Home Sewing Is Killing Fashion
  • U: Anonymous
  • D: 2018-07-22 13:05:30
  • C: APPS

RELEASE >

ReScene version pyReScene Auto 0.7 JGTiSO File size CRC
Download
73,466
Stored files
15,953 2CDEA7C9
600 457362F3
RAR-files
jgt-pcseei.rar 500,000,000 7B378F64
jgt-pcseei.r00 500,000,000 F55462D4
jgt-pcseei.r01 500,000,000 0CF3B3E8
jgt-pcseei.r02 500,000,000 37AB885E
jgt-pcseei.r03 500,000,000 C8A06CB4
jgt-pcseei.r04 500,000,000 33AA482F
jgt-pcseei.r05 500,000,000 DC69F826
jgt-pcseei.r06 500,000,000 838B514A
jgt-pcseei.r07 500,000,000 0F6B0162
jgt-pcseei.r08 500,000,000 7333055E
jgt-pcseei.r09 500,000,000 2E8F2A94
jgt-pcseei.r10 500,000,000 E126245F
jgt-pcseei.r11 500,000,000 F4AC148F
jgt-pcseei.r12 500,000,000 60FDF3C7
jgt-pcseei.r13 500,000,000 79042D5C
jgt-pcseei.r14 500,000,000 83474169
jgt-pcseei.r15 500,000,000 931E72A2
jgt-pcseei.r16 500,000,000 DF172CE5
jgt-pcseei.r17 500,000,000 D3B41A6E
jgt-pcseei.r18 500,000,000 0F0C3398
jgt-pcseei.r19 500,000,000 89C82906
jgt-pcseei.r20 500,000,000 1C0DBF1D
jgt-pcseei.r21 500,000,000 F1B45831
jgt-pcseei.r22 499,625,612 F55E3377

Total size: 11,999,625,612
Archived files
Pearson CISSP, Second Edition\01.Introduction\0101.CISSP Introduction.mp4 [825d898031a0a270] 53,302,163 6D0FC78F
Pearson CISSP, Second Edition\02. Domain 1 Security and Risk Management\0201.Module introduction.mp4 [ca753a785efbfb30] 10,265,492 8C7A96EA
Pearson CISSP, Second Edition\03. Understand and Apply Concepts of Confidentiality, Integrity and Availability\0301.Learning objectives.mp4 [f919e16c6f83aab7] 2,635,552 D10422AD
Pearson CISSP, Second Edition\03. Understand and Apply Concepts of Confidentiality, Integrity and Availability\0302.Information Security Fundamentals.mp4 [7045403c7a7096da] 116,107,713 C70AD0F0
Pearson CISSP, Second Edition\04. Evaluate and Apply Security Governance Principles\0401.Learning objectives.mp4 [f94d26de6464f147] 2,978,226 8A4CBE29
Pearson CISSP, Second Edition\04. Evaluate and Apply Security Governance Principles\0402.Frameworks, Benchmarks, and Guidelines.mp4 [9225917c48cec4d3] 125,786,402 05693102
Pearson CISSP, Second Edition\04. Evaluate and Apply Security Governance Principles\0403.Leadership Roles and Responsibilities.mp4 [b3e7caa6f2a4e2d2] 194,863,044 0FF33BE5
Pearson CISSP, Second Edition\05. Determine Compliance Requirements\0501.Learning objectives.mp4 [fe2cb91435bba3bc] 2,917,565 03EDFBE9
Pearson CISSP, Second Edition\05. Determine Compliance Requirements\0502.Regulatory and Contractual Obligations.mp4 [49d25a60265b6e23] 104,240,228 2452E1D8
Pearson CISSP, Second Edition\05. Determine Compliance Requirements\0503.Privacy and Data Protection.mp4 [7257627556141c88] 88,358,266 01563601
Pearson CISSP, Second Edition\06. Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context\0601.Learning objectives.mp4 [8ad13a4903fda4d8] 4,792,917 528F0689
Pearson CISSP, Second Edition\06. Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context\0602.Cybercrime and Data Breaches.mp4 [475d05ddc9d256ec] 103,291,257 53FF6A2B
Pearson CISSP, Second Edition\06. Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context\0603.Licensing and Intellectual Property Law.mp4 [4aac279111d3c63e] 86,535,546 196C6BDF
Pearson CISSP, Second Edition\06. Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context\0604.Lesson 1-4 Assessment.mp4 [fd2f149d1bae04bd] 68,656,766 9156E174
Pearson CISSP, Second Edition\07. Understand, Adhere to and Promote Professional Ethics\0701.Learning objectives.mp4 [d2afdb7093681c08] 2,734,344 4EB2B180
Pearson CISSP, Second Edition\07. Understand, Adhere to and Promote Professional Ethics\0702.Organizational and Professional Ethics.mp4 [352e2c9e3b837cdf] 48,151,911 E797E2D8
Pearson CISSP, Second Edition\08. Develop, Document and Implement Security Policy, Standards, Procedures and Guidelines\0801.Learning objectives.mp4 [5065f5b99722c49b] 3,088,061 E887EEC7
Pearson CISSP, Second Edition\08. Develop, Document and Implement Security Policy, Standards, Procedures and Guidelines\0802.Information Security Policy.mp4 [651ec10891e7d14e] 95,749,252 95ADDBC2
Pearson CISSP, Second Edition\09. Identify, Analyze, and Prioritize Business Continuity (BC) Requirements\0901.Learning objectives.mp4 [1efe73eeb04d6554] 3,293,242 22367284
Pearson CISSP, Second Edition\09. Identify, Analyze, and Prioritize Business Continuity (BC) Requirements\0902.Business Continuity Planning.mp4 [64c52d597021ba7d] 63,102,015 7A33DE05
Pearson CISSP, Second Edition\09. Identify, Analyze, and Prioritize Business Continuity (BC) Requirements\0903.Business Impact Analysis.mp4 [8f6f0920dff5ba78] 94,723,278 CDF12ED5
Pearson CISSP, Second Edition\10. Contribute to and Enforce Personnel Security Policies and Procedures\1001.Learning objectives.mp4 [2bfb7a05c8b7cecb] 3,165,924 5E29A58B
