UD123/01 Introduction/001 Introduction.mp4 |
21.5 MB |
UD123/01 Introduction/002 Introduction to this course.mp4 |
13.7 MB |
UD123/01 Introduction/003 Why should you want to get the CISSP certification.mp4 |
56.7 MB |
UD123/01 Introduction/004 The 8 CISSP domains or CBKs (Common Bodies of Knowledge).mp4 |
110.4 MB |
UD123/01 Introduction/005 Lecture speed.mp4 |
8.4 MB |
UD123/01 Introduction/006 Links important topics and where to focus on my slides.mp4 |
19 MB |
UD123/01 Introduction/007 General CISSP links.html |
3 KB |
UD123/02 CISSP Domain 7 Security Operations/008 Domain 7 - What we will be covering.mp4 |
18.4 MB |
UD123/02 CISSP Domain 7 Security Operations/008 Thor-Teaches-study-guide-CISSP-domain-7.pdf |
963 KB |
UD123/02 CISSP Domain 7 Security Operations/009 Domain 7 key concepts.mp4 |
58 MB |
UD123/02 CISSP Domain 7 Security Operations/010 Administrative personnel controls.mp4 |
80.6 MB |
UD123/02 CISSP Domain 7 Security Operations/011 Digital forensics.mp4 |
79 MB |
UD123/02 CISSP Domain 7 Security Operations/012 Spinning disk forensics.mp4 |
32 MB |
UD123/02 CISSP Domain 7 Security Operations/013 Network and Software forensics.mp4 |
66.1 MB |
UD123/02 CISSP Domain 7 Security Operations/014 Incident Management definitions.mp4 |
70.5 MB |
UD123/02 CISSP Domain 7 Security Operations/015 Incident Management.mp4 |
163.7 MB |
UD123/02 CISSP Domain 7 Security Operations/016 Intrusion detection and prevention systems.mp4 |
106.1 MB |
UD123/02 CISSP Domain 7 Security Operations/017 SIEM (Security Information and Event Management.mp4 |
27.5 MB |
UD123/02 CISSP Domain 7 Security Operations/018 Application white-listing.mp4 |
28.1 MB |
UD123/02 CISSP Domain 7 Security Operations/019 Honeynets and Honeypots.mp4 |
31.5 MB |
UD123/02 CISSP Domain 7 Security Operations/020 Configuration Management.mp4 |
34.3 MB |
UD123/02 CISSP Domain 7 Security Operations/021 Patch Management.mp4 |
63.4 MB |
UD123/02 CISSP Domain 7 Security Operations/022 Change management.mp4 |
55.6 MB |
UD123/02 CISSP Domain 7 Security Operations/023 0-day attacks.mp4 |
52.1 MB |
UD123/02 CISSP Domain 7 Security Operations/024 Backups.mp4 |
105.3 MB |
UD123/02 CISSP Domain 7 Security Operations/025 RAID (Redundant Array of Independent Disks).mp4 |
55.8 MB |
UD123/02 CISSP Domain 7 Security Operations/026 Redundancy.mp4 |
91 MB |
UD123/02 CISSP Domain 7 Security Operations/027 BCP and DRP.mp4 |
159 MB |
UD123/02 CISSP Domain 7 Security Operations/028 Warfare terrorism sabotage and ransomware.mp4 |
59.8 MB |
UD123/02 CISSP Domain 7 Security Operations/029 Personnel.mp4 |
36.3 MB |
UD123/02 CISSP Domain 7 Security Operations/030 DRP basics.mp4 |
58.6 MB |
UD123/02 CISSP Domain 7 Security Operations/031 Developing our BCP and DRP.mp4 |
113.2 MB |
UD123/02 CISSP Domain 7 Security Operations/032 BIA (Business Impact Analysis).mp4 |
68.8 MB |
UD123/02 CISSP Domain 7 Security Operations/033 Supply and infrastructure redundancy.mp4 |
27.3 MB |
UD123/02 CISSP Domain 7 Security Operations/034 Disaster Recovery sites.mp4 |
81.4 MB |
UD123/02 CISSP Domain 7 Security Operations/035 Other BCP sub plans.mp4 |
102.4 MB |
UD123/02 CISSP Domain 7 Security Operations/036 Employee redundancy.mp4 |
96.6 MB |
UD123/02 CISSP Domain 7 Security Operations/037 Testing the plans.mp4 |
132.7 MB |
UD123/02 CISSP Domain 7 Security Operations/038 After a disruption.mp4 |
79.9 MB |
UD123/02 CISSP Domain 7 Security Operations/039 What we covered in Domain 7.mp4 |
40 MB |
UD123/02 CISSP Domain 7 Security Operations/040 Domain 7 links.html |
6 KB |
UD123/03 CISSP Domain 8 Software Development Security/041 Domain 8 - What we will be covering.mp4 |
32.6 MB |
UD123/03 CISSP Domain 8 Software Development Security/041 Thor-Teaches-study-guide-CISSP-domain-8.pdf |
843 KB |
UD123/03 CISSP Domain 8 Software Development Security/042 Designing security into our software.mp4 |
40.5 MB |
UD123/03 CISSP Domain 8 Software Development Security/043 Programming concepts.mp4 |
135.1 MB |
UD123/03 CISSP Domain 8 Software Development Security/044 Software development methodologies part 1.mp4 |
183.7 MB |
UD123/03 CISSP Domain 8 Software Development Security/045 Software development methodologies part 2.mp4 |
160.4 MB |
UD123/03 CISSP Domain 8 Software Development Security/046 Databases part 1.mp4 |
171.8 MB |
UD123/03 CISSP Domain 8 Software Development Security/047 Databases part 2.mp4 |
143.2 MB |
UD123/03 CISSP Domain 8 Software Development Security/048 OWASP part 1.mp4 |
106.5 MB |
UD123/03 CISSP Domain 8 Software Development Security/049 OWASP part 2.mp4 |
121.8 MB |
UD123/03 CISSP Domain 8 Software Development Security/050 Software vulnerabilities and Attacks.mp4 |
66.6 MB |
UD123/03 CISSP Domain 8 Software Development Security/051 Capability Maturity Model (CMM).mp4 |
79.6 MB |
UD123/03 CISSP Domain 8 Software Development Security/052 Buying software from other companies.mp4 |
101.9 MB |
UD123/03 CISSP Domain 8 Software Development Security/053 Artificial intelligence (AI).mp4 |
59 MB |
UD123/03 CISSP Domain 8 Software Development Security/054 What we covered in Domain 8.mp4 |
11.4 MB |
UD123/03 CISSP Domain 8 Software Development Security/055 Domain 8 links.html |
7 KB |
UD123/04 Bonus lectures/056 Bonus Lecture.mp4 |
36.5 MB |
UD123/04 Bonus lectures/056 Thor-Teaches-CISSP-CISM-bonus-lecture-1.1.0.pdf |
585 KB |
UD123/04 Bonus lectures/external-assets-links.txt |
239 B |
UD123/Torrent_downloaded_from_Demonoid.is_.txt |
58 B |