资源详情

返回首页 | 相关搜索
[FreeTutorials.Eu] [UDEMY] Cyber Security and Information Security Fundamentals - [FTU]
大小 2.04 GB
文件数 146
Info Hash: 45F66083539E6B153E221895F0EC7C1139AC83B2
收录时间 2026-02-06 18:35:13
更新时间 2026-02-06 18:35:13
文件列表 (146)
1. Introduction/10. Compliance and Ethics.mp4
21.25 MB
1. Introduction/10. Compliance and Ethics.vtt
3.71 KB
1. Introduction/1.10 Notes 5.pdf.pdf
225.15 KB
1. Introduction/1.11 Notes 7.pdf.pdf
240.17 KB
1. Introduction/1.12 Notes 8.pdf.pdf
255.67 KB
1. Introduction/1.13 Notes 12.pdf.pdf
266.76 KB
1. Introduction/1.14 Notes 2.pdf.pdf
223.23 KB
1. Introduction/11. Industry Specific Laws.mp4
31.52 MB
1. Introduction/11. Industry Specific Laws.vtt
4.24 KB
1. Introduction/1.1 Notes 9.pdf.pdf
241.64 KB
1. Introduction/12. Computer Crimes.mp4
17.76 MB
1. Introduction/12. Computer Crimes.vtt
2.78 KB
1. Introduction/1.2 Notes 4.pdf.pdf
219.31 KB
1. Introduction/1.3 Notes 14.pdf.pdf
225.99 KB
1. Introduction/13. Software Licensing.mp4
23.96 MB
1. Introduction/13. Software Licensing.vtt
4.23 KB
1. Introduction/14. Data Breaches and Ethics.mp4
15.68 MB
1. Introduction/14. Data Breaches and Ethics.vtt
2.07 KB
1. Introduction/1.4 Notes 10.pdf.pdf
236.81 KB
1. Introduction/1.5 Notes 3.pdf.pdf
303.42 KB
1. Introduction/15. Security Policy Framework.mp4
18.31 MB
1. Introduction/15. Security Policy Framework.vtt
3.11 KB
1. Introduction/16. Common Policies and Key Principles.mp4
27.13 MB
1. Introduction/16. Common Policies and Key Principles.vtt
5.63 KB
1. Introduction/1.6 Notes 13.pdf.pdf
246.22 KB
1. Introduction/17. Business Continuity Planning.mp4
13.56 MB
1. Introduction/17. Business Continuity Planning.vtt
2.43 KB
1. Introduction/1.7 Notes 6.pdf.pdf
227.97 KB
1. Introduction/18. Business Continuity Controls and Key Technical Concepts.mp4
28.66 MB
1. Introduction/18. Business Continuity Controls and Key Technical Concepts.vtt
4.96 KB
1. Introduction/1.8 Notes 1.pdf.pdf
227.43 KB
1. Introduction/1.9 Notes 11.pdf.pdf
254.93 KB
1. Introduction/19. RAID Technology.mp4
23.88 MB
1. Introduction/19. RAID Technology.vtt
3.26 KB
1. Introduction/1. Introduction.mp4
33.25 MB
1. Introduction/1. Introduction.vtt
2.53 KB
1. Introduction/20. Risk Management.mp4
22.69 MB
1. Introduction/20. Risk Management.vtt
4.47 KB
1. Introduction/21. Risk Assessment Techniques.mp4
23.23 MB
1. Introduction/21. Risk Assessment Techniques.vtt
3.04 KB
1. Introduction/22. Quantitative Risk Factors.mp4
31.42 MB
1. Introduction/22. Quantitative Risk Factors.vtt
5.6 KB
1. Introduction/23. Risk Management Strategies.mp4
25.61 MB
1. Introduction/23. Risk Management Strategies.vtt
3.6 KB
1. Introduction/24. Security Controls.mp4
23.69 MB
1. Introduction/24. Security Controls.vtt
4.42 KB
1. Introduction/25. Understanding Data Security.mp4
19.46 MB
1. Introduction/25. Understanding Data Security.vtt
3.16 KB
1. Introduction/26. Data Security Policies.mp4
26.04 MB
1. Introduction/26. Data Security Policies.vtt
3.46 KB
1. Introduction/27. Data Security Roles.mp4
18.84 MB
1. Introduction/27. Data Security Roles.vtt
3.35 KB
1. Introduction/28. Data Privacy.mp4
30.52 MB
1. Introduction/28. Data Privacy.vtt
4.69 KB
1. Introduction/29. Developing Security Baselines.mp4
22.82 MB
1. Introduction/29. Developing Security Baselines.vtt
3.59 KB
1. Introduction/2. Understanding Information Security.mp4
26.06 MB
1. Introduction/2. Understanding Information Security.vtt
4.9 KB
1. Introduction/30. Leveraging Industry Standards.mp4
45.8 MB
1. Introduction/30. Leveraging Industry Standards.vtt
5.51 KB
1. Introduction/31. Customizing Security Standards.mp4
22.93 MB
1. Introduction/31. Customizing Security Standards.vtt
3.35 KB
1. Introduction/32. Understanding Encryption.mp4
28.65 MB
1. Introduction/32. Understanding Encryption.vtt
2.98 KB
1. Introduction/33. Secure Design Principles.mp4
56.29 MB
1. Introduction/33. Secure Design Principles.vtt
9.31 KB
1. Introduction/34. Security Models.mp4
43.98 MB
1. Introduction/34. Security Models.vtt
6.52 KB
1. Introduction/35. Security Requirements.mp4
74.68 MB
1. Introduction/35. Security Requirements.vtt
10.78 KB
1. Introduction/36. Virtualization.mp4
63.48 MB
1. Introduction/36. Virtualization.vtt
