Packt-–-CompTIA-Advanced-18Nix
- Packt – CompTIA Advanced Security Practitioner (CASP) desc<x>ription.pdf209.37KB
- Приватные видеокурсы.pdf348.32KB
- learning_videos\\/03 - Risk nagement.mp410.21MB
- learning_videos\\/42 - Disposal Terms and Concepts.mp413.24MB
- learning_videos\\/33 - Sensitive Infortion-Internal Security Policies.mp433.34MB
- learning_videos\\/34 - Incident Response Process.mp435.78MB
- learning_videos\\/35 - Forensic Tasks.mp419.02MB
- learning_videos\\/36 - Employment and Termination Procedures.mp429.67MB
- learning_videos\\/37 - Network Auditing.mp417.76MB
- learning_videos\\/38 - Incident Response and Recovery Procedures.mp44.04MB
- learning_videos\\/39 - E-Discovery and Data Retention Policies.mp457.94MB
- learning_videos\\/40 - Data Recovery-Storage and Backup Schemes.mp479.96MB
- learning_videos\\/41 - Data Owner and Data Handling.mp415.39MB
- learning_videos\\/43 - Data Breach and Data Analysis.mp412.65MB
- learning_videos\\/31 - Security Policy Business Doents.mp449.87MB
- learning_videos\\/44 - Incident Response Guidelines.mp457.03MB
- learning_videos\\/45 - Incident and Emergency Response.mp423.78MB
- learning_videos\\/46 - Media-Software and Network Analysis.mp434.20MB
- learning_videos\\/47 - Order of Volatility.mp410.39MB
- learning_videos\\/48 - Industry Trends Overview.mp46.46MB
- learning_videos\\/49 - Performing Ongoing Research.mp410.01MB
- learning_videos\\/50 - Security Practices.mp430.69MB
- learning_videos\\/51 - Evolution of Technology.mp48.21MB
- learning_videos\\/52 - Situational Awareness and Vulnerability Assesents.mp443.57MB
- learning_videos\\/32 - Outage Impact and Estiting Downtime Terms.mp490.30MB
- learning_videos\\/30 - Legal Compliance Part2.mp464.08MB
- learning_videos\\/54 - Global Industry Security Response.mp411.65MB
- learning_videos\\/191 - Asset nagement.mp412.65MB
- learning_videos\\/183 - Mobile and Personal Device nagement.mp428.27MB
- learning_videos\\/184 - Over Air Technology Concerns.mp426.97MB
- learning_videos\\/185 - WLAN Concepts-Terms-Standards.mp433.65MB
- learning_videos\\/186 - WLAN Security and Attacks.mp440.95MB
- learning_videos\\/187 - Security Across the Technology Life Cycle.mp45.38MB
- learning_videos\\/188 - End to End Solution Ownership.mp450.80MB
- learning_videos\\/ - System Development Life Cycle.mp458.12MB
- learning_videos\\/19 - Risk nagement Process.mp413.45MB
- learning_videos\\/190 - Security Implications of Software Development Methodologies.mp423.21MB
- learning_videos\\/192 - Course End.mp41.97MB
- learning_videos\\/29 - Legal Compliance Part1.mp453.12MB
- learning_videos\\/20 - Identifying Vulnerabilities and Threats.mp419.12MB
- learning_videos\\/21 - Security Architecture fr<x>ameworks.mp427.11MB
- learning_videos\\/22 - Business Continuity Planning.mp416.30MB
- learning_videos\\/23 - IT Governance.mp413.92MB
- learning_videos\\/24 - Security Policies.mp422.96MB
- learning_videos\\/25 - Security-Privacy Policies and Procedures Part1.mp45.52MB
- learning_videos\\/26 - Security-Privacy Policies and Procedures Part2.mp43.44MB
- learning_videos\\/27 - Policy Development Updates.mp439.32MB
- learning_videos\\/28 - Developing Processes and Procedures.mp419.81MB
- learning_videos\\/53 - Researching Security Implications.mp427.92MB
- learning_videos\\/55 - Threat Actors.mp418.96MB
- learning_videos\\/181 - Cloud ba<x>sed Collaboration.mp424.24MB
- learning_videos\\/90 - Strength vs Perfornce and Cryptographic Implementations.mp421.91MB
- learning_videos\\/81 - Cryptographic Concepts.mp457.14MB
