资源详情

返回首页 | 相关搜索
[GigaCourse.Com] Udemy - Certified Information Systems Security Officer (CISSO)
大小 5.42 GB
文件数 181
Info Hash: 949036079E5B4D9C692483092DB57E921C70F58E
收录时间 2026-02-03 12:06:08
更新时间 2026-02-03 12:52:01
文件列表 (181)
0. Websites you may like/[CourseClub.Me].url
122 B
0. Websites you may like/[GigaCourse.Com].url
49 B
01 - Module 01 - Risk Management/001 Agenda.mp4
43.43 MB
01 - Module 01 - Risk Management/001 Agenda_en.vtt
17.91 KB
01 - Module 01 - Risk Management/002 Risk Management.mp4
60.8 MB
01 - Module 01 - Risk Management/002 Risk Management_en.vtt
17.09 KB
01 - Module 01 - Risk Management/003 Quantitative Analysis.mp4
60.73 MB
01 - Module 01 - Risk Management/003 Quantitative Analysis_en.vtt
18 KB
01 - Module 01 - Risk Management/12128224-CISSO-WB01.pdf
289.36 KB
02 - Module 02 - Security Management/001 Security Management.mp4
56.53 MB
02 - Module 02 - Security Management/001 Security Management_en.vtt
17.54 KB
02 - Module 02 - Security Management/002 Enterprise Security Program.mp4
24.25 MB
02 - Module 02 - Security Management/002 Enterprise Security Program_en.vtt
12.99 KB
02 - Module 02 - Security Management/003 Roadmap to Maturity.mp4
55.44 MB
02 - Module 02 - Security Management/003 Roadmap to Maturity_en.vtt
16.91 KB
02 - Module 02 - Security Management/004 Human Resources Issues.mp4
49.64 MB
02 - Module 02 - Security Management/004 Human Resources Issues_en.vtt
9.69 KB
02 - Module 02 - Security Management/12128228-CISSO-WB02.pdf
284.08 KB
02 - Module 02 - Security Management/[CourseClub.Me].url
122 B
02 - Module 02 - Security Management/[GigaCourse.Com].url
49 B
03 - Module 03 -Authentication/001 Authentication.mp4
128.59 MB
03 - Module 03 -Authentication/001 Authentication_en.vtt
17.3 KB
03 - Module 03 -Authentication/002 Biometrics Error Types.mp4
35.23 MB
03 - Module 03 -Authentication/002 Biometrics Error Types_en.vtt
19.15 KB
03 - Module 03 -Authentication/003 Memory Cards.mp4
58.6 MB
03 - Module 03 -Authentication/003 Memory Cards_en.vtt
13.59 KB
03 - Module 03 -Authentication/004 Issues Pertaining to Kerberos.mp4
38.91 MB
03 - Module 03 -Authentication/004 Issues Pertaining to Kerberos_en.vtt
11.84 KB
03 - Module 03 -Authentication/12128232-CISSO-WB03.pdf
283.16 KB
04 - Module 04 - Access Control/001 Access Control.mp4
115.39 MB
04 - Module 04 - Access Control/001 Access Control_en.vtt
14.44 KB
04 - Module 04 - Access Control/002 Access Control Characteristics.mp4
64.56 MB
04 - Module 04 - Access Control/002 Access Control Characteristics_en.vtt
19.04 KB
04 - Module 04 - Access Control/003 Threats to Access Control.mp4
65.16 MB
04 - Module 04 - Access Control/003 Threats to Access Control_en.vtt
6.72 KB
04 - Module 04 - Access Control/004 Information Classification.mp4
74.67 MB
04 - Module 04 - Access Control/004 Information Classification_en.vtt
9.69 KB
04 - Module 04 - Access Control/005 Discretionary Access Control Model.mp4
61.01 MB
04 - Module 04 - Access Control/005 Discretionary Access Control Model_en.vtt
12.84 KB
04 - Module 04 - Access Control/006 Access Control Administration.mp4
56.85 MB
04 - Module 04 - Access Control/006 Access Control Administration_en.vtt
12.59 KB
04 - Module 04 - Access Control/12128242-CISSO-WB04.pdf
280.37 KB
05 - Module 05 - Security Models/001 Security Models and Evaluation Criteria.mp4
85.51 MB
05 - Module 05 - Security Models/001 Security Models and Evaluation Criteria_en.vtt
17.89 KB
05 - Module 05 - Security Models/002 What Does It Mean to Be in a Specific Ring.mp4
131.42 MB
05 - Module 05 - Security Models/002 What Does It Mean to Be in a Specific Ring_en.vtt
15.62 KB
05 - Module 05 - Security Models/003 Non-Interference Model.mp4
60 MB
05 - Module 05 - Security Models/003 Non-Interference Model_en.vtt
12.84 KB
05 - Module 05 - Security Models/004 ITSEC - Good and Bad.mp4
