MB
CISSP® - Security Operations/15. Internal Physical Security/51. Conclusion.mp4 694 KB
CISSP® - Security Operations/16. Securing Assets/52. Introduction.mp4 910 KB
CISSP® - Security Operations/16. Securing Assets/53. Protecting Security Equipment.mp4 7.7 MB
CISSP® - Security Operations/16. Securing Assets/54. Conclusion.mp4 874 KB
CISSP® - Security Operations/17. External Physical Security/55. Introduction.mp4 1.3 MB
CISSP® - Security Operations/17. External Physical Security/56. Barriers.mp4 18.8 MB
CISSP® - Security Operations/17. External Physical Security/57. Lighting.mp4 9.1 MB
CISSP® - Security Operations/17. External Physical Security/58. Closed Circuit Television.mp4 2.9 MB
CISSP® - Security Operations/17. External Physical Security/59. Conclusion.mp4 831 KB
CISSP® - Security Operations/2. Introduction to Security Operations/02. Introduction.mp4 2.8 MB
CISSP® - Security Operations/2. Introduction to Security Operations/03. Security Operations Foundations.mp4 4.6 MB
CISSP® - Security Operations/2. Introduction to Security Operations/04. Conclusion.mp4 829 KB
CISSP® - Security Operations/3. Digital Forensics/05. Introduction to Digital Forensics.mp4 2.2 MB
CISSP® - Security Operations/3. Digital Forensics/06. Digital Forensics Foundations.mp4 9.6 MB
CISSP® - Security Operations/3. Digital Forensics/07. Creating a Digital Forensics Capability.mp4 13.1 MB
CISSP® - Security Operations/3. Digital Forensics/08. Conclusion.mp4 1.3 MB
CISSP® - Security Operations/4. Logging and Monitoring/09. Introduction.mp4 869 KB
CISSP® - Security Operations/4. Logging and Monitoring/10. Logging and Monitoring Basics.mp4 6.8 MB
CISSP® - Security Operations/4. Logging and Monitoring/11. Log Management.mp4 9.2 MB
CISSP® - Security Operations/4. Logging and Monitoring/12. Logging and Monitoring Concerns.mp4 9.6 MB
CISSP® - Security Operations/4. Logging and Monitoring/13. Conclusion.mp4 716 KB
CISSP® - Security Operations/5. Vulnerability Management/14. Introduction.mp4 928 KB
CISSP® - Security Operations/5. Vulnerability Management/15. Vulnerability Assessment.mp4 9.4 MB
CISSP® - Security Operations/5. Vulnerability Management/16. Patch Management.mp4 7.1 MB
CISSP® - Security Operations/5. Vulnerability Management/17. Conclusion.mp4 861 KB
CISSP® - Security Operations/6. Change Management/18. Introduction.mp4 924 KB
CISSP® - Security Operations/6. Change Management/19. Change Control Process.mp4 11.9 MB
CISSP® - Security Operations/6. Change Management/20. Conclusion.mp4 880 KB
CISSP® - Security Operations/7. Operate and Maintain Protective Controls/21. Introduction.mp4 1.2 MB
CISSP® - Security Operations/7. Operate and Maintain Protective Controls/22. Maintaining and Operating Protective Controls.mp4 14.3 MB
CISSP® - Security Operations/7. Operate and Maintain Protective Controls/23. Important Terms and Conclusion.mp4 3 MB
CISSP® - Security Operations/8. Incident Management/24. Introduction.mp4 813 KB
CISSP® - Security Operations/8. Incident Management/25. Creating an Incident Response Capability.mp4 4.7 MB
CISSP® - Security Operations/8. Incident Management/26. Incident Response Life Cycle.mp4 5.4 MB
CISSP® - Security Operations/8. Incident Management/27. Conclusion.mp4 574 KB
CISSP® - Security Operations/9. Investigative Types/28. Introduction.mp4 1 MB
CISSP® - Security Operations/9. Investigative Types/29. Investigative Types.mp4 4.9 MB
CISSP® - Security Operations/9. Investigative Types/30. Conclusion.mp4 1.2 MB
CISSP® - Security Operations/cissp-security-operations.zip 9 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
CISSP® - Security Operations Video 271.6 MB 5

Loading...