Pearson CISSP, Second Edition\10. Contribute to and Enforce Personnel Security Policies and Procedures\1002.Personnel Policies and Agreements.mp4 [8eea60abd5498e97] 144,661,581 23BBCC36
Pearson CISSP, Second Edition\10. Contribute to and Enforce Personnel Security Policies and Procedures\1003.Lesson 5-8 Assessment.mp4 [5f78a0aca4814b70] 66,894,630 70ADCAF9
Pearson CISSP, Second Edition\11. Understand and Apply Risk Management Concepts\1101.Learning objectives.mp4 [c25ef81c22ede0fb] 3,531,959 1F03E913
Pearson CISSP, Second Edition\11. Understand and Apply Risk Management Concepts\1102.Risk Management Concepts.mp4 [431f5a6e10788f73] 130,665,562 4752F9CE
Pearson CISSP, Second Edition\11. Understand and Apply Risk Management Concepts\1103.Risk Assessment.mp4 [51206e99151d384] 127,314,544 C1EE2CB9
Pearson CISSP, Second Edition\11. Understand and Apply Risk Management Concepts\1104.Countermeasure Selection.mp4 [1bd94531faf1975f] 121,825,082 E1F5C257
Pearson CISSP, Second Edition\12. Understand and Apply Threat Modeling Concepts and Methodologies\1201.Learning objectives.mp4 [8ea7093a634ffadf] 2,644,797 F46330E4
Pearson CISSP, Second Edition\12. Understand and Apply Threat Modeling Concepts and Methodologies\1202.Threat Modeling.mp4 [63ef5fc9ce25b4b8] 88,392,172 815230BE
Pearson CISSP, Second Edition\12. Understand and Apply Threat Modeling Concepts and Methodologies\1203.Attack Vectors.mp4 [754b5d4f7bf38d43] 118,621,992 81F07CA6
Pearson CISSP, Second Edition\13. Apply Risk Management Concepts to the Supply Chain\1301.Learning objectives.mp4 [388b4dc81fe525be] 2,333,878 D7B77048
Pearson CISSP, Second Edition\13. Apply Risk Management Concepts to the Supply Chain\1302.Supply Chain Risk Management.mp4 [c23f4f9c7366fcda] 83,132,028 A21DF310
Pearson CISSP, Second Edition\14. Establish and Maintain a Security Awareness, Education, and Training Program\1401.Learning objectives.mp4 [6e3f639406057bfb] 4,493,533 9CFAA730
Pearson CISSP, Second Edition\14. Establish and Maintain a Security Awareness, Education, and Training Program\1402.SETA Principles and Practices.mp4 [5491fcd2dbb17eec] 101,444,390 9EFF461A
Pearson CISSP, Second Edition\14. Establish and Maintain a Security Awareness, Education, and Training Program\1403.Social Engineering Training.mp4 [57a6f9acca4fca28] 93,182,837 138E7173
Pearson CISSP, Second Edition\14. Establish and Maintain a Security Awareness, Education, and Training Program\1404.Lesson 9-12 Assessment.mp4 [162d68df06b6e826] 72,918,801 16982018
Pearson CISSP, Second Edition\15. Domain 2 Asset Security\1501.Module introduction.mp4 [4292801dea4d482c] 7,038,269 22B2F828
Pearson CISSP, Second Edition\16. Identify and Classify Information and Assets\1601.Learning objectives.mp4 [48ad1a9a9e7c98b] 2,249,050 7EF0395A
Pearson CISSP, Second Edition\16. Identify and Classify Information and Assets\1602.Classification Frameworks.mp4 [5a808b05e14854dd] 110,320,197 7692AC43
Pearson CISSP, Second Edition\17. Determine and Maintain Information and Asset Ownership\1701.Learning objectives.mp4 [1fde8e97ea9097cb] 2,298,255 7EF4B6F7
Pearson CISSP, Second Edition\17. Determine and Maintain Information and Asset Ownership\1702.Asset Ownership and Management.mp4 [2e15c428379ae302] 110,574,041 3BA99D3D
Pearson CISSP, Second Edition\18. Protect Privacy\1801.Learning objectives.mp4 [75cac5e8f9735aae] 1,996,374 C54E7C79
Pearson CISSP, Second Edition\18. Protect Privacy\1802.Privacy Principles.mp4 [ec3ea100b77a3b98] 119,268,465 BCD13CFE
Pearson CISSP, Second Edition\19. Ensure Appropriate Asset Retention\1901.Learning objectives.mp4 [dc213495aec8f4ee] 2,384,925 E67E0230
Pearson CISSP, Second Edition\19. Ensure Appropriate Asset Retention\1902.Data Retention and Destruction.mp4 [327e1a91a76f0f07] 142,848,187 4EBA275B
Pearson CISSP, Second Edition\20. Determine Data Security Controls\2001.Learning objectives.mp4 [4e9d69467de7a149] 2,434,141 4CDC5181
Pearson CISSP, Second Edition\20. Determine Data Security Controls\2002.Data Security Standards and Selection.mp4 [61858d4648b21d5] 76,318,601 261A527D
Pearson CISSP, Second Edition\21. Establish Information and Asset Handling Requirements\2101.Learning objectives.mp4 [4eeb64f2daeaed6] 3,919,261 33CACC0F
Pearson CISSP, Second Edition\21. Establish Information and Asset Handling Requirements\2102.Labeling and Handling Standards.mp4 [7d0d94d9af737f30] 97,703,600 8EE94270
Pearson CISSP, Second Edition\21. Establish Information and Asset Handling Requirements\2103.Lesson 13-18 Assessment.mp4 [3e8f8d3bb8664b5c] 61,126,332 398643AC
Pearson CISSP, Second Edition\22. Domain 3 Security Architecture and Engineering\2201.Module introduction.mp4 [8e2fd9ef3541e037] 11,353,225 7B726EB1
Pearson CISSP, Second Edition\23. Implement and Manage Engineering Processes Using Secure Design Principles\2301.Learning objectives.mp4 [9793efef96c64565] 2,429,527 8E5AAE74
