资源详情

返回首页 | 相关搜索
CBTNuggets - (ISC)² CC Online Training 2023-5
大小 1.98 GB
文件数 67
Info Hash: ED4E16F7348169DAC02B28ADDB1FE1D82EEF21E5
收录时间 2025-12-16 17:09:17
更新时间 2026-01-13 08:13:44
文件列表 (67)
1. Understanding Information Assurance/1. Understanding Information Assurance - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
66.67 MB
Read me.txt
115 B
1. Understanding Information Assurance/2. Methods of Authentication - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
38.18 MB
1. Understanding Information Assurance/3. Multi-Factor Authentication (MFA) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
23.88 MB
1. Understanding Information Assurance/4. Biometrics Factors - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
18.65 MB
1. Understanding Information Assurance/5. Data Privacy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4
31.13 MB
2. Discussing Risk Management, Controls, Ethics and Governance/1. Risk Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
30.41 MB
2. Discussing Risk Management, Controls, Ethics and Governance/2. Risk Treatment - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
19.55 MB
2. Discussing Risk Management, Controls, Ethics and Governance/3. Security Controls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
33.55 MB
2. Discussing Risk Management, Controls, Ethics and Governance/4. Security Control Categories - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4
37.5 MB
2. Discussing Risk Management, Controls, Ethics and Governance/5. ISC2 Code of Ethics - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
18.75 MB
2. Discussing Risk Management, Controls, Ethics and Governance/6. Policies and Procedures - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
27.41 MB
2. Discussing Risk Management, Controls, Ethics and Governance/7. Standards, Regulations and Laws - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
21.45 MB
3. Exploring BC, DR & IR Concepts/1. Intro - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
33.26 MB
3. Exploring BC, DR & IR Concepts/2. Business Continuity - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
12.84 MB
3. Exploring BC, DR & IR Concepts/3. Business Continuity Planning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
34.68 MB
3. Exploring BC, DR & IR Concepts/4. Disaster Recovery - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
16.28 MB
3. Exploring BC, DR & IR Concepts/5. Disaster Recovery Planning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
26.36 MB
3. Exploring BC, DR & IR Concepts/6. Incident Response - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
36.13 MB
3. Exploring BC, DR & IR Concepts/7. After Action and Training - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
21.22 MB
4. Reviewing Access Control Concepts/1. Physical Security Controls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
19.56 MB
4. Reviewing Access Control Concepts/2. Monitoring Controls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
31.72 MB
4. Reviewing Access Control Concepts/3. Authorized Personnel vs Unauthorized Personnel - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
18.29 MB
4. Reviewing Access Control Concepts/4. Principle of Least Privilege - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
25.27 MB
4. Reviewing Access Control Concepts/5. Segregation of Duties - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4
21.8 MB
4. Reviewing Access Control Concepts/6. Types of Access Control - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
35.06 MB
4. Reviewing Access Control Concepts/7. Data and Media Access Control - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
34.9 MB
5. Exploring Security Policies and Training/1. Data Handling Policy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
21.32 MB
5. Exploring Security Policies and Training/2. Password Policy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
17.4 MB
5. Exploring Security Policies and Training/3. Acceptable Use Policy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
18.94 MB
5. Exploring Security Policies and Training/4. Bring Your Own Device (BYOD) Policy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
22.01 MB
5. Exploring Security Policies and Training/5. Change Management Policy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
22.08 MB
5. Exploring Security Policies and Training/6. Privacy Policy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
30.24 MB
5. Exploring Security Policies and Training/7. Security Awareness Training - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
49.61 MB
6. Understanding Data Security and System Hardening/1. Encryption Basics - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
16.56 MB
6. Understanding Data Security and System Hardening/2. Types of Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
44.25 MB
6. Understanding Data Security and System Hardening/3. Data Hashing with Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
36.48 MB
6. Understanding Data Security and System Hardening/4. Digital Signatures with Hashing - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
28.32 MB
6. Understanding Data Security and System Hardening/5. Data Handling - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
34.41 MB
6. Understanding Data Security and System Hardening/6. Data Logging - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
26.78 MB
6. Understanding Data Security and System Hardening/7. Configuration Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
39.65 MB
7. Discussing Network Security Infrastructure/1. Network Segmentation - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4
55.53 MB
7. Discussing Network Security Infrastructure/2. Embedded System Security - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
25.65 MB
7. Discussing Network Security Infrastructure/3. Virtual Private Networks (VPNs) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
18.25 MB
7. Discussing Network Security Infrastructure/4. Defense In Depth and Zero Trust - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4
29.08 MB
7. Discussing Network Security Infrastructure/5. Network Access Control (NAC) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
20.18 MB
7. Discussing Network Security Infrastructure/6. SLAs and MSPs - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
29.88 MB
7. Discussing Network Security Infrastructure/7. The Cloud - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
43.56 MB
8. Exploring Network Threats and Attacks/1. Types of Threats - DoS, DDoS and Malware - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
31.65 MB
8. Exploring Network Threats and Attacks/2. Types of Threats - Main-in-the-middle and Side Channel - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
17.56 MB
8. Exploring Network Threats and Attacks/3. Intrusion Detection Prevention Systems (IDSIPS) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
51.51 MB
8. Exploring Network Threats and Attacks/4. Endpoint Protection and Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
29.64 MB
8. Exploring Network Threats and Attacks/5. Vulnerability Scanning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
43.37 MB
8. Exploring Network Threats and Attacks/6. Firewalls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
52.21 MB
9. Understanding Computer Networking/1. Computer Networking Basics - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
34.9 MB
9. Understanding Computer Networking/2. OSI Model - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
23.79 MB
9. Understanding Computer Networking/3. TCPIP Model - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
40.96 MB
9. Understanding Computer Networking/4. IP Addresses - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
45.27 MB
9. Understanding Computer Networking/5. Wireless Networking - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
4.43 MB
9. Understanding Computer Networking/6. Networking Ports - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
34.78 MB
9. Understanding Computer Networking/7. Common Applications - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
28 MB
10. Exploring On-Premise Network Infrastructure/1. Power - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
62.29 MB
10. Exploring On-Premise Network Infrastructure/2. Data Centers and Closets - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
38.49 MB
10. Exploring On-Premise Network Infrastructure/3. Heating, Ventilation and Air Conditioning (HVAC) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
45.83 MB
10. Exploring On-Premise Network Infrastructure/4. Dealing with Fire - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
25.9 MB
10. Exploring On-Premise Network Infrastructure/5. Redundancy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
36.46 MB
10. Exploring On-Premise Network Infrastructure/6. Working with 3rd Parties - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
14.04 MB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。