资源详情

返回首页 | 相关搜索
[ CourseWikia.com ] Linkedin - Managing Information Security Operations
大小 81.3 MB
文件数 22
Info Hash: 01BEA764C9F5A626F7392E691A715F8AC24DCED5
收录时间 2026-01-22 20:09:27
更新时间 2026-01-22 20:09:27
文件列表 (22)
Get Bonus Downloads Here.url
181 B
~Get Your Files Here !/01 - Introduction/01 - Essential skills for security operations management.mp4
2.11 MB
~Get Your Files Here !/01 - Introduction/01 - Essential skills for security operations management.srt
1.18 KB
~Get Your Files Here !/02 - 1. How to Set Up and Ensure the Security of Resources/01 - Creating and maintaining an accurate asset inventory.mp4
10.82 MB
~Get Your Files Here !/02 - 1. How to Set Up and Ensure the Security of Resources/01 - Creating and maintaining an accurate asset inventory.srt
5.61 KB
~Get Your Files Here !/02 - 1. How to Set Up and Ensure the Security of Resources/02 - Configuration management Ensuring consistency and security.mp4
8.67 MB
~Get Your Files Here !/02 - 1. How to Set Up and Ensure the Security of Resources/02 - Configuration management Ensuring consistency and security.srt
5.05 KB
~Get Your Files Here !/03 - 2. Essential Concepts for Implementing Strong Security Operations/01 - Implementing the principle of least privilege.mp4
10.21 MB
~Get Your Files Here !/03 - 2. Essential Concepts for Implementing Strong Security Operations/01 - Implementing the principle of least privilege.srt
5.67 KB
~Get Your Files Here !/03 - 2. Essential Concepts for Implementing Strong Security Operations/02 - Managing separation of duties effectively.mp4
9.37 MB
~Get Your Files Here !/03 - 2. Essential Concepts for Implementing Strong Security Operations/02 - Managing separation of duties effectively.srt
5.54 KB
~Get Your Files Here !/03 - 2. Essential Concepts for Implementing Strong Security Operations/03 - Information lifecycle Data retention and disposal.mp4
8.06 MB
~Get Your Files Here !/03 - 2. Essential Concepts for Implementing Strong Security Operations/03 - Information lifecycle Data retention and disposal.srt
4.6 KB
~Get Your Files Here !/04 - 3. Implementing Patch, Vulnerability, and Change Management for Your Systems/01 - Vulnerability management Lowering risks to your systems.mp4
10.53 MB
~Get Your Files Here !/04 - 3. Implementing Patch, Vulnerability, and Change Management for Your Systems/01 - Vulnerability management Lowering risks to your systems.srt
4.83 KB
~Get Your Files Here !/04 - 3. Implementing Patch, Vulnerability, and Change Management for Your Systems/02 - Patch management Keeping your systems up to date and secure.mp4
9.56 MB
~Get Your Files Here !/04 - 3. Implementing Patch, Vulnerability, and Change Management for Your Systems/02 - Patch management Keeping your systems up to date and secure.srt
5.06 KB
~Get Your Files Here !/04 - 3. Implementing Patch, Vulnerability, and Change Management for Your Systems/03 - Change management Conducting a security impact analysis.mp4
9.63 MB
~Get Your Files Here !/04 - 3. Implementing Patch, Vulnerability, and Change Management for Your Systems/03 - Change management Conducting a security impact analysis.srt
4.97 KB
~Get Your Files Here !/05 - Conclusion/01 - Continue learning about managing security operations.mp4
2.3 MB
~Get Your Files Here !/05 - Conclusion/01 - Continue learning about managing security operations.srt
1.45 KB
~Get Your Files Here !/Bonus Resources.txt
386 B

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。