Pearson CISSP, Second Edition\23. Implement and Manage Engineering Processes Using Secure Design Principles\2302.Security Design Principles.mp4 [a48a28a04ef4fac4] 77,251,230 65DE2147
Pearson CISSP, Second Edition\24. Understand the Fundamental Concepts of Security Models\2401.Learning objectives.mp4 [1bc3deb40da0c9c8] 2,331,398 0D3E1518
Pearson CISSP, Second Edition\24. Understand the Fundamental Concepts of Security Models\2402.Information Security Models.mp4 [3b76c4f37b730cfc] 105,031,791 3EBE8772
Pearson CISSP, Second Edition\25. Select Controls Based Upon Systems Security Requirements\2501.Learning objectives.mp4 [6550f497a8fa08ee] 2,303,147 7DF2A86C
Pearson CISSP, Second Edition\25. Select Controls Based Upon Systems Security Requirements\2502.Security Evaluation Models.mp4 [fe9865bc8e7db7c9] 80,523,879 2B56262C
Pearson CISSP, Second Edition\26. Understand Security Capabilities of Information Systems\2601.Learning objectives.mp4 [785e0611cde6279b] 3,615,682 B7841109
Pearson CISSP, Second Edition\26. Understand Security Capabilities of Information Systems\2602.Information Systems Security Capabilities.mp4 [b09e7a60aaaace6f] 74,023,111 ACE9EDE2
Pearson CISSP, Second Edition\26. Understand Security Capabilities of Information Systems\2603.Lesson 19-22 Assessment.mp4 [19d4ae7f78027bdf] 63,211,131 A2D61705
Pearson CISSP, Second Edition\27. Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements\2701.Learning objectives.mp4 [5b3cad1a03776238] 3,551,350 826C7815
Pearson CISSP, Second Edition\27. Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements\2702.Traditional Computing Environments.mp4 [409d2d65ca2f8d92] 67,796,181 2107DEAD
Pearson CISSP, Second Edition\27. Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements\2703.Cloud Computing.mp4 [f213bfb642174d1d] 121,100,304 7A7A148D
Pearson CISSP, Second Edition\28. Assess and Mitigate Vulnerabilities in Web-based Systems\2801.Learning objectives.mp4 [beb9a675d8194f43] 2,184,461 F65BCFA0
Pearson CISSP, Second Edition\28. Assess and Mitigate Vulnerabilities in Web-based Systems\2802.Web Vulnerabilities.mp4 [a4b7cb6b5ad63710] 101,396,003 0999C8B8
Pearson CISSP, Second Edition\29. Assess and Mitigate Vulnerabilities in Mobile Systems\2901.Learning objectives.mp4 [cb350bdb776de8c1] 2,338,206 CCE2C43F
Pearson CISSP, Second Edition\29. Assess and Mitigate Vulnerabilities in Mobile Systems\2902.Mobile Systems Vulnerabilities.mp4 [26fd37abf7b251f0] 87,585,224 B3BDF37B
Pearson CISSP, Second Edition\30. Assess and Mitigate Vulnerabilities in Embedded Systems\3001.Learning objectives.mp4 [6dfd7d158876e378] 3,285,525 071FFBCA
Pearson CISSP, Second Edition\30. Assess and Mitigate Vulnerabilities in Embedded Systems\3002.Embedded Systems Vulnerabilities.mp4 [3eb137888265e214] 80,740,294 48775C00
Pearson CISSP, Second Edition\30. Assess and Mitigate Vulnerabilities in Embedded Systems\3003.Lesson 23-26 Assessment.mp4 [7f5891faa389eaa2] 65,432,736 F9825006
Pearson CISSP, Second Edition\31. Apply Cryptography\3101.Learning objectives.mp4 [e54bc2ee38bcf16d] 5,635,687 45DE7717
Pearson CISSP, Second Edition\31. Apply Cryptography\3102.Cryptographic Fundamentals.mp4 [a98769db25801694] 103,867,295 33A464F6
Pearson CISSP, Second Edition\31. Apply Cryptography\3103.Symmetric Encryption.mp4 [a4e1424cbb458183] 99,628,453 EC6EDE18
Pearson CISSP, Second Edition\31. Apply Cryptography\3104.Asymmetric Encryption.mp4 [5bdf892e5f31262a] 106,798,130 3DDBC073
Pearson CISSP, Second Edition\31. Apply Cryptography\3105.Hashing and Digital Signatures.mp4 [383e8f7e5248a2d6] 108,636,991 0C5316E5
Pearson CISSP, Second Edition\31. Apply Cryptography\3106.PKI and Digital Certificates.mp4 [1065c561f28dc929] 122,571,440 C4CB4DFE
Pearson CISSP, Second Edition\31. Apply Cryptography\3107.Cryptographic Attacks and Vulnerabilities.mp4 [551da0760fb1967b] 88,595,404 CFC59F3B
Pearson CISSP, Second Edition\32. Apply Security Principles to Site and Facility Design\3201.Learning objectives.mp4 [de23db68dc644841] 2,261,617 3D28595E
Pearson CISSP, Second Edition\32. Apply Security Principles to Site and Facility Design\3202.Physical Security Principles.mp4 [ac7a6db75030ebb6] 77,438,842 C8E5FCE7
Pearson CISSP, Second Edition\33. Implement Site and Facility Security Controls\3301.Learning objectives.mp4 [7ea67b3d90ad344f] 4,398,416 0C712CD7
Pearson CISSP, Second Edition\33. Implement Site and Facility Security Controls\3302.Site and Facility Security Controls.mp4 [df58a7cf500d9d24] 113,071,002 15D6257B
Pearson CISSP, Second Edition\33. Implement Site and Facility Security Controls\3303.Environmental Issues and Controls.mp4 [ac212eec8e184250] 92,268,251 26924589
Pearson CISSP, Second Edition\33. Implement Site and Facility Security Controls\3304.Lesson 27-29 Assessment.mp4 [788a93df653e827e] 66,268,889 41EF0BA8
