CISSP® - Security Operations

mp4   Hot:56   Size:271.57 MB   Created:2019-03-17 20:50:06   Update:2021-12-13 06:46:54  

Download link

File List

  • 17. External Physical Security/56. Barriers.mp4 18.81 MB
    15. Internal Physical Security/48. Alarms, Access Cards, Biometrics, and Locks.mp4 16.24 MB
    7. Operate and Maintain Protective Controls/22. Maintaining and Operating Protective Controls.mp4 14.32 MB
    3. Digital Forensics/07. Creating a Digital Forensics Capability.mp4 13.07 MB
    13. Personnel Privacy and Safety/42. Safety Matters.mp4 12.24 MB
    6. Change Management/19. Change Control Process.mp4 11.92 MB
    3. Digital Forensics/06. Digital Forensics Foundations.mp4 9.62 MB
    4. Logging and Monitoring/12. Logging and Monitoring Concerns.mp4 9.56 MB
    5. Vulnerability Management/15. Vulnerability Assessment.mp4 9.37 MB
    14. Business Continuity and Disaster Recovery/45. Disaster Recovery and Business Continuity.mp4 9.25 MB
    4. Logging and Monitoring/11. Log Management.mp4 9.17 MB
    17. External Physical Security/57. Lighting.mp4 9.12 MB
    12. Recovery Strategies/38. Recovery Strategies.mp4 9.04 MB
    cissp-security-operations.zip 9 MB
    11. Resource Provisioning/35. Provisioning Assets.mp4 8.61 MB
    16. Securing Assets/53. Protecting Security Equipment.mp4 7.71 MB
    5. Vulnerability Management/16. Patch Management.mp4 7.06 MB
    4. Logging and Monitoring/10. Logging and Monitoring Basics.mp4 6.83 MB
    13. Personnel Privacy and Safety/41. Privacy.mp4 6.38 MB
    8. Incident Management/26. Incident Response Life Cycle.mp4 5.36 MB
    15. Internal Physical Security/50. Mantraps, Safes, Vaults, and Turnstiles.mp4 5.05 MB
    9. Investigative Types/29. Investigative Types.mp4 4.88 MB
    8. Incident Management/25. Creating an Incident Response Capability.mp4 4.72 MB
    2. Introduction to Security Operations/03. Security Operations Foundations.mp4 4.64 MB
    10. Evidence Handling/32. Rules of Evidence.mp4 3.85 MB
    1. Course Overview/01. Course Overview.mp4 3.43 MB
    7. Operate and Maintain Protective Controls/23. Important Terms and Conclusion.mp4 3.01 MB
    17. External Physical Security/58. Closed Circuit Television.mp4 2.9 MB
    2. Introduction to Security Operations/02. Introduction.mp4 2.84 MB
    15. Internal Physical Security/49. Key Controls.mp4 2.7 MB
    3. Digital Forensics/05. Introduction to Digital Forensics.mp4 2.2 MB
    14. Business Continuity and Disaster Recovery/46. Conclusion.mp4 1.51 MB
    13. Personnel Privacy and Safety/43. Conclusion.mp4 1.44 MB
    17. External Physical Security/55. Introduction.mp4 1.33 MB
    3. Digital Forensics/08. Conclusion.mp4 1.32 MB
    14. Business Continuity and Disaster Recovery/44. Introduction.mp4 1.29 MB
    11. Resource Provisioning/36. Conclusion.mp4 1.23 MB
    12. Recovery Strategies/37. Introduction.mp4 1.23 MB
    11. Resource Provisioning/34. Introduction.mp4 1.19 MB
    7. Operate and Maintain Protective Controls/21. Introduction.mp4 1.19 MB
    9. Investigative Types/30. Conclusion.mp4 1.18 MB
    15. Internal Physical Security/47. Introduction.mp4 1.08 MB
    10. Evidence Handling/31. Introduction.mp4 1.06 MB
    9. Investigative Types/28. Introduction.mp4 1.05 MB
    5. Vulnerability Management/14. Introduction.mp4 927.73 KB
    6. Change Management/18. Introduction.mp4 923.62 KB
    16. Securing Assets/52. Introduction.mp4 910.48 KB
    6. Change Management/20. Conclusion.mp4 879.95 KB
    16. Securing Assets/54. Conclusion.mp4 874.07 KB
    4. Logging and Monitoring/09. Introduction.mp4 868.76 KB
    5. Vulnerability Management/17. Conclusion.mp4 860.7 KB
    17. External Physical Security/59. Conclusion.mp4 830.81 KB
    2. Introduction to Security Operations/04. Conclusion.mp4 829.43 KB
    8. Incident Management/24. Introduction.mp4 812.51 KB
    10. Evidence Handling/33. Conclusion.mp4 743.03 KB
    13. Personnel Privacy and Safety/40. Introduction.mp4 738.49 KB
    12. Recovery Strategies/39. Conclusion.mp4 724.4 KB
    4. Logging and Monitoring/13. Conclusion.mp4 716.45 KB
    15. Internal Physical Security/51. Conclusion.mp4 694.45 KB
    8. Incident Management/27. Conclusion.mp4 574.35 KB

Download Info

  • Tips

    “CISSP® - Security Operations” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.