Learning_IT_Security

mp4   Hot:235   Size:2.54 GB   Created:2017-09-01 22:43:10   Update:2017-10-23 08:29:06  

Download link

File List

  • 1_Introduction/01_Welcome.mp4 8.89 MB
    2_1._Security_Modeling/02_Security_modeling_tools.mp4 45.95 MB
    3_2._The_CIA_Triad/03_The_CIA_triad_-_confidentiality_integrity_and_availability.mp4 38.41 MB
    3_2._The_CIA_Triad/04_Confidentiality.mp4 39.07 MB
    3_2._The_CIA_Triad/05_Integrity.mp4 43.35 MB
    3_2._The_CIA_Triad/06_Availability.mp4 52.99 MB
    3_2._The_CIA_Triad/07_Using_the_triad.mp4 160.62 MB
    4_3._Visualizing_Security/08_MikeDan_s_solution_matrix.mp4 125.68 MB
    5_4._Information_Assurance_Model/09_The_information_assurance_model.mp4 57.91 MB
    5_4._Information_Assurance_Model/10_People.mp4 127.34 MB
    5_4._Information_Assurance_Model/11_Process.mp4 106.4 MB
    5_4._Information_Assurance_Model/12_Technology.mp4 118.97 MB
    5_4._Information_Assurance_Model/13_Applying_the_information_assurance_model.mp4 143.98 MB
    6_5._Defense_in_Depth/14_Introduction_to_defense_in_depth.mp4 117.31 MB
    6_5._Defense_in_Depth/15_Data.mp4 70.82 MB
    6_5._Defense_in_Depth/16_Application.mp4 81.86 MB
    6_5._Defense_in_Depth/17_Host.mp4 84.89 MB
    6_5._Defense_in_Depth/18_Internal_network.mp4 76.2 MB
    6_5._Defense_in_Depth/19_Network_perimeter.mp4 73.34 MB
    6_5._Defense_in_Depth/20_External_network.mp4 65.18 MB
    6_5._Defense_in_Depth/21_Physical_encompassing.mp4 79.71 MB
    6_5._Defense_in_Depth/22_Stewardship_encompassing.mp4 105.78 MB
    7_6._Scenarios_for_Using_the_Defense_in_Depth_Model/23_Using_the_defense_in_depth_model.mp4 112.46 MB
    7_6._Scenarios_for_Using_the_Defense_in_Depth_Model/24_The_IT_desktop_PC.mp4 75.2 MB
    7_6._Scenarios_for_Using_the_Defense_in_Depth_Model/25_The_sales_user_s_laptop.mp4 88.8 MB
    7_6._Scenarios_for_Using_the_Defense_in_Depth_Model/26_The_typical_user_s_phone.mp4 138.01 MB
    7_6._Scenarios_for_Using_the_Defense_in_Depth_Model/27_The_CEO_s_Android_tablet.mp4 116.04 MB
    7_6._Scenarios_for_Using_the_Defense_in_Depth_Model/28_The_CEO_s_iMac.mp4 132.93 MB
    7_6._Scenarios_for_Using_the_Defense_in_Depth_Model/29_The_data_center_server.mp4 114.86 MB

Download Info

  • Tips

    “Learning_IT_Security” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.