86.44 MB
05 - Module 05 - Security Models/004 ITSEC - Good and Bad_en.vtt
10.72 KB
05 - Module 05 - Security Models/12128250-CISSO-WB05.pdf
283.38 KB
06 - Module 06 - Operations Security/001 Information Classification.mp4
60.21 MB
06 - Module 06 - Operations Security/001 Information Classification_en.vtt
18.35 KB
06 - Module 06 - Operations Security/002 Product Implementation Concerns.mp4
88.65 MB
06 - Module 06 - Operations Security/002 Product Implementation Concerns_en.vtt
17.64 KB
06 - Module 06 - Operations Security/003 Redundant Array of Independent Disk (RAID).mp4
51.31 MB
06 - Module 06 - Operations Security/003 Redundant Array of Independent Disk (RAID)_en.vtt
16.65 KB
06 - Module 06 - Operations Security/004 Methodology.mp4
141.61 MB
06 - Module 06 - Operations Security/004 Methodology_en.vtt
18.48 KB
06 - Module 06 - Operations Security/12128256-CISSO-WB06.pdf
282.2 KB
07 - Module 07 - Symmetric Cryptography and Hashing/001 Symmetric Cryptography and Hashing.mp4
59.75 MB
07 - Module 07 - Symmetric Cryptography and Hashing/001 Symmetric Cryptography and Hashing_en.vtt
16.84 KB
07 - Module 07 - Symmetric Cryptography and Hashing/002 Historical Uses of Symmetric Cryptography Vernam Cipher.mp4
53.48 MB
07 - Module 07 - Symmetric Cryptography and Hashing/002 Historical Uses of Symmetric Cryptography Vernam Cipher_en.vtt
14.84 KB
07 - Module 07 - Symmetric Cryptography and Hashing/003 Information Classification.mp4
157.78 MB
07 - Module 07 - Symmetric Cryptography and Hashing/003 Information Classification_en.vtt
18.7 KB
07 - Module 07 - Symmetric Cryptography and Hashing/004 Symmetric Algorithms - DS.mp4
120.35 MB
07 - Module 07 - Symmetric Cryptography and Hashing/004 Symmetric Algorithms - DS_en.vtt
22.06 KB
07 - Module 07 - Symmetric Cryptography and Hashing/12128258-CISSO-WB07.pdf
277.08 KB
07 - Module 07 - Symmetric Cryptography and Hashing/[CourseClub.Me].url
122 B
07 - Module 07 - Symmetric Cryptography and Hashing/[GigaCourse.Com].url
49 B
08 - Module 08 - Asymmetric Cryptography and PKI/001 Asymmetric Cryptography and PKI.mp4
60.84 MB
08 - Module 08 - Asymmetric Cryptography and PKI/001 Asymmetric Cryptography and PKI_en.vtt
18.7 KB
08 - Module 08 - Asymmetric Cryptography and PKI/002 Example of Hybrid Cryptography.mp4
74.61 MB
08 - Module 08 - Asymmetric Cryptography and PKI/002 Example of Hybrid Cryptography_en.vtt
16.77 KB
08 - Module 08 - Asymmetric Cryptography and PKI/003 CA and RA Roles.mp4
57.04 MB
08 - Module 08 - Asymmetric Cryptography and PKI/003 CA and RA Roles_en.vtt
18.95 KB
08 - Module 08 - Asymmetric Cryptography and PKI/004 Link versus End-to-End Encryption.mp4
76.88 MB
08 - Module 08 - Asymmetric Cryptography and PKI/004 Link versus End-to-End Encryption_en.vtt
19.48 KB
08 - Module 08 - Asymmetric Cryptography and PKI/005 IPSec Handshaking Process.mp4
51.19 MB
08 - Module 08 - Asymmetric Cryptography and PKI/005 IPSec Handshaking Process_en.vtt
17.45 KB
08 - Module 08 - Asymmetric Cryptography and PKI/006 Types of Physical IDS.mp4
93.46 MB
08 - Module 08 - Asymmetric Cryptography and PKI/006 Types of Physical IDS_en.vtt
20.49 KB
08 - Module 08 - Asymmetric Cryptography and PKI/19401622-CISSO-WB08.pdf
221.67 KB
09 - Module 09 - Network Connections/001 Information Classification.mp4
60.96 MB
09 - Module 09 - Network Connections/001 Information Classification_en.vtt
20.54 KB
09 - Module 09 - Network Connections/002 Summary of Topologies.mp4
79.44 MB
09 - Module 09 - Network Connections/002 Summary of Topologies_en.vtt
21.44 KB
09 - Module 09 - Network Connections/003 Transmission Types - Number of Recievers.mp4
57.23 MB
09 - Module 09 - Network Connections/003 Transmission Types - Number of Recievers_en.vtt
19.65 KB
09 - Module 09 - Network Connections/004 Network Topologies.mp4
54.28 MB
