Download link
File List
-
00. Intro/184142_01_01_WL30_ITFundamentals.mp4 2.35 MB
01. Security Modeling/184142_02_01_LA30_ModelTools.mp4 8.81 MB
02. The CIA Triad/184142_03_01_LA30_CIATriad.mp4 7.04 MB
02. The CIA Triad/184142_03_02_LA30_CIATriadConfident.mp4 6.85 MB
02. The CIA Triad/184142_03_03_LA30_CIATriadIntegrity.mp4 8.4 MB
02. The CIA Triad/184142_03_04_LA30_CIATriadAvailable.mp4 10.19 MB
02. The CIA Triad/184142_03_05_LA30_CIATriadUsing.mp4 33.36 MB
03. Visualizing Security/184142_04_01_LA30_MikeDans.mp4 24.39 MB
04. Information Assurance Model/184142_05_01_LA30_Assurance-1.mp4 11.1 MB
04. Information Assurance Model/184142_05_01_LA30_Assurance.mp4 11.1 MB
04. Information Assurance Model/184142_05_03_LA30_AssuranceProcess.mp4 22.12 MB
04. Information Assurance Model/184142_05_04_LA30_AssuranceTech.mp4 20.41 MB
04. Information Assurance Model/184142_05_05_LA30_ApplyAssurance.mp4 29.58 MB
05. Defense in Depth/184142_06_01_LA30_DefenseIntro.mp4 19.77 MB
05. Defense in Depth/184142_06_02_LA30_Data.mp4 14.4 MB
05. Defense in Depth/184142_06_03_LA30_Application.mp4 16.69 MB
05. Defense in Depth/184142_06_04_LA30_Host.mp4 16.72 MB
05. Defense in Depth/184142_06_05_LA30_InternalNetwork.mp4 14.75 MB
05. Defense in Depth/184142_06_06_LA30_PerimeterNetwork.mp4 16.33 MB
05. Defense in Depth/184142_06_07_LA30_ExternalNetwork.mp4 13.15 MB
05. Defense in Depth/184142_06_08_LA30_Physical.mp4 15.28 MB
05. Defense in Depth/184142_06_09_LA30_Stewardship.mp4 19.47 MB
06. Scenarios for Using the Defense in Depth Model/184142_07_01_LA30_UsingDefense.mp4 23.8 MB
06. Scenarios for Using the Defense in Depth Model/184142_07_02_LA30_DesktopDefense.mp4 11.09 MB
06. Scenarios for Using the Defense in Depth Model/184142_07_03_LA30_LaptopDefense.mp4 13.67 MB
06. Scenarios for Using the Defense in Depth Model/184142_07_04_LA30_PhoneDefense.mp4 25.07 MB
06. Scenarios for Using the Defense in Depth Model/184142_07_05_LA30_TabletDefense.mp4 17.93 MB
06. Scenarios for Using the Defense in Depth Model/184142_07_06_LA30_iMacDefense.mp4 23.24 MB
06. Scenarios for Using the Defense in Depth Model/184142_07_07_LA30_DataDefense.mp4 18.5 MB
Download Info
-
Tips
“IT Security Fundamentals” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.