- learning_videos\\/82 - Transport Encryption Protocol.mp433.44MB
- learning_videos\\/83 - Symmetric Algorithms.mp471.07MB
- learning_videos\\/84 - Asymmetric Algorithms.mp439.24MB
- learning_videos\\/85 - Hybrid Encryption and Digital Signatures.mp431.46MB
- learning_videos\\/86 - Public Key Infrastructure.mp464.58MB
- learning_videos\\/87 - Digital Certificate Classes and Cypher Types.mp415.37MB
- learning_videos\\/88 - Des Modes.mp445.28MB
- learning_videos\\/89 - Cryptographic Attacks.mp467.36MB
- learning_videos\\/91 - Enterprise Storage.mp45.87MB
- learning_videos\\/79 - Hashing Algorithms.mp475.52MB
- learning_videos\\/92 - Virtual Storage Types and Challenges.mp422.24MB
- learning_videos\\/93 - Cloud Storage.mp445.64MB
- learning_videos\\/94 - Data Warehousing.mp418.00MB
- learning_videos\\/95 - Data Archiving.mp418.91MB
- learning_videos\\/96 - Storage Area Networks (SANs) and (VSANs).mp420.10MB
- learning_videos\\/97 - Network Attached Storage (NAS).mp412.60MB
- learning_videos\\/98 - Storage Protocols and Fiber Channel over Ethernet (FCoE).mp424.14MB
- learning_videos\\/99 - Storage Network File Systems.mp415.08MB
- learning_videos\\/02 - Business Influences and Associated Security Risks.mp44.51MB
- learning_videos\\/80 - Message Authentication Code.mp416.62MB
- learning_videos\\/78 - Cryptographic Benefits and Techniques.mp429.70MB
- learning_videos\\/56 - Contract Security Requirements.mp410.20MB
- learning_videos\\/66 - Assesent Tools and Methods.mp46.61MB
- learning_videos\\/57 - Contract Doents.mp49.03MB
- learning_videos\\/58 - Securing the Enterprise Overview.mp45.16MB
- learning_videos\\/59 - Benchrks and ba<x>selines.mp421.05MB
- learning_videos\\/60 - Prototyping and Testing Multiple Solutions.mp420.42MB
- learning_videos\\/61 - Cost_Benefit Analysis.mp49.17MB
- learning_videos\\/62 - Metrics Collection and Trend Data.mp420.63MB
- learning_videos\\/63 - Security Controls-Reverse Engineering and Deconstructing.mp415.64MB
- learning_videos\\/ - Security Solutions Business Needs.mp419.31MB
- learning_videos\\/65 - Lesson Learned- After Action Report.mp412.33MB
- learning_videos\\/67 - Port Scanners and Vulnerability Scanners.mp424.50MB
- learning_videos\\/77 - Social Cryptographic Concepts and Techniques.mp45.18MB
- learning_videos\\/68 - Protocol Analyzer- Network Enumerator-Password Cracker.mp427.18MB
- learning_videos\\/69 - Fuzzers and HTTP Interceptors.mp419.62MB
- learning_videos\\/70 - Exploitation Tools.mp417.38MB
- learning_videos\\/71 - Passive Reconnaissance Tools.mp454.37MB
- learning_videos\\/72 - Vulnerability Assesents and lware Sandboxing.mp417.61MB
- learning_videos\\/73 - Memory Dumping and Penetration Testing.mp435.82MB
- learning_videos\\/74 - Reconnaissance and Fingerprinting.mp417.10MB
- learning_videos\\/75 - Code Review.mp414.90MB
- learning_videos\\/76 - Social Engineering.mp425.31MB
- learning_videos\\/182 - Remote Access and IPsec.mp444.76MB
- learning_videos\\/180 - Telephony-VoIP and Social Media.mp426.18MB
- learning_videos\\/04 - Business Model Strategies.mp412.02MB
- learning_videos\\/125 - Configuring and naging Interface Security.mp437.27MB
- learning_videos\\/117 - Network Device Accessibility and Security.mp465.54MB
- learning_videos\\/118 - Security Controls for Hosts.mp45.88MB
- learning_videos\\/119 - Trusted Operation Systems.mp421.94MB
- learning_videos\\/12 - Infortion Life Cycle and Steak-Holder Input.mp418.96MB
- learning_videos\\/120 - Endpoint Security Software and Data Loss Prevention.mp437.90MB
- learning_videos\\/121 - Host ba<x>sed Firewalls.mp48.68MB
