Filename | Size |
| learning_videos/02 - Business Influences and Associated Security Risks.mp4 | 4.5 MB |
| learning_videos/03 - Risk Management.mp4 | 10.2 MB |
| learning_videos/180 - Telephony-VoIP and Social Media.mp4 | 26.2 MB |
| learning_videos/181 - Cloud Based Collaboration.mp4 | 24.2 MB |
| learning_videos/182 - Remote Access and IPsec.mp4 | 44.8 MB |
| learning_videos/183 - Mobile and Personal Device Management.mp4 | 28.3 MB |
| learning_videos/184 - Over Air Technology Concerns.mp4 | 27 MB |
| learning_videos/185 - WLAN Concepts-Terms-Standards.mp4 | 33.7 MB |
| learning_videos/186 - WLAN Security and Attacks.mp4 | 41 MB |
| learning_videos/187 - Security Across the Technology Life Cycle.mp4 | 5.4 MB |
| learning_videos/188 - End to End Solution Ownership.mp4 | 50.8 MB |
| learning_videos/189 - System Development Life Cycle.mp4 | 58.1 MB |
| learning_videos/19 - Risk Management Process.mp4 | 13.5 MB |
| learning_videos/190 - Security Implications of Software Development Methodologies.mp4 | 23.2 MB |
| learning_videos/191 - Asset Management.mp4 | 12.6 MB |
| learning_videos/192 - Course End.mp4 | 2 MB |
| learning_videos/20 - Identifying Vulnerabilities and Threats.mp4 | 19.1 MB |
| learning_videos/21 - Security Architecture Frameworks.mp4 | 27.1 MB |
| learning_videos/22 - Business Continuity Planning.mp4 | 16.3 MB |
| learning_videos/23 - IT Governance.mp4 | 13.9 MB |
| learning_videos/24 - Security Policies.mp4 | 23 MB |
| learning_videos/25 - Security-Privacy Policies and Procedures Part1.mp4 | 5.5 MB |
| learning_videos/26 - Security-Privacy Policies and Procedures Part2.mp4 | 3.4 MB |
| learning_videos/27 - Policy Development Updates.mp4 | 39.3 MB |
| learning_videos/28 - Developing Processes and Procedures.mp4 | 19.8 MB |
| learning_videos/29 - Legal Compliance Part1.mp4 | 53.1 MB |
| learning_videos/30 - Legal Compliance Part2.mp4 | 64.1 MB |
| learning_videos/31 - Security Policy Business Documents.mp4 | 49.9 MB |
| learning_videos/32 - Outage Impact and Estimating Downtime Terms.mp4 | 90.3 MB |
| learning_videos/33 - Sensitive Information-Internal Security Policies.mp4 | 33.3 MB |
| learning_videos/34 - Incident Response Process.mp4 | 35.8 MB |
| learning_videos/35 - Forensic Tasks.mp4 | 19 MB |
| learning_videos/36 - Employment and Termination Procedures.mp4 | 29.7 MB |
| learning_videos/37 - Network Auditing.mp4 | 17.8 MB |
| learning_videos/38 - Incident Response and Recovery Procedures.mp4 | 4 MB |
| learning_videos/39 - E-Discovery and Data Retention Policies.mp4 | 57.9 MB |
| learning_videos/40 - Data Recovery-Storage and Backup Schemes.mp4 | 80 MB |
| learning_videos/41 - Data Owner and Data Handling.mp4 | 15.4 MB |
| learning_videos/42 - Disposal Terms and Concepts.mp4 | 13.2 MB |
| learning_videos/43 - Data Breach and Data Analysis.mp4 | 12.7 MB |
| learning_videos/44 - Incident Response Guidelines.mp4 | 57 MB |
| learning_videos/45 - Incident and Emergency Response.mp4 | 23.8 MB |
| learning_videos/46 - Media-Software and Network Analysis.mp4 | 34.2 MB |
| learning_videos/47 - Order of Volatility.mp4 | 10.4 MB |
| learning_videos/48 - Industry Trends Overview.mp4 | 6.5 MB |
| learning_videos/49 - Performing Ongoing Research.mp4 | 10 MB |
| learning_videos/50 - Security Practices.mp4 | 30.7 MB |
| learning_videos/51 - Evolution of Technology.mp4 | 8.2 MB |
| learning_videos/52 - Situational Awareness and Vulnerability Assessments.mp4 | 43.6 MB |