8.98 KB
1. Introduction/37. Cloud Computing Models.mp4
48.98 MB
1. Introduction/37. Cloud Computing Models.vtt
7.02 KB
1. Introduction/38. Public Cloud Tiers.mp4
56.3 MB
1. Introduction/38. Public Cloud Tiers.vtt
6.97 KB
1. Introduction/39. Memory Protection.mp4
62.11 MB
1. Introduction/39. Memory Protection.vtt
7.81 KB
1. Introduction/3. Hashing.mp4
32.85 MB
1. Introduction/3. Hashing.vtt
3.03 KB
1. Introduction/40. Interface Protection.mp4
85.17 MB
1. Introduction/40. Interface Protection.vtt
10.24 KB
1. Introduction/41. High Availability and Fault Tolerance.mp4
47.99 MB
1. Introduction/41. High Availability and Fault Tolerance.vtt
6.55 KB
1. Introduction/42. OWASP Top 10.mp4
40.41 MB
1. Introduction/42. OWASP Top 10.vtt
4.14 KB
1. Introduction/43. SQL Injection Prevention.mp4
26.83 MB
1. Introduction/43. SQL Injection Prevention.vtt
5.34 KB
1. Introduction/44. Cross-Site Scripting Prevention.mp4
31.69 MB
1. Introduction/44. Cross-Site Scripting Prevention.vtt
5.06 KB
1. Introduction/45. Cross-Site Request Forgery.mp4
21.49 MB
1. Introduction/45. Cross-Site Request Forgery.vtt
3.46 KB
1. Introduction/46. Understanding Encryption.mp4
28.66 MB
1. Introduction/46. Understanding Encryption.vtt
2.98 KB
1. Introduction/47. Symmetric and Asymmetric Cryptography.mp4
47.79 MB
1. Introduction/47. Symmetric and Asymmetric Cryptography.vtt
8.23 KB
1. Introduction/48. Cryptography Goals.mp4
15.95 MB
1. Introduction/48. Cryptography Goals.vtt
3.06 KB
1. Introduction/49. Codes and Ciphers.mp4
23.21 MB
1. Introduction/49. Codes and Ciphers.vtt
3.81 KB
1. Introduction/4. Digital Signatures and Digital Certificates.mp4
18.63 MB
1. Introduction/4. Digital Signatures and Digital Certificates.vtt
2.8 KB
1. Introduction/50. Key Lifecycle Management.mp4
81.71 MB
1. Introduction/50. Key Lifecycle Management.vtt
13.46 KB
1. Introduction/51. Data Encryption Standards (DES).mp4
24.69 MB
1. Introduction/51. Data Encryption Standards (DES).vtt
3.97 KB
1. Introduction/52. Triple DES (3DES).mp4
32.28 MB
1. Introduction/52. Triple DES (3DES).vtt
3.93 KB
1. Introduction/53. AES, Blowfish, and Twofish.mp4
61.15 MB
1. Introduction/53. AES, Blowfish, and Twofish.vtt
9.39 KB
1. Introduction/54. RC4.mp4
17.86 MB
1. Introduction/54. RC4.vtt
3.24 KB
1. Introduction/55. RSA Encryption.mp4
60.9 MB
1. Introduction/55. RSA Encryption.vtt
8.08 KB
1. Introduction/56. Elliptic-Curve Cryptography and Quantum Cryptography.mp4
23.03 MB
1. Introduction/56. Elliptic-Curve Cryptography and Quantum Cryptography.vtt
4.18 KB
1. Introduction/57. Key Exchange.mp4
22.75 MB
1. Introduction/57. Key Exchange.vtt
4.31 KB
1. Introduction/58. Diffie-Hellman Key Exchange.mp4
54.29 MB
1. Introduction/58. Diffie-Hellman Key Exchange.vtt
9.51 KB
1. Introduction/59. Key Escrow.mp4
42.91 MB
1. Introduction/59. Key Escrow.vtt
4.99 KB
1. Introduction/5. Availability.mp4
18.86 MB
1. Introduction/5. Availability.vtt
3.29 KB
1. Introduction/60. Trust Models.mp4
22.76 MB
1. Introduction/60. Trust Models.vtt
3.78 KB
1. Introduction/61. Public Key Infrastructure (PKI) and Digital Certificates.mp4
39.24 MB
1. Introduction/61. Public Key Infrastructure (PKI) and Digital Certificates.vtt
5.22 KB
1. Introduction/62. Hash Functions.mp4
32.84 MB
1. Introduction/62. Hash Functions.vtt
3.03 KB
1. Introduction/63. Digital Signatures and Digital Certificates.mp4
18.65 MB
1. Introduction/63. Digital Signatures and Digital Certificates.vtt
2.8 KB
1. Introduction/6. Security Governance.mp4
15.81 MB
1. Introduction/6. Security Governance.vtt
3.21 KB
1. Introduction/7. Organizational Processes.mp4
18.01 MB
1. Introduction/7. Organizational Processes.vtt
3.94 KB
1. Introduction/8. Security Roles and Responsibilities.mp4
14.68 MB
1. Introduction/8. Security Roles and Responsibilities.vtt
2.87 KB
1. Introduction/9. Control Frameworks.mp4
32.17 MB
1. Introduction/9. Control Frameworks.vtt
4.61 KB
Discuss.FreeTutorials.Us.html
165.68 KB
FreeCoursesOnline.Me.html
108.3 KB
FreeTutorials.Eu.html
102.23 KB
How you can help Team-FTU.txt
259 B
[TGx]Downloaded from torrentgalaxy.org.txt
524 B
Torrent Downloaded From GloDls.to.txt
84 B

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。