09 - Module 09 - Network Connections/004 Network Topologies_en.vtt
18.43 KB
09 - Module 09 - Network Connections/005 WAN Technologies - DSL.mp4
57.72 MB
09 - Module 09 - Network Connections/005 WAN Technologies - DSL_en.vtt
15.66 KB
09 - Module 09 - Network Connections/12128266-CISSO-WB09.pdf
284.82 KB
10 - Module 10 - Network Protocols and Devices/001 Information Classification.mp4
55.61 MB
10 - Module 10 - Network Protocols and Devices/001 Information Classification_en.vtt
18.07 KB
10 - Module 10 - Network Protocols and Devices/002 Transport Layer.mp4
94.46 MB
10 - Module 10 - Network Protocols and Devices/002 Transport Layer_en.vtt
20.3 KB
10 - Module 10 - Network Protocols and Devices/003 Repeater.mp4
69.01 MB
10 - Module 10 - Network Protocols and Devices/003 Repeater_en.vtt
22.67 KB
10 - Module 10 - Network Protocols and Devices/004 Firewall Types - Circuit - Level Proxy Firewall.mp4
54.24 MB
10 - Module 10 - Network Protocols and Devices/004 Firewall Types - Circuit - Level Proxy Firewall_en.vtt
18.35 KB
10 - Module 10 - Network Protocols and Devices/005 TCPIP Suite.mp4
51.49 MB
10 - Module 10 - Network Protocols and Devices/005 TCPIP Suite_en.vtt
16.82 KB
10 - Module 10 - Network Protocols and Devices/12128270-CISSO-WB10.pdf
277.97 KB
11 - Module 11 - Telephony, VPNs and Wireless/001 Information Classification.mp4
58.4 MB
11 - Module 11 - Telephony, VPNs and Wireless/001 Information Classification_en.vtt
18.1 KB
11 - Module 11 - Telephony, VPNs and Wireless/002 PBX Vulnerabilities.mp4
39.06 MB
11 - Module 11 - Telephony, VPNs and Wireless/002 PBX Vulnerabilities_en.vtt
11.88 KB
11 - Module 11 - Telephony, VPNs and Wireless/003 SSLTLS.mp4
27.78 MB
11 - Module 11 - Telephony, VPNs and Wireless/003 SSLTLS_en.vtt
8.54 KB
11 - Module 11 - Telephony, VPNs and Wireless/004 Wireless Network Topologies.mp4
92.51 MB
11 - Module 11 - Telephony, VPNs and Wireless/004 Wireless Network Topologies_en.vtt
18.08 KB
11 - Module 11 - Telephony, VPNs and Wireless/005 WPA and WPA2 Mode Types.mp4
113.72 MB
11 - Module 11 - Telephony, VPNs and Wireless/005 WPA and WPA2 Mode Types_en.vtt
16.19 KB
11 - Module 11 - Telephony, VPNs and Wireless/12128274-CISSO-WB11.pdf
221.97 KB
11 - Module 11 - Telephony, VPNs and Wireless/[CourseClub.Me].url
122 B
11 - Module 11 - Telephony, VPNs and Wireless/[GigaCourse.Com].url
49 B
12 - Module 12 - Security Architecture/001 Information Classification.mp4
118.73 MB
12 - Module 12 - Security Architecture/001 Information Classification_en.vtt
15.66 KB
12 - Module 12 - Security Architecture/002 Integrated Security is Designed Security.mp4
63.35 MB
12 - Module 12 - Security Architecture/002 Integrated Security is Designed Security_en.vtt
20.45 KB
12 - Module 12 - Security Architecture/003 System Functionality.mp4
40.3 MB
12 - Module 12 - Security Architecture/003 System Functionality_en.vtt
12.64 KB
12 - Module 12 - Security Architecture/004 Attacking Through Applications.mp4
42.51 MB
12 - Module 12 - Security Architecture/004 Attacking Through Applications_en.vtt
13.5 KB
12 - Module 12 - Security Architecture/12128278-CISSO-WB12.pdf
280.49 KB
13 - Module 13 - Software Development Security/001 Information Classification.mp4
144.45 MB
13 - Module 13 - Software Development Security/001 Information Classification_en.vtt
18.22 KB
13 - Module 13 - Software Development Security/002 Development Methodologies.mp4
44.82 MB
13 - Module 13 - Software Development Security/002 Development Methodologies_en.vtt
13.31 KB
13 - Module 13 - Software Development Security/003 Security Issues.mp4
46.93 MB
13 - Module 13 - Software Development Security/003 Security Issues_en.vtt
14.74 KB
13 - Module 13 - Software Development Security/004 Linking Through COM.mp4
125.39 MB
13 - Module 13 - Software Development Security/004 Linking Through COM_en.vtt
