zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
[FreeCourseSite.com] Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23
magnet:?xt=urn:btih:2570dbe15bec901f6b4c7cf73ba5e9686622ffca&dn=[FreeCourseSite.com] Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23
磁力链接详情
文件列表详情
2570dbe15bec901f6b4c7cf73ba5e9686622ffca
infohash:
137
文件数量
5.36 GB
文件大小
2024-1-31 19:25
创建日期
2024-12-26 12:29
最后访问
相关分词
FreeCourseSite
com
Udemy
-
The
Complete
Certified
in
Cybersecurity
CC
course
ISC2
'23
01 - Introduction/001 Introduction and download your free study guides.mp4 11.55 MB
01 - Introduction/002 Connect with me on Social media and the Udemy ratings system.mp4 12.13 MB
01 - Introduction/003 How to get the most out of my courses and the Udemy interface.mp4 29.24 MB
01 - Introduction/004 How to approach certification studying.mp4 26.5 MB
02 - Domain 1 Security Principles/001 Domain 1 - What we will be covering.mp4 10.44 MB
02 - Domain 1 Security Principles/002 The differences between Information Security, IT Security, and Cybersecurity.mp4 55.99 MB
02 - Domain 1 Security Principles/003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1.mp4 21.43 MB
02 - Domain 1 Security Principles/004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2.mp4 18.57 MB
02 - Domain 1 Security Principles/005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3.mp4 9.47 MB
02 - Domain 1 Security Principles/006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4.mp4 23.36 MB
02 - Domain 1 Security Principles/007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5.mp4 12.71 MB
02 - Domain 1 Security Principles/008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1.mp4 44.28 MB
02 - Domain 1 Security Principles/009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2.mp4 21.54 MB
02 - Domain 1 Security Principles/010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3.mp4 34.34 MB
02 - Domain 1 Security Principles/011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4.mp4 67.93 MB
02 - Domain 1 Security Principles/012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5.mp4 18.76 MB
02 - Domain 1 Security Principles/013 Privacy.mp4 16.11 MB
02 - Domain 1 Security Principles/014 Risk Management - part 1.mp4 12.94 MB
02 - Domain 1 Security Principles/015 Risk Management - part 2.mp4 30.33 MB
02 - Domain 1 Security Principles/016 Risk Management - part 3.mp4 26.77 MB
02 - Domain 1 Security Principles/017 Risk Management - part 4.mp4 30.8 MB
02 - Domain 1 Security Principles/018 Risk Management - part 5.mp4 47.26 MB
02 - Domain 1 Security Principles/019 Risk Management - part 6.mp4 24.03 MB
02 - Domain 1 Security Principles/020 Access Control Categories and Types - part 1.mp4 28.19 MB
02 - Domain 1 Security Principles/021 Access Control Categories and Types - part 2.mp4 39.31 MB
02 - Domain 1 Security Principles/022 The Ethics of your organizations and (ISC)2.mp4 17.73 MB
02 - Domain 1 Security Principles/023 Governance vs. Management.mp4 45.51 MB
02 - Domain 1 Security Principles/024 Laws and regulations - part 1.mp4 77.44 MB
02 - Domain 1 Security Principles/025 Laws and regulations - part 2.mp4 55.54 MB
02 - Domain 1 Security Principles/026 Security governance principles.mp4 60.3 MB
02 - Domain 1 Security Principles/027 What we covered in Domain 1.mp4 8.34 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/001 Domain 2 - What we will be covering.mp4 9.15 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/002 BCP - Business Continuity Planning - Part 1.mp4 40.19 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/003 BCP - Business Continuity Planning - Part 2.mp4 31.03 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/004 BCP - Business Continuity Planning - Part 3.mp4 45.47 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/005 DRP - Disaster Recovery Planning - Part 1.mp4 44.9 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/006 DRP - Disaster Recovery Planning - Part 2.mp4 37.65 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/007 DRP - Disaster Recovery Planning - Part 3.mp4 47.13 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/008 DRP - Disaster Recovery Planning - Part 4.mp4 64.44 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/009 Incidents Response - Part 1.mp4 35.9 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/010 Incidents Response - Part 2.mp4 28.47 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/011 Incidents Response - Part 3.mp4 18.5 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/012 Incidents Response - Part 4.mp4 23.22 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/013 Incidents Response - Part 5.mp4 44.03 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/014 What we covered in Domain 2.mp4 6.97 MB