Pearson CISSP, Second Edition\34. Domain 4 Communication and Network Security\3401.Module introduction.mp4 [fd74e8df0a61a8e] 7,967,384 D2F72C28
Pearson CISSP, Second Edition\35. Implement Secure Design Principles in Network Architectures\3501.Learning objectives.mp4 [5ad937fbdc64b112] 3,595,030 A3C316CF
Pearson CISSP, Second Edition\35. Implement Secure Design Principles in Network Architectures\3502.Network Models and IP Convergence.mp4 [c6fbbd2b64d8fb95] 118,274,859 70B8396E
Pearson CISSP, Second Edition\35. Implement Secure Design Principles in Network Architectures\3503.Non-IP Multilayer Protocols.mp4 [80e34a62994ab60e] 43,725,824 8DE46866
Pearson CISSP, Second Edition\35. Implement Secure Design Principles in Network Architectures\3504.Wireless Networks.mp4 [7e7fd23a4ec4806f] 123,698,509 5554EB45
Pearson CISSP, Second Edition\36. Secure Network Components\3601.Learning objectives.mp4 [aa553d42da7ad4f6] 3,002,594 5B2DFFFB
Pearson CISSP, Second Edition\36. Secure Network Components\3602.Transmission and Connectivity.mp4 [94abeb8917e051a5] 150,856,586 33CFA876
Pearson CISSP, Second Edition\36. Secure Network Components\3603.Network Access Control Devices.mp4 [add1c286ea292468] 117,600,275 2F9DE62B
Pearson CISSP, Second Edition\36. Secure Network Components\3604.Endpoint Security.mp4 [4c24091fba2dc47b] 76,076,341 CF8464DD
Pearson CISSP, Second Edition\37. Implement Secure Communication Channels According to Design\3701.Learning objectives.mp4 [27ef84bc9fad8186] 6,640,857 CB031F51
Pearson CISSP, Second Edition\37. Implement Secure Communication Channels According to Design\3702.Voice and Multimedia.mp4 [5ddac2ebe6ac8186] 108,101,758 21CCCE21
Pearson CISSP, Second Edition\37. Implement Secure Communication Channels According to Design\3703.Remote Access.mp4 [e0d33b27c6ba0f6d] 112,575,748 6FA5A07C
Pearson CISSP, Second Edition\37. Implement Secure Communication Channels According to Design\3704.Data Communications.mp4 [fe1409219c17e041] 118,303,211 3E87EAA6
Pearson CISSP, Second Edition\37. Implement Secure Communication Channels According to Design\3705.Virtualization and Software-defined Networks.mp4 [29c2f611c95bade5] 101,965,113 DB8038FB
Pearson CISSP, Second Edition\37. Implement Secure Communication Channels According to Design\3706.Lesson 30-32 Assessment.mp4 [a6652c8d84232a63] 87,973,645 E3B019E4
Pearson CISSP, Second Edition\38. Domain 5 Identity and Access Management (IAM)\3801.Module introduction.mp4 [d0f7f069443ef1cf] 7,748,297 8997BEB2
Pearson CISSP, Second Edition\39. Control Physical and Logical Access to Assets\3901.Learning objectives.mp4 [270c6bb0c70d3f9] 2,399,352 7151F2CA
Pearson CISSP, Second Edition\39. Control Physical and Logical Access to Assets\3902.Access Control Fundamentals.mp4 [5f9f08d308291066] 121,086,012 77824351
Pearson CISSP, Second Edition\40. Manage Identification and Authentication of People, Devices, and Services\4001.Learning objectives.mp4 [1bc37407b236419a] 3,819,809 763939AA
Pearson CISSP, Second Edition\40. Manage Identification and Authentication of People, Devices, and Services\4002.Identification and Authentication.mp4 [eaae29598dd8c0b3] 149,416,331 CBF188E4
Pearson CISSP, Second Edition\40. Manage Identification and Authentication of People, Devices, and Services\4003.Identity and Access Services.mp4 [ae78f409a3dab0eb] 125,833,594 74E0A8EB
Pearson CISSP, Second Edition\41. Integrate Identify as a Third-party Service\4101.Learning objectives.mp4 [5ff278bbdfc32590] 2,425,202 3B0E2F82
Pearson CISSP, Second Edition\41. Integrate Identify as a Third-party Service\4102.Identity Management (IdM).mp4 [33d0d63a88e0dbaf] 118,669,269 1C0E60E3
Pearson CISSP, Second Edition\42. Implement and Manage Authorization Mechanisms\4201.Learning objectives.mp4 [498f50b4932f3eaf] 2,372,005 4A1399D8
Pearson CISSP, Second Edition\42. Implement and Manage Authorization Mechanisms\4202.Access Control Models.mp4 [5474f9ca85d05c82] 93,801,788 BDB8250C
Pearson CISSP, Second Edition\43. Manage the Identity and Access Provisioning Lifecycle\4301.Learning objectives.mp4 [58f2e1b761681adc] 4,050,041 02E4C86B
Pearson CISSP, Second Edition\43. Manage the Identity and Access Provisioning Lifecycle\4302.Identity and Access Management (IAM).mp4 [9e671e8b35dc9d53] 98,898,108 2BEACD58
Pearson CISSP, Second Edition\43. Manage the Identity and Access Provisioning Lifecycle\4303.Lesson 33-37 Assessment.mp4 [515da1e05da05e00] 90,593,322 9D7A6A3D
Pearson CISSP, Second Edition\44. Domain 6 Security Assessment and Testing\4401.Module introduction.mp4 [1aae0938741b5599] 8,050,099 0E3D919A
Pearson CISSP, Second Edition\45. Design and Validate Assessment, Test, and Audit Strategies\4501.Learning objectives.mp4 [7085636c25d4c891] 2,923,840 4DC5EB5C
Pearson CISSP, Second Edition\45. Design and Validate Assessment, Test, and Audit Strategies\4502.Assessment and Testing Overview.mp4 [2c2c7ea2eec632a3] 84,380,629 520E78E7