17.64 KB
13 - Module 13 - Software Development Security/19401620-CISSO-WB13.pdf
276.79 KB
14 - Module 14 - Database Security and System Development/001 Information Classification.mp4
83.45 MB
14 - Module 14 - Database Security and System Development/001 Information Classification_en.vtt
18.29 KB
14 - Module 14 - Database Security and System Development/002 Artificial Intelligence.mp4
140.97 MB
14 - Module 14 - Database Security and System Development/002 Artificial Intelligence_en.vtt
19.56 KB
14 - Module 14 - Database Security and System Development/003 Virus.mp4
77.63 MB
14 - Module 14 - Database Security and System Development/003 Virus_en.vtt
9.32 KB
14 - Module 14 - Database Security and System Development/004 DDoS.mp4
56.44 MB
14 - Module 14 - Database Security and System Development/004 DDoS_en.vtt
10.7 KB
14 - Module 14 - Database Security and System Development/12128288-CISSO-WB14.pdf
221.33 KB
15 - Module 15 - Malware and Software Attacks/001 Malware and Attacks.mp4
130.56 MB
15 - Module 15 - Malware and Software Attacks/001 Malware and Attacks_en.vtt
18.39 KB
15 - Module 15 - Malware and Software Attacks/12128292-CISSO-WB15.pdf
281.96 KB
15 - Module 15 - Malware and Software Attacks/[CourseClub.Me].url
122 B
15 - Module 15 - Malware and Software Attacks/[GigaCourse.Com].url
49 B
16 - Module 16 - Business Continuity/001 Information Classification.mp4
98.75 MB
16 - Module 16 - Business Continuity/001 Information Classification_en.vtt
18.63 KB
16 - Module 16 - Business Continuity/002 How to Identify the Most Critical Company Functions.mp4
43.58 MB
16 - Module 16 - Business Continuity/002 How to Identify the Most Critical Company Functions_en.vtt
12.39 KB
16 - Module 16 - Business Continuity/003 Facility Backups - Hot Site.mp4
70.1 MB
16 - Module 16 - Business Continuity/003 Facility Backups - Hot Site_en.vtt
10.69 KB
16 - Module 16 - Business Continuity/12128298-CISSO-WB16.pdf
220.77 KB
17 - Module 17 - Disaster Recovery/001 Disaster Recovery.mp4
47.93 MB
17 - Module 17 - Disaster Recovery/001 Disaster Recovery_en.vtt
15.1 KB
17 - Module 17 - Disaster Recovery/002 Recovery Plan.mp4
98.52 MB
17 - Module 17 - Disaster Recovery/002 Recovery Plan_en.vtt
23.16 KB
17 - Module 17 - Disaster Recovery/003 Return to Normal Operations.mp4
47.74 MB
17 - Module 17 - Disaster Recovery/003 Return to Normal Operations_en.vtt
14.94 KB
17 - Module 17 - Disaster Recovery/12128306-CISSO-WB17.pdf
220.96 KB
18 - Module 18 - Incident Management, Law, and Ethics/001 Information Classification.mp4
129.46 MB
18 - Module 18 - Incident Management, Law, and Ethics/001 Information Classification_en.vtt
18.27 KB
18 - Module 18 - Incident Management, Law, and Ethics/002 Intellectual Property Law.mp4
56.77 MB
18 - Module 18 - Incident Management, Law, and Ethics/002 Intellectual Property Law_en.vtt
17.98 KB
18 - Module 18 - Incident Management, Law, and Ethics/003 Countries Working Together.mp4
119.64 MB
18 - Module 18 - Incident Management, Law, and Ethics/003 Countries Working Together_en.vtt
17.87 KB
18 - Module 18 - Incident Management, Law, and Ethics/004 Privacy of Sensitive Data.mp4
52.94 MB
18 - Module 18 - Incident Management, Law, and Ethics/004 Privacy of Sensitive Data_en.vtt
12.98 KB
18 - Module 18 - Incident Management, Law, and Ethics/12128308-CISSO-WB18.pdf
280.88 KB
18 - Module 18 - Incident Management, Law, and Ethics/[CourseClub.Me].url
122 B
18 - Module 18 - Incident Management, Law, and Ethics/[GigaCourse.Com].url
49 B
19 - Module 19 – Physical/001 Information Classification.mp4
135.27 MB
19 - Module 19 – Physical/001 Information Classification_en.vtt
19.05 KB
19 - Module 19 – Physical/12128322-CISSO-WB19.pdf
282.44 KB
[CourseClub.Me].url
122 B
[GigaCourse.Com].url
49 B

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。