04 - Domain 3 Access Controls Concepts/001 Domain 3 - What we will be covering.mp4 7.58 MB
04 - Domain 3 Access Controls Concepts/002 Physical Security - part 1.mp4 43.48 MB
04 - Domain 3 Access Controls Concepts/003 Physical Security - part 2.mp4 43.88 MB
04 - Domain 3 Access Controls Concepts/004 Physical Security - part 3.mp4 27.8 MB
04 - Domain 3 Access Controls Concepts/005 Physical Security - part 4.mp4 25.06 MB
04 - Domain 3 Access Controls Concepts/006 Physical Security - part 5.mp4 22.64 MB
04 - Domain 3 Access Controls Concepts/007 Logical Access Control - Part 1.mp4 27.12 MB
04 - Domain 3 Access Controls Concepts/008 Logical Access Control - Part 2.mp4 18.17 MB
04 - Domain 3 Access Controls Concepts/009 Logical Access Control - Part 3.mp4 78.46 MB
04 - Domain 3 Access Controls Concepts/010 Logical Access Control - Part 4.mp4 43.94 MB
04 - Domain 3 Access Controls Concepts/011 Logical Access Control - Part 5.mp4 81.13 MB
04 - Domain 3 Access Controls Concepts/012 What we covered in Domain 3.mp4 6.91 MB
05 - Domain 4 Network Security/001 Domain 4 - What we will be covering.mp4 8.24 MB
05 - Domain 4 Network Security/002 Network Basics and Definitions - Part 1.mp4 44.54 MB
05 - Domain 4 Network Security/003 Network Basics and Definitions - Part 2.mp4 38.86 MB
05 - Domain 4 Network Security/004 The OSI Model - Part 1.mp4 100.95 MB
05 - Domain 4 Network Security/005 The OSI Model - Part 2.mp4 49.81 MB
05 - Domain 4 Network Security/006 The OSI Model - Part 3.mp4 56.88 MB
05 - Domain 4 Network Security/007 The TCPIP model.mp4 48.74 MB
05 - Domain 4 Network Security/008 IP addresses, port numbers, and MAC addresses - Part 1.mp4 45.83 MB
05 - Domain 4 Network Security/009 IP addresses, port numbers, and MAC addresses - Part 2.mp4 24.34 MB
05 - Domain 4 Network Security/010 IP addresses, port numbers, and MAC addresses - Part 3.mp4 20.89 MB
05 - Domain 4 Network Security/011 IP support protocols - Part 1.mp4 46.51 MB
05 - Domain 4 Network Security/012 IP support protocols - Part 2.mp4 33.89 MB
05 - Domain 4 Network Security/013 Cables - Part 1.mp4 22.32 MB
05 - Domain 4 Network Security/014 Cables - Part 2.mp4 45.97 MB
05 - Domain 4 Network Security/015 LAN topologies.mp4 26.23 MB
05 - Domain 4 Network Security/016 Wi-Fi.mp4 51.74 MB
05 - Domain 4 Network Security/017 Wireless networks - Part 1.mp4 20.06 MB
05 - Domain 4 Network Security/018 Wireless networks - Part 2.mp4 40.54 MB
05 - Domain 4 Network Security/019 VLANs and Routers - Part 1.mp4 41.41 MB
05 - Domain 4 Network Security/020 VLANs and Routers - Part 2.mp4 42.52 MB
05 - Domain 4 Network Security/021 VPNs, NAC, and third-party connectivity.mp4 49.27 MB
05 - Domain 4 Network Security/022 SDN, SD-WAN, and SDX.mp4 37.67 MB
05 - Domain 4 Network Security/023 Attacks and attackers - Part 1.mp4 29.25 MB
05 - Domain 4 Network Security/024 Attacks and attackers - Part 2.mp4 37.67 MB
05 - Domain 4 Network Security/025 Attacks and attackers - Part 3.mp4 64.59 MB
05 - Domain 4 Network Security/026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1.mp4 26.55 MB
05 - Domain 4 Network Security/027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2.mp4 35.91 MB
05 - Domain 4 Network Security/028 SIEM and SOAR systems.mp4 26.21 MB
05 - Domain 4 Network Security/029 Honeynets and Honeypots.mp4 10.89 MB
05 - Domain 4 Network Security/030 Firewalls - Part 1.mp4 28.95 MB
05 - Domain 4 Network Security/031 Firewalls - Part 2.mp4 34.78 MB
05 - Domain 4 Network Security/032 0-day attacks and exploits.mp4 56.09 MB
05 - Domain 4 Network Security/033 Vulnerability Scanning.mp4 16.41 MB
