Lynda - Learning IT Security

mp4   Hot:1016   Size:2.54 GB   Created:2017-09-03 20:05:07   Update:2021-12-13 13:07:26  

Download link

File List

  • 01. Introduction/01_01 - Welcome.mp4 8.89 MB
    02. Security Modeling/02_01 - Security modeling tools.mp4 45.99 MB
    03. The CIA Triad/03_01 - The CIA triad confidentiality, integrity, and availability.mp4 38.44 MB
    03. The CIA Triad/03_02 - Confidentiality.mp4 39.1 MB
    03. The CIA Triad/03_03 - Integrity.mp4 43.39 MB
    03. The CIA Triad/03_04 - Availability.mp4 53.04 MB
    03. The CIA Triad/03_05 - Using the triad.mp4 160.78 MB
    04. Visualizing Security/04_01 - MikeDan's solution matrix.mp4 125.8 MB
    05. Information Assurance Model/05_01 - The information assurance model.mp4 57.96 MB
    05. Information Assurance Model/05_02 - People.mp4 127.46 MB
    05. Information Assurance Model/05_03 - Process.mp4 106.5 MB
    05. Information Assurance Model/05_04 - Technology.mp4 119.09 MB
    05. Information Assurance Model/05_05 - Applying the information assurance model.mp4 144.12 MB
    06. Defense in Depth/06_01 - Introduction to defense in depth.mp4 117.42 MB
    06. Defense in Depth/06_02 - Data.mp4 70.88 MB
    06. Defense in Depth/06_03 - Application.mp4 81.94 MB
    06. Defense in Depth/06_04 - Host.mp4 84.97 MB
    06. Defense in Depth/06_05 - Internal network.mp4 76.27 MB
    06. Defense in Depth/06_06 - Network perimeter.mp4 73.41 MB
    06. Defense in Depth/06_07 - External network.mp4 65.24 MB
    06. Defense in Depth/06_08 - Physical encompassing.mp4 79.78 MB
    06. Defense in Depth/06_09 - Stewardship encompassing.mp4 105.87 MB
    07. Scenarios for Using the Defense in Depth Model/07_01 - Using the defense in depth model.mp4 112.56 MB
    07. Scenarios for Using the Defense in Depth Model/07_02 - The IT desktop PC.mp4 75.27 MB
    07. Scenarios for Using the Defense in Depth Model/07_03 - The sales user's laptop.mp4 88.88 MB
    07. Scenarios for Using the Defense in Depth Model/07_04 - The typical user's phone.mp4 138.14 MB
    07. Scenarios for Using the Defense in Depth Model/07_05 - The CEO's Android tablet.mp4 116.15 MB
    07. Scenarios for Using the Defense in Depth Model/07_06 - The CEO's iMac.mp4 133.05 MB
    07. Scenarios for Using the Defense in Depth Model/07_07 - The data center server.mp4 114.97 MB
    Torrent Downloaded From Katcr.co - Kickasstorrents.txt 52 B

Download Info

  • Tips

    “Lynda - Learning IT Security” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.