zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
CISSP® - Identity and Access Management
magnet:?xt=urn:btih:bf086fef2fbfefcfab048531879e83903254fc8e&dn=CISSP® - Identity and Access Management
磁力链接详情
文件列表详情
bf086fef2fbfefcfab048531879e83903254fc8e
infohash:
22
文件数量
179.74 MB
文件大小
2020-10-7 10:01
创建日期
2024-11-10 16:51
最后访问
相关分词
CISSP®
-
Identity
and
Access
Management
1. Course Overview/01. Course Overview.mp4 5.73 MB
2. Control Physical and Logical Access to Assets/02. Control Physical and Logical Access to Assets.mp4 8.34 MB
2. Control Physical and Logical Access to Assets/03. Layered Defense.mp4 16.5 MB
2. Control Physical and Logical Access to Assets/04. Controls.mp4 14.51 MB
2. Control Physical and Logical Access to Assets/05. Key Points.mp4 3.09 MB
3. Manage Identification and Authentication of People and Devices/06. Manage Identification and Authentication of People and Devices.mp4 6.29 MB
3. Manage Identification and Authentication of People and Devices/07. What You Have.mp4 14.08 MB
3. Manage Identification and Authentication of People and Devices/08. Authorization.mp4 6.02 MB
3. Manage Identification and Authentication of People and Devices/09. Single Sign On.mp4 8.07 MB
3. Manage Identification and Authentication of People and Devices/10. Kerberos.mp4 9.07 MB
3. Manage Identification and Authentication of People and Devices/11. Credential Management Systems.mp4 10.83 MB
3. Manage Identification and Authentication of People and Devices/12. Summary.mp4 1.85 MB
4. Integrate Identity as a Service/13. Integrate Identity as a Service.mp4 7.85 MB
5. Integrate Third-party Identity Services/14. Integrate Third-party Identity Services.mp4 5.19 MB
6. Implement and Manage Authorization Mechanisms/15. Implement and Manage Authorization Mechanisms.mp4 13.17 MB
6. Implement and Manage Authorization Mechanisms/16. Rule Based Access Control.mp4 12.72 MB
6. Implement and Manage Authorization Mechanisms/17. Context Dependent Access Control.mp4 8 MB
6. Implement and Manage Authorization Mechanisms/18. Summary.mp4 856.57 KB
7. Prevent or Mitigate Access Control Attacks/19. Prevent or Mitigate Access Control Attacks.mp4 11.99 MB
7. Prevent or Mitigate Access Control Attacks/20. Summary.mp4 1.14 MB
8. Manage the Identity and Access Provisioning Lifecycle/21. Manage the Identity and Access Provisioning Lifecycle.mp4 13.7 MB
8. Manage the Identity and Access Provisioning Lifecycle/22. Summary.mp4 771.35 KB
其他位置