- learning_videos\\/122 - Log Monitoring and Host Hardening.mp422.66MB
- learning_videos\\/123 - Standard Operating Environment and Group Policy Security.mp435.13MB
- learning_videos\\/124 - Comnd Shell Restrictions.mp46.83MB
- learning_videos\\/126 - U-Bluetooth-Firewire Restrictions and Security.mp431.91MB
- learning_videos\\/115 - Advanced Router and Switch Configuration.mp429.25MB
- learning_videos\\/127 - Full Disk Encryption.mp422.76MB
- learning_videos\\/128 - Virtualization Security.mp420.04MB
- learning_videos\\/129 - Cloud Security Services.mp428.77MB
- learning_videos\\/13 - Implementing Technical Controls.mp441.11MB
- learning_videos\\/130 - Boot Loader Protections.mp425.04MB
- learning_videos\\/131 - Virtual Host Vulnerabilities.mp411.30MB
- learning_videos\\/132 - Virtual Desk Infrastructure.mp417.90MB
- learning_videos\\/133 - Terminal Services.mp43.59MB
- learning_videos\\/134 - Virtual TPM.mp415.51MB
- learning_videos\\/116 - Data Flow Enforcement of Applications and Networks.mp410.75MB
- learning_videos\\/ - ailability Controls-Terms and Techniques.mp447.21MB
- learning_videos\\/136 - Web Application Security Design.mp410.81MB
- learning_videos\\/103 - Network and Security Components-Concepts-Security Architectures.mp45.79MB
- learning_videos\\/05 - Integrating Diverse Industries.mp45.95MB
- learning_videos\\/06 - Third Party Infortion Security and Providers.mp414.86MB
- learning_videos\\/07 - Internal and External Influences.mp417.97MB
- learning_videos\\/08 - Impact of De-Perimeterization.mp48.01MB
- learning_videos\\/09 - Risk Mitigation Planning - Strategies and Controls.mp43.63MB
- learning_videos\\/10 - CIA Triad.mp412.05MB
- learning_videos\\/100 - Secure Storage nagement Techniques.mp450.98MB
- learning_videos\\/101 - LUN sking_Mapping and HBA Allocation.mp420.22MB
- learning_videos\\/102 - Replication and Encryption Methods.mp428.37MB
- learning_videos\\/104 - Remote Access Protocols.mp455.17MB
- learning_videos\\/113 - Network Security Solutions.mp433.44MB
- learning_videos\\/105 - IPv6 and Transport Encryption.mp441.90MB
- learning_videos\\/106 - Network Authentication Methods.mp443.14MB
- learning_videos\\/107 - 802.1x and Mesh Networks.mp421.12MB
- learning_videos\\/108 - Security Devices.mp449.89MB
- learning_videos\\/109 - Network Devices.mp440.19MB
- learning_videos\\/11 - Business Classifications.mp417.97MB
- learning_videos\\/110 - Firewalls.mp429.82MB
- learning_videos\\/111 - Wireless Controllers.mp418.51MB
- learning_videos\\/112 - Router Security and Port Numbers.mp416.25MB
- learning_videos\\/135 - Application Vulnerabilities and Security Controls.mp46.79MB
- learning_videos\\/137 - Specific Application Issues.mp424.07MB
- learning_videos\\/18 - Total Cost of Ownership and Risk Strategies.mp426.76MB
- learning_videos\\/17 - Return Of Investment.mp433.47MB
- learning_videos\\/161 - Biometrics.mp434.65MB
- learning_videos\\/162 - Dual-Multi Factor and Certificate Authentication.mp416.00MB
- learning_videos\\/163 - Single Sign On Issues.mp49.27MB
- learning_videos\\/1 - Access Control Models and Open Authorization.mp427.92MB
- learning_videos\\/165 - Extensible Access Control rkup Language (XACML).mp419.09MB
- learning_videos\\/166 - Service Provisioning rkup Language (SPML).mp48.09MB
- learning_videos\\/167 - Attestation and Identity Propagation.mp419.18MB
- learning_videos\\/168 - Federation and Security Assertion rkup Language (SAML).mp419.98MB
- learning_videos\\/169 - OpenID-Shibboleth and WAYF.mp421.88MB