Pearson CISSP, Second Edition\45. Design and Validate Assessment, Test, and Audit Strategies\4503.Planning Engagements.mp4 [fa7f0fd2eb916e03] 106,636,766 EA375CB8
Pearson CISSP, Second Edition\46. Conduct Security Control Testing\4601.Learning objectives.mp4 [dd1d59f1340be319] 2,567,678 08A22084
Pearson CISSP, Second Edition\46. Conduct Security Control Testing\4602.Infrastructure Assessments.mp4 [b9aa019fd10440e8] 149,494,710 6F88B981
Pearson CISSP, Second Edition\46. Conduct Security Control Testing\4603.Code Testing and Analysis.mp4 [c5ead3715a6ff611] 64,828,084 CDFDB0B2
Pearson CISSP, Second Edition\47. Collect Security Process Data\4701.Learning objectives.mp4 [c69d2b665f7d2949] 2,874,269 413596EC
Pearson CISSP, Second Edition\47. Collect Security Process Data\4702.Activity and Error Reporting.mp4 [e845754491f7613d] 73,473,869 0008C919
Pearson CISSP, Second Edition\47. Collect Security Process Data\4703.Information Security Continuous Monitoring.mp4 [21fe1fd5051338b9] 83,470,280 493FECD1
Pearson CISSP, Second Edition\48. Analyze Test Output and Generate Report\4801.Learning objectives.mp4 [6a7ea1c2ad2b17d9] 2,636,484 3CFE74BD
Pearson CISSP, Second Edition\48. Analyze Test Output and Generate Report\4802.Metrics, KPIs, and Business Intelligence.mp4 [4acba028d3073572] 47,640,362 F06F9794
Pearson CISSP, Second Edition\49. Conduct or Facilitate Security Audits\4901.Learning objectives.mp4 [b31746c54e3c456b] 3,818,873 EC8978C7
Pearson CISSP, Second Edition\49. Conduct or Facilitate Security Audits\4902.Managing Third-party Audits and Examinations.mp4 [cc3323e8241a15f1] 108,902,520 1710D380
Pearson CISSP, Second Edition\49. Conduct or Facilitate Security Audits\4903.Lesson 38-42 Assessment.mp4 [7dce3779f92ab661] 89,917,900 94C186A8
Pearson CISSP, Second Edition\50. Domain 7 Security Operations\5001.Module introduction.mp4 [2f5256742c321633] 11,391,995 63CEAECE
Pearson CISSP, Second Edition\51. Understand and Support Investigations\5101.Learning objectives.mp4 [f6bbadcc9e375ad9] 2,865,668 DC71BC7A
Pearson CISSP, Second Edition\51. Understand and Support Investigations\5102.Evidence Handling.mp4 [94d8334cb38a21ae] 79,403,520 AECC90D0
Pearson CISSP, Second Edition\51. Understand and Support Investigations\5103.Forensic Investigative Techniques.mp4 [a7a5c91e7328cf48] 130,281,904 2BA98995
Pearson CISSP, Second Edition\52. Understand Requirements for Investigation Types\5201.Learning objectives.mp4 [290397954017a7ca] 2,632,429 29A895B0
Pearson CISSP, Second Edition\52. Understand Requirements for Investigation Types\5202.Investigation Objectives and Requirements.mp4 [75b6f9edfb7ec2c2] 62,286,404 BA7F7552
Pearson CISSP, Second Edition\53. Conduct Logging and Monitoring Activities\5301.Learning objectives.mp4 [ad54ac84150f14c] 3,108,146 4A22FDCD
Pearson CISSP, Second Edition\53. Conduct Logging and Monitoring Activities\5302.Logging and Analysis.mp4 [e30cbfce33d93fb1] 114,002,862 66C2E9D5
Pearson CISSP, Second Edition\53. Conduct Logging and Monitoring Activities\5303.Lesson 43-45 Assessment.mp4 [8f8f0394c9f76096] 94,475,314 1F331615
Pearson CISSP, Second Edition\54. Securely Provisioning Resources\5401.Learning objectives.mp4 [723f403c7dc9fe07] 2,133,597 B4208F06
Pearson CISSP, Second Edition\54. Securely Provisioning Resources\5402.Configuration Management.mp4 [c988dfe7327f09c9] 43,951,968 9B71C948
Pearson CISSP, Second Edition\55. Understand and Apply Foundational Security Operations Concepts\5501.Learning objectives.mp4 [b2b7d6aa5c163c15] 2,439,202 E0FAC19B
Pearson CISSP, Second Edition\55. Understand and Apply Foundational Security Operations Concepts\5502.Security Operations.mp4 [d90c7556a5ba35d2] 111,585,918 F172518F
Pearson CISSP, Second Edition\56. Apply Resource Protection Techniques\5601.Learning objectives.mp4 [da51f982c88200a] 2,892,436 3250DF53
Pearson CISSP, Second Edition\56. Apply Resource Protection Techniques\5602.Media Management.mp4 [9cfe062ff42ea0ba] 116,116,105 BEFBBFC0
Pearson CISSP, Second Edition\56. Apply Resource Protection Techniques\5603.Mobile Device Management.mp4 [e5174533c72bfecd] 120,601,307 EBAD445B
Pearson CISSP, Second Edition\57. Conduct Incident Management\5701.Learning objectives.mp4 [ed096aff17f9de2f] 3,297,054 2837A228
Pearson CISSP, Second Edition\57. Conduct Incident Management\5702.Incident Management Planning.mp4 [258422ed94cef48b] 113,309,028 D7792C11
Pearson CISSP, Second Edition\57. Conduct Incident Management\5703.Incident Response.mp4 [470b1e9548484eb9] 97,544,713 CD05BA12
Pearson CISSP, Second Edition\57. Conduct Incident Management\5704.Lesson 46-49 Assessment.mp4 [33fa2d3a6d7220a9] 120,716,353 1402C6C1
Pearson CISSP, Second Edition\58. Operate and Maintain Detective and Preventative Measures\5801.Learning objectives.mp4 [cd3a356e180697c8] 4,549,254 520B47DA