05 - Domain 4 Network Security/034 Virtualization, Cloud, and Distributed Computing - Part 1.mp4 29.24 MB
05 - Domain 4 Network Security/035 Virtualization, Cloud, and Distributed Computing - Part 2.mp4 26.52 MB
05 - Domain 4 Network Security/036 Virtualization, Cloud, and Distributed Computing - Part 3.mp4 21.58 MB
05 - Domain 4 Network Security/037 Virtualization, Cloud, and Distributed Computing - Part 4.mp4 58.58 MB
05 - Domain 4 Network Security/038 Virtualization, Cloud, and Distributed Computing - Part 5.mp4 87.42 MB
05 - Domain 4 Network Security/039 The Internet of Things (IoT).mp4 19.93 MB
05 - Domain 4 Network Security/040 Asset tracking and hardware hardening.mp4 24.47 MB
05 - Domain 4 Network Security/041 Electricity.mp4 58.2 MB
05 - Domain 4 Network Security/042 Backups - Part 1.mp4 33.52 MB
05 - Domain 4 Network Security/043 Backups - Part 2.mp4 30.14 MB
05 - Domain 4 Network Security/044 Fault tolerance, redundancy, and resiliency - Part 1.mp4 19.65 MB
05 - Domain 4 Network Security/045 Fault tolerance, redundancy, and resiliency - Part 2.mp4 22.04 MB
05 - Domain 4 Network Security/046 Fault tolerance, redundancy, and resiliency - Part 3.mp4 23.09 MB
05 - Domain 4 Network Security/047 Fire suppression - Part 1.mp4 18.61 MB
05 - Domain 4 Network Security/048 Fire suppression - Part 2.mp4 30.38 MB
05 - Domain 4 Network Security/049 Secure design principles - Part 1.mp4 57.32 MB
05 - Domain 4 Network Security/050 Secure design principles - Part 2.mp4 36.04 MB
05 - Domain 4 Network Security/051 What we covered in Domain 4.mp4 7.43 MB
06 - Domain 5 Security Operations/001 Domain 5 - What we will be covering.mp4 6.41 MB
06 - Domain 5 Security Operations/002 Configuration Management.mp4 15.25 MB
06 - Domain 5 Security Operations/003 Patch Management.mp4 28.32 MB
06 - Domain 5 Security Operations/004 Change Management.mp4 42.65 MB
06 - Domain 5 Security Operations/005 Cryptography - Part 1.mp4 31.71 MB
06 - Domain 5 Security Operations/006 Cryptography - Part 2.mp4 51.12 MB
06 - Domain 5 Security Operations/007 Cryptography - Part 3.mp4 32.74 MB
06 - Domain 5 Security Operations/008 Hashing.mp4 19 MB
06 - Domain 5 Security Operations/009 Attacks on our cryptography.mp4 27.86 MB
06 - Domain 5 Security Operations/010 Data handling, data storage and data retention - Part 1.mp4 56.9 MB
06 - Domain 5 Security Operations/011 Data handling, data storage and data retention - Part 2.mp4 39.16 MB
06 - Domain 5 Security Operations/012 Data handling, data storage and data retention - Part 3.mp4 28.28 MB
06 - Domain 5 Security Operations/013 Administrative (Directive) Controls.mp4 87.94 MB
06 - Domain 5 Security Operations/014 Training and awareness.mp4 28.09 MB
06 - Domain 5 Security Operations/015 Social Engineering attacks - Part 1.mp4 31.51 MB
06 - Domain 5 Security Operations/016 Social Engineering attacks - Part 2.mp4 41.6 MB
06 - Domain 5 Security Operations/017 What we covered in Domain 5.mp4 8.47 MB
07 - Domain recaps/001 Domain 1 recap Certified in Cybersecurity (CC).mp4 120.29 MB
07 - Domain recaps/002 Domain 2 recap Certified in Cybersecurity (CC).mp4 87.58 MB
07 - Domain recaps/003 Domain 3 recap Certified in Cybersecurity (CC).mp4 88.62 MB
07 - Domain recaps/004 Domain 4 recap Certified in Cybersecurity (CC).mp4 408.01 MB
07 - Domain recaps/005 Domain 5 recap Certified in Cybersecurity (CC).mp4 161.52 MB
08 - The study process, material, tips, tricks and practice tests!/001 Why you should want to get Certified in Cybersecurity.mp4 18.05 MB
08 - The study process, material, tips, tricks and practice tests!/002 Scheduling your exam and what to expect.mp4 42.74 MB
08 - The study process, material, tips, tricks and practice tests!/003 What to expect on exam day and after.mp4 33.22 MB
08 - The study process, material, tips, tricks and practice tests!/004 I passed the exam now what.mp4 20.3 MB
08 - The study process, material, tips, tricks and practice tests!/005 I failed the exam now what.mp4 24.49 MB
08 - The study process, material, tips, tricks and practice tests!/006 How to approach practice questions.mp4 118.51 MB
08 - The study process, material, tips, tricks and practice tests!/007 How to design your career and certification path.mp4 74.37 MB
其他位置