Magnetic link has been copied to the cutting board

Name [GigaCourse.Com] Udemy - Certified Information Systems Security Officer (CISSO)

File Type video

Size 5.42GB

UpdateDate 2024-10-19

hash *****6079E5B4D9C692483092DB57E921C70F58

Hot 2

Files 0. Websites you may like/[CourseClub.Me].url | 122B 0. Websites you may like/[GigaCourse.Com].url | 49B 01 - Module 01 - Risk Management/001 Agenda.mp4 | 43.43MB 01 - Module 01 - Risk Management/001 Agenda_en.vtt | 17.91KB 01 - Module 01 - Risk Management/002 Risk Management.mp4 | 60.80MB 01 - Module 01 - Risk Management/002 Risk Management_en.vtt | 17.09KB 01 - Module 01 - Risk Management/003 Quantitative Analysis.mp4 | 60.73MB 01 - Module 01 - Risk Management/003 Quantitative Analysis_en.vtt | 18.00KB 01 - Module 01 - Risk Management/12128224-CISSO-WB01.pdf | 289.36KB 02 - Module 02 - Security Management/001 Security Management.mp4 | 56.53MB 02 - Module 02 - Security Management/001 Security Management_en.vtt | 17.54KB 02 - Module 02 - Security Management/002 Enterprise Security Program.mp4 | 24.25MB 02 - Module 02 - Security Management/002 Enterprise Security Program_en.vtt | 12.99KB 02 - Module 02 - Security Management/003 Roadmap to Maturity.mp4 | 55.44MB 02 - Module 02 - Security Management/003 Roadmap to Maturity_en.vtt | 16.91KB 02 - Module 02 - Security Management/004 Human Resources Issues.mp4 | 49.64MB 02 - Module 02 - Security Management/004 Human Resources Issues_en.vtt | 9.69KB 02 - Module 02 - Security Management/12128228-CISSO-WB02.pdf | 284.08KB 02 - Module 02 - Security Management/[CourseClub.Me].url | 122B 02 - Module 02 - Security Management/[GigaCourse.Com].url | 49B 03 - Module 03 -Authentication/001 Authentication.mp4 | 128.59MB 03 - Module 03 -Authentication/001 Authentication_en.vtt | 17.30KB 03 - Module 03 -Authentication/002 Biometrics Error Types.mp4 | 35.23MB 03 - Module 03 -Authentication/002 Biometrics Error Types_en.vtt | 19.15KB 03 - Module 03 -Authentication/003 Memory Cards.mp4 | 58.60MB 03 - Module 03 -Authentication/003 Memory Cards_en.vtt | 13.59KB 03 - Module 03 -Authentication/004 Issues Pertaining to Kerberos.mp4 | 38.91MB 03 - Module 03 -Authentication/004 Issues Pertaining to Kerberos_en.vtt | 11.84KB 03 - Module 03 -Authentication/12128232-CISSO-WB03.pdf | 283.16KB 04 - Module 04 - Access Control/001 Access Control.mp4 | 115.39MB 04 - Module 04 - Access Control/001 Access Control_en.vtt | 14.44KB 04 - Module 04 - Access Control/002 Access Control Characteristics.mp4 | 64.56MB 04 - Module 04 - Access Control/002 Access Control Characteristics_en.vtt | 19.04KB 04 - Module 04 - Access Control/003 Threats to Access Control.mp4 | 65.16MB 04 - Module 04 - Access Control/003 Threats to Access Control_en.vtt | 6.72KB 04 - Module 04 - Access Control/004 Information Classification.mp4 | 74.67MB 04 - Module 04 - Access Control/004 Information Classification_en.vtt | 9.69KB 04 - Module 04 - Access Control/005 Discretionary Access Control Model.mp4 | 61.01MB 04 - Module 04 - Access Control/005 Discretionary Access Control Model_en.vtt | 12.84KB 04 - Module 04 - Access Control/006 Access Control Administration.mp4 | 56.85MB 04 - Module 04 - Access Control/006 Access Control Administration_en.vtt | 12.59KB 04 - Module 04 - Access Control/12128242-CISSO-WB04.pdf | 280.37KB 05 - Module 05 - Security Models/001 Security Models and Evaluation Criteria.mp4 | 85.51MB 05 - Module 05 - Security Models/001 Security Models and Evaluation Criteria_en.vtt | 17.89KB 05 - Module 05 - Security Models/002 What Does It Mean to Be in a Specific Ring.mp4 | 131.42MB 05 - Module 05 - Security Models/002 What Does It Mean to Be in a Specific Ring_en.vtt | 15.62KB 05 - Module 05 - Security Models/003 Non-Interference Model.mp4 | 60.00MB 05 - Module 05 - Security Models/003 Non-Interference Model_en.vtt | 12.84KB 05 - Module 05 - Security