Pearson CISSP, Second Edition\58. Operate and Maintain Detective and Preventative Measures\5802.Detective and Preventative Solutions.mp4 [73db2b4bd89c25c8] 76,658,153 74B2AB0C
Pearson CISSP, Second Edition\58. Operate and Maintain Detective and Preventative Measures\5803.Firewalls and Filters.mp4 [998857e26e16298f] 121,803,828 A2BD52C7
Pearson CISSP, Second Edition\58. Operate and Maintain Detective and Preventative Measures\5804.IDSIPS.mp4 [47e4e3538a780bff] 83,976,145 1C75CD5B
Pearson CISSP, Second Edition\58. Operate and Maintain Detective and Preventative Measures\5805.Anti-Malware Techniques.mp4 [613a1e84e24c7f43] 59,937,603 961BB5EB
Pearson CISSP, Second Edition\59. Implement and Support Patch and Vulnerability Management\5901.Learning objectives.mp4 [e8f09352b8fe7fea] 3,869,186 B5B04DC0
Pearson CISSP, Second Edition\59. Implement and Support Patch and Vulnerability Management\5902.Vulnerability Management.mp4 [31ce746be501c492] 106,214,578 476A9BD6
Pearson CISSP, Second Edition\59. Implement and Support Patch and Vulnerability Management\5903.Patch Management.mp4 [b877d27e35419532] 72,341,920 51B76181
Pearson CISSP, Second Edition\59. Implement and Support Patch and Vulnerability Management\5904.Threat Intelligence and Information Sharing.mp4 [33cf2ca17046c18b] 75,325,478 989D0D76
Pearson CISSP, Second Edition\60. Understand and Participate in Change Management Processes\6001.Learning objectives.mp4 [e2458d1c175b79de] 2,349,274 A882B759
Pearson CISSP, Second Edition\60. Understand and Participate in Change Management Processes\6002.Change Management.mp4 [59e9ce9760f67ed5] 68,904,333 FEE75F24
Pearson CISSP, Second Edition\61. Implement Recovery Strategies\6101.Learning objectives.mp4 [36e3f318abc9aed4] 4,590,779 9436DA15
Pearson CISSP, Second Edition\61. Implement Recovery Strategies\6102.Site Recovery Strategies.mp4 [b98f8c744d0496e] 83,089,475 87CF32D8
Pearson CISSP, Second Edition\61. Implement Recovery Strategies\6103.Data Backup and Restoration.mp4 [df29dc8a5ee53f69] 113,862,128 FCF5D16E
Pearson CISSP, Second Edition\61. Implement Recovery Strategies\6104.Resiliency and Fault Tolerance.mp4 [a7247a992644d757] 98,535,496 6BC4378B
Pearson CISSP, Second Edition\61. Implement Recovery Strategies\6105.Lesson 50-53 Assessment.mp4 [5b1562420779a904] 154,726,399 96CE15B1
Pearson CISSP, Second Edition\62. Implement Disaster Recovery (DR) Processes\6201.Learning objectives.mp4 [1574972883bc8fc7] 2,500,574 165BC180
Pearson CISSP, Second Edition\62. Implement Disaster Recovery (DR) Processes\6202.DR Planning and Response.mp4 [bca2a318cb4cda0e] 109,310,015 2983C3BE
Pearson CISSP, Second Edition\63. Test Disaster Recovery Plans (DRP)\6301.Learning objectives.mp4 [a9f45bb0a828d792] 2,443,970 B65F1C39
Pearson CISSP, Second Edition\63. Test Disaster Recovery Plans (DRP)\6302.DRP Training and Testing.mp4 [e829816d3f96ea74] 65,499,912 B9271624
Pearson CISSP, Second Edition\64. Participate in Business Continuity (BC) Planning and Exercises\6401.Learning objectives.mp4 [4c44224060eecbea] 2,770,791 B3A9DD86
Pearson CISSP, Second Edition\64. Participate in Business Continuity (BC) Planning and Exercises\6402.BCP Relationship.mp4 [ca02d3cf071785e1] 87,450,094 C65CCE53
Pearson CISSP, Second Edition\65. Implement and Manage Physical Security\6501.Learning objectives.mp4 [a3a215f15b4db6bd] 2,632,971 0237D45C
Pearson CISSP, Second Edition\65. Implement and Manage Physical Security\6502.Perimeter and Internal Security Controls.mp4 [d5d18f0de0f72874] 121,863,466 AE9AE2F4
Pearson CISSP, Second Edition\66. Address Personnel Safety and Security Concerns\6601.Learning objectives.mp4 [e45b81541c65ca63] 3,931,728 5390080C
Pearson CISSP, Second Edition\66. Address Personnel Safety and Security Concerns\6602.Personnel and Workplace Safety.mp4 [47fddec0a999c952] 52,185,632 29BEF2A3
Pearson CISSP, Second Edition\66. Address Personnel Safety and Security Concerns\6603.Lesson 54-58 Assessment.mp4 [17fa40451ebf0556] 142,089,996 1DDEB52B
Pearson CISSP, Second Edition\67. Domain 8 Software Development Security\6701.Module introduction.mp4 [b17b78142ad78e80] 7,689,924 C59A439F
Pearson CISSP, Second Edition\68. Understand and Integrate Security in the Software Development Life Cycle (SDLC)\6801.Learning objectives.mp4 [f6291aa500e3dbe8] 3,296,754 FA2CBC56
Pearson CISSP, Second Edition\68. Understand and Integrate Security in the Software Development Life Cycle (SDLC)\6802.Software Development Life Cycle.mp4 [fe94b54492f6fc8d] 124,302,596 267642BF
Pearson CISSP, Second Edition\68. Understand and Integrate Security in the Software Development Life Cycle (SDLC)\6803.Secure DevOps.mp4 [f9efb579b30ba277] 80,326,538 1426E62C
Pearson CISSP, Second Edition\69. Identify and Apply Security Controls in Development Environments\6901.Learning objectives.mp4 [10f7d53c67b46de7] 2,573,533 5F3D3F5E