- learning_videos\\/170 - Advanced Trust Models.mp411.78MB
- learning_videos\\/16 - Calculation Tools and Attacker Motivation.mp426.78MB
- learning_videos\\/171 - Business Unit Collaboration.mp44.50MB
- learning_videos\\/172 - Identifying and Communicating Security Requirements.mp488.72MB
- learning_videos\\/173 - Security Controls Recommendations.mp49.20MB
- learning_videos\\/174 - Secure Solutions Collaboration.mp45.26MB
- learning_videos\\/175 - Secure Communication and Collaboration.mp45.59MB
- learning_videos\\/176 - Web-Video Conferencing-Instant Messaging.mp466.00MB
- learning_videos\\/177 - Desk Sharing.mp427.64MB
- learning_videos\\/178 - Presence Guidelines.mp418.67MB
- learning_videos\\/01 - Course Introduction.mp44.90MB
- learning_videos\\/160 - Authentication Factors.mp49.71MB
- learning_videos\\/159 - Password Types-nagement and Policies.mp433.78MB
- learning_videos\\/138 - Session nagement.mp412.97MB
- learning_videos\\/147 - Host-Storage-Network and Application Integration.mp44.58MB
- learning_videos\\/139 - Input Validation.mp422.73MB
- learning_videos\\/14 - Determine Aggregate CIA Score.mp416.48MB
- learning_videos\\/140 - Web Vulnerabilities and Input Mitigation Issues.mp420.97MB
- learning_videos\\/141 - Buffer Overflow and other Application Issues.mp435.35MB
- learning_videos\\/142 - Application Security fr<x>amework.mp421.06MB
- learning_videos\\/143 - Web Service Security and Secure Coding Standards.mp411.28MB
- learning_videos\\/144 - Software Development Methods.mp439.88MB
- learning_videos\\/145 - Monitoring Mechanis and Client-Server Side Processing.mp421.45MB
- learning_videos\\/146 - Browser Extensions and Other Web Development Techniques.mp432.63MB
- learning_videos\\/148 - Securing Data Flows.mp423.93MB
- learning_videos\\/158 - Authentication and Identity nagement.mp417.97MB
- learning_videos\\/149 - Standards Concepts.mp417.45MB
- learning_videos\\/15 - Worst Case Scenario Planning.mp444.56MB
- learning_videos\\/150 - Interoperability Issues.mp415.98MB
- learning_videos\\/151 - In House Commercial and Customized Applications.mp47.97MB
- learning_videos\\/152 - Cloud and Virtualization Models.mp432.53MB
- learning_videos\\/153 - Logical and Physical Deployment Diagrams.mp46.99MB
- learning_videos\\/154 - Secure Infrastructure Design.mp423.26MB
- learning_videos\\/155 - Storage Integration Security.mp47.17MB
- learning_videos\\/156 - Enterprise Application Integration Enablers.mp437.78MB
- learning_videos\\/157 - Authentication and Authorization Technologies.mp44.65MB
- learning_videos\\/179 - Eil Messaging Protocol.mp431.29MB
- CreateTime2021-04-08
- UpdateTime2021-04-11
- FileTotalCount195
- TotalSize9.39GBHotTimes5ViewTimes10DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.ID-17021 2.MADV-205 3.MKCK-030 4.ONSD-499 5.SMA-479 6.RKI-103 7.RKI-220 8.AAJB-017 9.DVH-392 10.MVBD-040 11.CMA-004 12.PCUP-0004 13.DGUL-003 14.TASH-081 15.SDDS-017O 16.BL-057 17.OZVD-182 18.BOG-028 19.UD-285R 20.ID-050 21.JUSD-221 22.DSMO-017 23.NEO-042 24.PBD-276 25.NASS-210 26.CADV-527 27.SBB-198 28.ASFB-170 29.ZUKO-110 30.OKAX-147 31.NFDM-519 32.OFJE-132 33.BUHD-009 34.JUFD-897 35.VEC-316 36.AVOPVR-126 37.DSVR-401 38.AUKS-101 39.DASD-538 40.REAL-702 41.CESD-823 42.FNEO-045 43.KMVR-784 44.081 45.008 46.157 47.3013 48.619 49.131 50.673 51.220 52.004 53.382 54.018 55.004 56.119 57.017 58.981 59.011 60.375 61.363 62.016 63.146 64.599 65.010 66.015 67.606 68.247 69.058 70.517 71.046 72.122 73.011 74.199 75.085 76.174 77.682 78.948 79.022 80.002 81.263 82.2070 83.020 84.110 85.2398 86.926 87.127