Models/004 ITSEC - Good and Bad.mp4 | 86.44MB 05 - Module 05 - Security Models/004 ITSEC - Good and Bad_en.vtt | 10.72KB 05 - Module 05 - Security Models/12128250-CISSO-WB05.pdf | 283.38KB 06 - Module 06 - Operations Security/001 Information Classification.mp4 | 60.21MB 06 - Module 06 - Operations Security/001 Information Classification_en.vtt | 18.35KB 06 - Module 06 - Operations Security/002 Product Implementation Concerns.mp4 | 88.65MB 06 - Module 06 - Operations Security/002 Product Implementation Concerns_en.vtt | 17.64KB 06 - Module 06 - Operations Security/003 Redundant Array of Independent Disk (RAID).mp4 | 51.31MB 06 - Module 06 - Operations Security/003 Redundant Array of Independent Disk (RAID)_en.vtt | 16.65KB 06 - Module 06 - Operations Security/004 Methodology.mp4 | 141.61MB 06 - Module 06 - Operations Security/004 Methodology_en.vtt | 18.48KB 06 - Module 06 - Operations Security/12128256-CISSO-WB06.pdf | 282.20KB 07 - Module 07 - Symmetric Cryptography and Hashing/001 Symmetric Cryptography and Hashing.mp4 | 59.75MB 07 - Module 07 - Symmetric Cryptography and Hashing/001 Symmetric Cryptography and Hashing_en.vtt | 16.84KB 07 - Module 07 - Symmetric Cryptography and Hashing/002 Historical Uses of Symmetric Cryptography Vernam Cipher.mp4 | 53.48MB 07 - Module 07 - Symmetric Cryptography and Hashing/002 Historical Uses of Symmetric Cryptography Vernam Cipher_en.vtt | 14.84KB 07 - Module 07 - Symmetric Cryptography and Hashing/003 Information Classification.mp4 | 157.78MB 07 - Module 07 - Symmetric Cryptography and Hashing/003 Information Classification_en.vtt | 18.70KB 07 - Module 07 - Symmetric Cryptography and Hashing/004 Symmetric Algorithms - DS.mp4 | 120.35MB 07 - Module 07 - Symmetric Cryptography and Hashing/004 Symmetric Algorithms - DS_en.vtt | 22.06KB 07 - Module 07 - Symmetric Cryptography and Hashing/12128258-CISSO-WB07.pdf | 277.08KB 07 - Module 07 - Symmetric Cryptography and Hashing/[CourseClub.Me].url | 122B 07 - Module 07 - Symmetric Cryptography and Hashing/[GigaCourse.Com].url | 49B 08 - Module 08 - Asymmetric Cryptography and PKI/001 Asymmetric Cryptography and PKI.mp4 | 60.84MB 08 - Module 08 - Asymmetric Cryptography and PKI/001 Asymmetric Cryptography and PKI_en.vtt | 18.70KB 08 - Module 08 - Asymmetric Cryptography and PKI/002 Example of Hybrid Cryptography.mp4 | 74.61MB 08 - Module 08 - Asymmetric Cryptography and PKI/002 Example of Hybrid Cryptography_en.vtt | 16.77KB 08 - Module 08 - Asymmetric Cryptography and PKI/003 CA and RA Roles.mp4 | 57.04MB 08 - Module 08 - Asymmetric Cryptography and PKI/003 CA and RA Roles_en.vtt | 18.95KB 08 - Module 08 - Asymmetric Cryptography and PKI/004 Link versus End-to-End Encryption.mp4 | 76.88MB 08 - Module 08 - Asymmetric Cryptography and PKI/004 Link versus End-to-End Encryption_en.vtt | 19.48KB 08 - Module 08 - Asymmetric Cryptography and PKI/005 IPSec Handshaking Process.mp4 | 51.19MB 08 - Module 08 - Asymmetric Cryptography and PKI/005 IPSec Handshaking Process_en.vtt | 17.45KB 08 - Module 08 - Asymmetric Cryptography and PKI/006 Types of Physical IDS.mp4 | 93.46MB 08 - Module 08 - Asymmetric Cryptography and PKI/006 Types of Physical IDS_en.vtt | 20.49KB 08 - Module 08 - Asymmetric Cryptography and PKI/19401622-CISSO-WB08.pdf | 221.67KB 09 - Module 09 - Network Connections/001 Information Classification.mp4 | 60.96MB 09 - Module 09 - Network Connections/001 Information Classification_en.vtt | 20.54KB 09 - Module 09 - Network Connections/002 Summary of Topologies.mp4 | 79.44MB 09 - Module 09 - Network Connections/002 Summary of Topologies_en.vtt | 21.44KB 09 - Module 09 - Network Connections/003 Transmission Types - Number of Recievers.mp4 | 57.23MB 09 - Module 09 - Network Connections/003 Transmission Types - Number of Recievers_en.vtt | 19.65KB 09 - Module 09 - Network Connections/004 Network Topologies.mp4 | 54.28MB 09 - Module 09 - Network Connections/004 Network Topologies_en.vtt | 18.43KB 09 - Module 09 - Network Connections/005 WAN Technologies - DSL.mp4 | 57.72MB 09 - Module 09 - Network Connections/005 WAN Technologies - DSL_en.vtt | 15.66KB 09 - Module 09 - Network Connections/12128266-CISSO-WB09.pdf | 284.82KB 10 - Module 10 - Network Protocols and Devices/001 Information Classification.mp4 | 55.61MB 10 - Module 10 - Network Protocols and Devices/001 Information Classification_en.vtt | 18.07KB 10 - Module 10 - Network Protocols and Devices/002 Transport Layer.mp4 | 94.46MB 10 - Module 10 - Network Protocols and Devices/002 Transport Layer_en.vtt | 20.30KB 10 - Module 10 - Network Protocols and Devices/003 Repeater.mp4 | 69.01MB 10 - Module 10 - Network Protocols and Devices/003 Repeater_en.vtt | 22.67KB 10 - Module 10 - Network Protocols and Devices/004 Firewall Types - Circuit - Level Proxy Firewall.mp4 | 54.24MB 10 - Module 10 - Network Protocols and Devices/004 Firewall Types - Circuit - Level Proxy Firewall_en.vtt | 18.35KB 10 - Module 10 - Network Protocols and Devices/005 TCPIP Suite.mp4 | 51.49MB 10 - Module 10 - Network Protocols and Devices/005 TCPIP Suite_en.vtt | 16.82KB 10 - Module 10 - Network Protocols and Devices/12128270-CISSO-WB10.pdf | 277.97KB 11 - Module 11 - Telephony, VPNs and Wireless/001 Information Classification.mp4 | 58.40MB 11 - Module 11 - Telephony, VPNs and Wireless/001 Information Classification_en.vtt | 18.10KB 11 - Module 11 - Telephony, VPNs and Wireless/002 PBX Vulnerabilities.mp4 | 39.06MB 11 - Module 11 - Telephony, VPNs and Wireless/002 PBX Vulnerabilities_en.vtt | 11.88KB 11 - Module 11 - Telephony, VPNs and Wireless/003 SSLTLS.mp4 | 27.78MB 11 - Module 11 - Telephony, VPNs and Wireless/003 SSLTLS_en.vtt | 8.54KB 11 - Module 11 - Telephony, VPNs and Wireless/004 Wireless Network Topologies.mp4 | 92.51MB 11 - Module 11 - Telephony, VPNs and Wireless/004 Wireless Network Topologies_en.vtt | 18.08KB 11 - Module 11 - Telephony, VPNs and Wireless/005 WPA and WPA2 Mode Types.mp4 | 113.72MB 11 - Module 11 - Telephony, VPNs and Wireless/005 WPA and WPA2 Mode Types_en.vtt | 16.19KB 11 - Module 11 - Telephony, VPNs and Wireless/12128274-CISSO-WB11.pdf | 221.97KB 11 - Module 11 - Telephony, VPNs and Wireless/[CourseClub.Me].url | 122B 11 - Module 11 - Telephony, VPNs and Wireless/[GigaCourse.Com].url | 49B 12 - Module 12 - Security Architecture/001 Information Classification.mp4 | 118.73MB 12 - Module 12 - Security Architecture/001 Information Classification_en.vtt | 15.66KB 12 - Module 12 - Security Architecture/002 Integrated Security is Designed Security.mp4 | 63.35MB 12 - Module 12 - Security Architecture/002 Integrated Security is Designed Security_en.vtt | 20.45KB 12 - Module 12 - Security Architecture/003 System Functionality.mp4 | 40.30MB 12 - Module 12 - Security Architecture/003 System Functionality_en.vtt | 12.64KB 12 - Module 12 - Security Architecture/004 Attacking Through Applications.mp4 | 42.51MB 12 - Module 12 - Security Architecture/004 Attacking Through Applications_en.vtt | 13.50KB 12 - Module 12 - Security Architecture/12128278-CISSO-WB12.pdf | 280.49KB 13 - Module 13 - Software Development Security/001 Information Classification.mp4 | 144.45MB 13 - Module 13 - Software Development Security/001 Information Classification_en.vtt | 18.22KB 13 - Module 13 - Software Development Security/002 Development Methodologies.mp4 | 44.82MB 13 - Module 13 - Software Development Security/002 Development Methodologies_en.vtt | 13.31KB 13 - Module 13 - Software Development Security/003 Security Issues.mp4 | 46.93MB 13 - Module 13 - Software Development Security/003 Security Issues_en.vtt | 14.74KB 13 - Module 13 - Software Development Security/004 Linking Through COM.mp4 | 125.39MB 13 - Module 13 - Software Development Security/004 Linking Through