RAR-files |
linkedin.learning.cisa.cert.prep.5.information.asset.protection.for.is.auditors.update.20210713-xqzt.rar |
50,000,000 |
0773043C |
linkedin.learning.cisa.cert.prep.5.information.asset.protection.for.is.auditors.update.20210713-xqzt.r00 |
50,000,000 |
E1AC4FDA |
linkedin.learning.cisa.cert.prep.5.information.asset.protection.for.is.auditors.update.20210713-xqzt.r01 |
50,000,000 |
B8A127C4 |
linkedin.learning.cisa.cert.prep.5.information.asset.protection.for.is.auditors.update.20210713-xqzt.r02 |
50,000,000 |
0DC0E522 |
linkedin.learning.cisa.cert.prep.5.information.asset.protection.for.is.auditors.update.20210713-xqzt.r03 |
50,000,000 |
CC2FECE3 |
linkedin.learning.cisa.cert.prep.5.information.asset.protection.for.is.auditors.update.20210713-xqzt.r04 |
50,000,000 |
586870A9 |
linkedin.learning.cisa.cert.prep.5.information.asset.protection.for.is.auditors.update.20210713-xqzt.r05 |
28,362,638 |
3D86CDB7 |
|
Total size: |
328,362,638 |
|
|
Archived
files |
01.01-welcome.mkv
[83ac8f0fa82d8934]
|
3,080,076 |
C7CC51D2 |
02.01-information_security_concepts.mkv
[992ddae39777edb7]
|
8,373,872 |
7495D617 |
02.02-anatomy_of_a_cyberattack.mkv
[e021f53550b69076]
|
8,697,315 |
B7013546 |
02.03-social_engineering.mkv
[8c020d23a24b31a9]
|
9,631,792 |
7503EAE7 |
02.04-information_security_domains.mkv
[c58e88f86dae4ca5]
|
25,425,788 |
0AE85AA6 |
03.01-data_security.mkv
[df216f0b98fa730e]
|
4,570,690 |
F8C847B5 |
03.02-access_control_models.mkv
[ce565fc15ce38695]
|
27,016,889 |
726F2D09 |
03.03-single_sign-on.mkv
[89bc6b0409eb79b8]
|
13,798,684 |
44CC723A |
03.04-centralized_access_control.mkv
[2b9993d81a3c12cb]
|
14,048,181 |
68A830AD |
03.05-network_security_firewalls.mkv
[357ce6c04f4e1df3]
|
20,166,356 |
734317F6 |
03.06-authentication_protocols.mkv
[b66f0c5becc3982c]
|
7,086,826 |
68A3D46A |
03.07-vpns_and_tunneling.mkv
[bb5364970db3a67]
|
16,171,373 |
1E93DE02 |
03.08-domain_names_system.mkv
[ea843574c8475019]
|
8,980,858 |
8AA2FFFD |
03.09-cryptography_overview_part_1.mkv
[ae0385edf2a6d9aa]
|
20,868,322 |
79C854F5 |
03.10-cryptography_overview_part_2.mkv
[db9a772bd9e4da7e]
|
19,935,828 |
187515DC |
03.11-cryptography_hash_algorithms_and_digital_signatures.mkv
[9638e43b18395bef]
|
9,642,168 |
B3A655A6 |
03.12-cryptography_public_key_infrastructure_and_certificates.mkv
[c37f9a2cb18da329]
|
15,145,895 |
E795ECBC |
03.13-pbx_and_voip_security.mkv
[2fe4e3524901398e]
|
10,934,823 |
CBCDB6CE |
03.14-secure_protocols.mkv
[b8b23a38eaccb699]
|
10,132,573 |
5830BA60 |
03.15-wireless_security.mkv
[89798a3b3f0f4c82]
|
15,902,823 |
C6A47F10 |
03.16-internet_of_things_and_endpoint_security.mkv
[ee5d066dc5d375]
|
4,913,206 |
A63096E0 |
03.17-third-party_vendor_controls.mkv
[dd031b24b43c374]
|
8,201,192 |
EE54ED9D |
03.18-physical_and_environmental_security.mkv
[8ee5272520cdcbf]
|
5,650,735 |
56CE1F84 |
03.19-security_assessment_and_testing.mkv
[3a6c601fd83cdf0c]
|
7,124,148 |
DF3527BD |
03.20-evidence_collection_and_forensics.mkv
[73642974aedaedd1]
|
5,824,041 |
F12BD6DD |
04.01-cyberattacks_and_countermeasures.mkv
[a66fff236735ff42]
|
17,188,092 |
331708A7 |
05.01-conducting_service_organization_control_(soc)_audits.mkv
[8e2596cef36ccb5c]
|
7,103,175 |
F3518667 |
06.01-next_steps.mkv
[3c61df03e8a2f220]
|
2,744,159 |
E9D19A5D |
|
Total size: |
328,359,880 |
|
|