Pearson CISSP, Second Edition\69. Identify and Apply Security Controls in Development Environments\6902.Staging and Deployment Strategies.mp4 [20ab0cb88d1af6c8] 97,791,238 21757E2E
Pearson CISSP, Second Edition\70. Assess the Effectiveness of Software Security\7001.Learning objectives.mp4 [c3e7642defe9ce6] 2,632,382 BA282461
Pearson CISSP, Second Edition\70. Assess the Effectiveness of Software Security\7002.Assessing the Effectiveness of Software Security.mp4 [4e63946438862a4e] 98,517,032 B729DF2F
Pearson CISSP, Second Edition\71. Assess Security Impact of Acquired Software\7101.Learning objectives.mp4 [52434bb3261abd8a] 2,591,001 8AA20B06
Pearson CISSP, Second Edition\71. Assess Security Impact of Acquired Software\7102.Software Procurement and Acquisition.mp4 [e1d8e6900e9a6248] 117,588,746 DC2127CC
Pearson CISSP, Second Edition\72. Define and Apply Secure Coding Guidelines and Standards\7201.Learning objectives.mp4 [6d30c043da2d9b8] 4,728,132 36AD0E6B
Pearson CISSP, Second Edition\72. Define and Apply Secure Coding Guidelines and Standards\7202.Source Code Weaknesses.mp4 [85d48d66a45d43ef] 104,869,761 78CC9B34
Pearson CISSP, Second Edition\72. Define and Apply Secure Coding Guidelines and Standards\7203.Secure Coding Techniques.mp4 [97ac926d451db9a8] 91,474,171 4F6DC5A3
Pearson CISSP, Second Edition\72. Define and Apply Secure Coding Guidelines and Standards\7204.Lesson 59-63 Assessment.mp4 [ccbc2dafe5b25c4d] 112,407,228 A086F343
Pearson CISSP, Second Edition\73. Becoming a CISSP\7301.Module introduction.mp4 [7e08a59752ee9984] 4,688,787 D6111B10
Pearson CISSP, Second Edition\74. Acing Your Exam\7401.Learning objectives.mp4 [53b14ef7b11e37eb] 2,440,800 80ABE3FC
Pearson CISSP, Second Edition\74. Acing Your Exam\7402.Understanding the Exam Structure.mp4 [c2b853f4501c1bbc] 13,333,199 EA076392
Pearson CISSP, Second Edition\74. Acing Your Exam\7403.Test Taking Strategies.mp4 [cc838d025a2f4381] 28,487,847 5B36C704
Pearson CISSP, Second Edition\74. Acing Your Exam\7404.Preparing for Test Day.mp4 [ef482f9b24dcb8c2] 14,769,419 609A55E8
Pearson CISSP, Second Edition\75. Certification Process\7501.Learning objectives.mp4 [1b223b6f7b9457b6] 2,783,012 A6FB6A77
Pearson CISSP, Second Edition\75. Certification Process\7502.What to Expect at the Testing Center.mp4 [4ec424e51d4d8be6] 24,358,339 B14FB692
Pearson CISSP, Second Edition\75. Certification Process\7503.Attaining and Maintaining Your CISSP Certification.mp4 [cebfd58e03866f1e] 11,126,605 FEACBBDC
Pearson CISSP, Second Edition\76.Summary\7601.CISSP Summary.mp4 [7ad9c59774920356] 6,666,604 C8292F84
Pearson CISSP, Second Edition\01.Introduction 0 00000000
Pearson CISSP, Second Edition\02. Domain 1 Security and Risk Management 0 00000000
Pearson CISSP, Second Edition\03. Understand and Apply Concepts of Confidentiality, Integrity and Availability 0 00000000
Pearson CISSP, Second Edition\04. Evaluate and Apply Security Governance Principles 0 00000000
Pearson CISSP, Second Edition\05. Determine Compliance Requirements 0 00000000
Pearson CISSP, Second Edition\06. Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context 0 00000000
Pearson CISSP, Second Edition\07. Understand, Adhere to and Promote Professional Ethics 0 00000000
Pearson CISSP, Second Edition\08. Develop, Document and Implement Security Policy, Standards, Procedures and Guidelines 0 00000000
Pearson CISSP, Second Edition\09. Identify, Analyze, and Prioritize Business Continuity (BC) Requirements 0 00000000
Pearson CISSP, Second Edition\10. Contribute to and Enforce Personnel Security Policies and Procedures 0 00000000
Pearson CISSP, Second Edition\11. Understand and Apply Risk Management Concepts 0 00000000
Pearson CISSP, Second Edition\12. Understand and Apply Threat Modeling Concepts and Methodologies 0 00000000
Pearson CISSP, Second Edition\13. Apply Risk Management Concepts to the Supply Chain 0 00000000
Pearson CISSP, Second Edition\14. Establish and Maintain a Security Awareness, Education, and Training Program 0 00000000
Pearson CISSP, Second Edition\15. Domain 2 Asset Security 0 00000000
Pearson CISSP, Second Edition\16. Identify and Classify Information and Assets 0 00000000
Pearson CISSP, Second Edition\17. Determine and Maintain Information and Asset Ownership 0 00000000
Pearson CISSP, Second Edition\18. Protect Privacy 0 00000000
Pearson CISSP, Second Edition\19. Ensure Appropriate Asset Retention 0 00000000
Pearson CISSP, Second Edition\20. Determine Data Security Controls 0 00000000
Pearson CISSP, Second Edition\21. Establish Information and Asset Handling Requirements 0 00000000
Pearson CISSP, Second Edition\22. Domain 3 Security Architecture and Engineering 0 00000000
Pearson CISSP, Second Edition\23. Implement and Manage Engineering Processes Using Secure Design Principles 0 00000000
Pearson CISSP, Second Edition\24. Understand the Fundamental Concepts of Security Models 0 00000000