COM_en.vtt | 17.64KB 13 - Module 13 - Software Development Security/19401620-CISSO-WB13.pdf | 276.79KB 14 - Module 14 - Database Security and System Development/001 Information Classification.mp4 | 83.45MB 14 - Module 14 - Database Security and System Development/001 Information Classification_en.vtt | 18.29KB 14 - Module 14 - Database Security and System Development/002 Artificial Intelligence.mp4 | 140.97MB 14 - Module 14 - Database Security and System Development/002 Artificial Intelligence_en.vtt | 19.56KB 14 - Module 14 - Database Security and System Development/003 Virus.mp4 | 77.63MB 14 - Module 14 - Database Security and System Development/003 Virus_en.vtt | 9.32KB 14 - Module 14 - Database Security and System Development/004 DDoS.mp4 | 56.44MB 14 - Module 14 - Database Security and System Development/004 DDoS_en.vtt | 10.70KB 14 - Module 14 - Database Security and System Development/12128288-CISSO-WB14.pdf | 221.33KB 15 - Module 15 - Malware and Software Attacks/001 Malware and Attacks.mp4 | 130.56MB 15 - Module 15 - Malware and Software Attacks/001 Malware and Attacks_en.vtt | 18.39KB 15 - Module 15 - Malware and Software Attacks/12128292-CISSO-WB15.pdf | 281.96KB 15 - Module 15 - Malware and Software Attacks/[CourseClub.Me].url | 122B 15 - Module 15 - Malware and Software Attacks/[GigaCourse.Com].url | 49B 16 - Module 16 - Business Continuity/001 Information Classification.mp4 | 98.75MB 16 - Module 16 - Business Continuity/001 Information Classification_en.vtt | 18.63KB 16 - Module 16 - Business Continuity/002 How to Identify the Most Critical Company Functions.mp4 | 43.58MB 16 - Module 16 - Business Continuity/002 How to Identify the Most Critical Company Functions_en.vtt | 12.39KB 16 - Module 16 - Business Continuity/003 Facility Backups - Hot Site.mp4 | 70.10MB 16 - Module 16 - Business Continuity/003 Facility Backups - Hot Site_en.vtt | 10.69KB 16 - Module 16 - Business Continuity/12128298-CISSO-WB16.pdf | 220.77KB 17 - Module 17 - Disaster Recovery/001 Disaster Recovery.mp4 | 47.93MB 17 - Module 17 - Disaster Recovery/001 Disaster Recovery_en.vtt | 15.10KB 17 - Module 17 - Disaster Recovery/002 Recovery Plan.mp4 | 98.52MB 17 - Module 17 - Disaster Recovery/002 Recovery Plan_en.vtt | 23.16KB 17 - Module 17 - Disaster Recovery/003 Return to Normal Operations.mp4 | 47.74MB 17 - Module 17 - Disaster Recovery/003 Return to Normal Operations_en.vtt | 14.94KB 17 - Module 17 - Disaster Recovery/12128306-CISSO-WB17.pdf | 220.96KB 18 - Module 18 - Incident Management, Law, and Ethics/001 Information Classification.mp4 | 129.46MB 18 - Module 18 - Incident Management, Law, and Ethics/001 Information Classification_en.vtt | 18.27KB 18 - Module 18 - Incident Management, Law, and Ethics/002 Intellectual Property Law.mp4 | 56.77MB 18 - Module 18 - Incident Management, Law, and Ethics/002 Intellectual Property Law_en.vtt | 17.98KB 18 - Module 18 - Incident Management, Law, and Ethics/003 Countries Working Together.mp4 | 119.64MB 18 - Module 18 - Incident Management, Law, and Ethics/003 Countries Working Together_en.vtt | 17.87KB 18 - Module 18 - Incident Management, Law, and Ethics/004 Privacy of Sensitive Data.mp4 | 52.94MB 18 - Module 18 - Incident Management, Law, and Ethics/004 Privacy of Sensitive Data_en.vtt | 12.98KB 18 - Module 18 - Incident Management, Law, and Ethics/12128308-CISSO-WB18.pdf | 280.88KB 18 - Module 18 - Incident Management, Law, and Ethics/[CourseClub.Me].url | 122B 18 - Module 18 - Incident Management, Law, and Ethics/[GigaCourse.Com].url | 49B 19 - Module 19 – Physical/001 Information Classification.mp4 | 135.27MB 19 - Module 19 – Physical/001 Information Classification_en.vtt | 19.05KB 19 - Module 19 – Physical/12128322-CISSO-WB19.pdf | 282.44KB [CourseClub.Me].url | 122B [GigaCourse.Com].url | 49B

Recommend

Magnetic link has been copied to the cutting board