| learning_videos/53 - Researching Security Implications.mp4 | 27.9 MB |
| learning_videos/54 - Global Industry Security Response.mp4 | 11.6 MB |
| learning_videos/55 - Threat Actors.mp4 | 19 MB |
| learning_videos/56 - Contract Security Requirements.mp4 | 10.2 MB |
| learning_videos/57 - Contract Documents.mp4 | 9 MB |
| learning_videos/58 - Securing the Enterprise Overview.mp4 | 5.2 MB |
| learning_videos/59 - Benchmarks and Baselines.mp4 | 21.1 MB |
| learning_videos/60 - Prototyping and Testing Multiple Solutions.mp4 | 20.4 MB |
| learning_videos/61 - Cost_Benefit Analysis.mp4 | 9.2 MB |
| learning_videos/62 - Metrics Collection and Trend Data.mp4 | 20.6 MB |
| learning_videos/63 - Security Controls-Reverse Engineering and Deconstructing.mp4 | 15.6 MB |
| learning_videos/64 - Security Solutions Business Needs.mp4 | 19.3 MB |
| learning_videos/65 - Lesson Learned- After Action Report.mp4 | 12.3 MB |
| learning_videos/66 - Assessment Tools and Methods.mp4 | 6.6 MB |
| learning_videos/67 - Port Scanners and Vulnerability Scanners.mp4 | 24.5 MB |
| learning_videos/68 - Protocol Analyzer- Network Enumerator-Password Cracker.mp4 | 27.2 MB |
| learning_videos/69 - Fuzzers and HTTP Interceptors.mp4 | 19.6 MB |
| learning_videos/70 - Exploitation Tools.mp4 | 17.4 MB |
| learning_videos/71 - Passive Reconnaissance Tools.mp4 | 54.4 MB |
| learning_videos/72 - Vulnerability Assessments and Malware Sandboxing.mp4 | 17.6 MB |
| learning_videos/73 - Memory Dumping and Penetration Testing.mp4 | 35.8 MB |
| learning_videos/74 - Reconnaissance and Fingerprinting.mp4 | 17.1 MB |
| learning_videos/75 - Code Review.mp4 | 14.9 MB |
| learning_videos/76 - Social Engineering.mp4 | 25.3 MB |
| learning_videos/77 - Social Cryptographic Concepts and Techniques.mp4 | 5.2 MB |
| learning_videos/78 - Cryptographic Benefits and Techniques.mp4 | 29.7 MB |
| learning_videos/79 - Hashing Algorithms.mp4 | 75.5 MB |
| learning_videos/80 - Message Authentication Code.mp4 | 16.6 MB |
| learning_videos/81 - Cryptographic Concepts.mp4 | 57.1 MB |
| learning_videos/82 - Transport Encryption Protocol.mp4 | 33.4 MB |
| learning_videos/83 - Symmetric Algorithms.mp4 | 71.1 MB |
| learning_videos/84 - Asymmetric Algorithms.mp4 | 39.2 MB |
| learning_videos/85 - Hybrid Encryption and Digital Signatures.mp4 | 31.5 MB |
| learning_videos/86 - Public Key Infrastructure.mp4 | 64.6 MB |
| learning_videos/87 - Digital Certificate Classes and Cypher Types.mp4 | 15.4 MB |
| learning_videos/88 - Des Modes.mp4 | 45.3 MB |
| learning_videos/89 - Cryptographic Attacks.mp4 | 67.4 MB |
| learning_videos/90 - Strength vs Performance and Cryptographic Implementations.mp4 | 21.9 MB |
| learning_videos/91 - Enterprise Storage.mp4 | 5.9 MB |
| learning_videos/92 - Virtual Storage Types and Challenges.mp4 | 22.2 MB |
| learning_videos/93 - Cloud Storage.mp4 | 45.6 MB |
| learning_videos/94 - Data Warehousing.mp4 | 18 MB |
| learning_videos/95 - Data Archiving.mp4 | 18.9 MB |
| learning_videos/96 - Storage Area Networks (SANs) and (VSANs).mp4 | 20.1 MB |
| learning_videos/97 - Network Attached Storage (NAS).mp4 | 12.6 MB |
| learning_videos/98 - Storage Protocols and Fiber Channel over Ethernet (FCoE).mp4 | 24.1 MB |
| learning_videos/99 - Storage Network File Systems.mp4 | 15.1 MB |
| Packt – CompTIA Advanced Security Practitioner (CASP) description.pdf | 209.4 KB |
| Приватные видеокурсы.pdf | 348.3 KB |
| Это очень важно!.txt | 769 B |