Pearson CISSP, Second Edition\25. Select Controls Based Upon Systems Security Requirements 0 00000000
Pearson CISSP, Second Edition\26. Understand Security Capabilities of Information Systems 0 00000000
Pearson CISSP, Second Edition\27. Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements 0 00000000
Pearson CISSP, Second Edition\28. Assess and Mitigate Vulnerabilities in Web-based Systems 0 00000000
Pearson CISSP, Second Edition\29. Assess and Mitigate Vulnerabilities in Mobile Systems 0 00000000
Pearson CISSP, Second Edition\30. Assess and Mitigate Vulnerabilities in Embedded Systems 0 00000000
Pearson CISSP, Second Edition\31. Apply Cryptography 0 00000000
Pearson CISSP, Second Edition\32. Apply Security Principles to Site and Facility Design 0 00000000
Pearson CISSP, Second Edition\33. Implement Site and Facility Security Controls 0 00000000
Pearson CISSP, Second Edition\34. Domain 4 Communication and Network Security 0 00000000
Pearson CISSP, Second Edition\35. Implement Secure Design Principles in Network Architectures 0 00000000
Pearson CISSP, Second Edition\36. Secure Network Components 0 00000000
Pearson CISSP, Second Edition\37. Implement Secure Communication Channels According to Design 0 00000000
Pearson CISSP, Second Edition\38. Domain 5 Identity and Access Management (IAM) 0 00000000
Pearson CISSP, Second Edition\39. Control Physical and Logical Access to Assets 0 00000000
Pearson CISSP, Second Edition\40. Manage Identification and Authentication of People, Devices, and Services 0 00000000
Pearson CISSP, Second Edition\41. Integrate Identify as a Third-party Service 0 00000000
Pearson CISSP, Second Edition\42. Implement and Manage Authorization Mechanisms 0 00000000
Pearson CISSP, Second Edition\43. Manage the Identity and Access Provisioning Lifecycle 0 00000000
Pearson CISSP, Second Edition\44. Domain 6 Security Assessment and Testing 0 00000000
Pearson CISSP, Second Edition\45. Design and Validate Assessment, Test, and Audit Strategies 0 00000000
Pearson CISSP, Second Edition\46. Conduct Security Control Testing 0 00000000
Pearson CISSP, Second Edition\47. Collect Security Process Data 0 00000000
Pearson CISSP, Second Edition\48. Analyze Test Output and Generate Report 0 00000000
Pearson CISSP, Second Edition\49. Conduct or Facilitate Security Audits 0 00000000
Pearson CISSP, Second Edition\50. Domain 7 Security Operations 0 00000000
Pearson CISSP, Second Edition\51. Understand and Support Investigations 0 00000000
Pearson CISSP, Second Edition\52. Understand Requirements for Investigation Types 0 00000000
Pearson CISSP, Second Edition\53. Conduct Logging and Monitoring Activities 0 00000000
Pearson CISSP, Second Edition\54. Securely Provisioning Resources 0 00000000
Pearson CISSP, Second Edition\55. Understand and Apply Foundational Security Operations Concepts 0 00000000
Pearson CISSP, Second Edition\56. Apply Resource Protection Techniques 0 00000000
Pearson CISSP, Second Edition\57. Conduct Incident Management 0 00000000
Pearson CISSP, Second Edition\58. Operate and Maintain Detective and Preventative Measures 0 00000000
Pearson CISSP, Second Edition\59. Implement and Support Patch and Vulnerability Management 0 00000000
Pearson CISSP, Second Edition\60. Understand and Participate in Change Management Processes 0 00000000
Pearson CISSP, Second Edition\61. Implement Recovery Strategies 0 00000000
Pearson CISSP, Second Edition\62. Implement Disaster Recovery (DR) Processes 0 00000000
Pearson CISSP, Second Edition\63. Test Disaster Recovery Plans (DRP) 0 00000000
Pearson CISSP, Second Edition\64. Participate in Business Continuity (BC) Planning and Exercises 0 00000000
Pearson CISSP, Second Edition\65. Implement and Manage Physical Security 0 00000000
Pearson CISSP, Second Edition\66. Address Personnel Safety and Security Concerns 0 00000000
Pearson CISSP, Second Edition\67. Domain 8 Software Development Security 0 00000000
Pearson CISSP, Second Edition\68. Understand and Integrate Security in the Software Development Life Cycle (SDLC) 0 00000000
Pearson CISSP, Second Edition\69. Identify and Apply Security Controls in Development Environments 0 00000000
Pearson CISSP, Second Edition\70. Assess the Effectiveness of Software Security 0 00000000
Pearson CISSP, Second Edition\71. Assess Security Impact of Acquired Software 0 00000000
Pearson CISSP, Second Edition\72. Define and Apply Secure Coding Guidelines and Standards 0 00000000
Pearson CISSP, Second Edition\73. Becoming a CISSP 0 00000000
Pearson CISSP, Second Edition\74. Acing Your Exam 0 00000000
Pearson CISSP, Second Edition\75. Certification Process 0 00000000
Pearson CISSP, Second Edition\76.Summary 0 00000000
Pearson CISSP, Second Edition 0 00000000

Total size: 11,881,181,446
RAR Recovery
Present (Protect+) 118,399,290
Labels APPS