Lynda - Learning IT Security/01. Introduction/01_01 - Welcome.mp4 |
8.9 MB |
Lynda - Learning IT Security/02. Security Modeling/02_01 - Security modeling tools.mp4 |
46 MB |
Lynda - Learning IT Security/03. The CIA Triad/03_01 - The CIA triad confidentiality, integrity, and availability.mp4 |
38.4 MB |
Lynda - Learning IT Security/03. The CIA Triad/03_02 - Confidentiality.mp4 |
39.1 MB |
Lynda - Learning IT Security/03. The CIA Triad/03_03 - Integrity.mp4 |
43.4 MB |
Lynda - Learning IT Security/03. The CIA Triad/03_04 - Availability.mp4 |
53 MB |
Lynda - Learning IT Security/03. The CIA Triad/03_05 - Using the triad.mp4 |
160.8 MB |
Lynda - Learning IT Security/04. Visualizing Security/04_01 - MikeDan's solution matrix.mp4 |
125.8 MB |
Lynda - Learning IT Security/05. Information Assurance Model/05_01 - The information assurance model.mp4 |
58 MB |
Lynda - Learning IT Security/05. Information Assurance Model/05_02 - People.mp4 |
127.5 MB |
Lynda - Learning IT Security/05. Information Assurance Model/05_03 - Process.mp4 |
106.5 MB |
Lynda - Learning IT Security/05. Information Assurance Model/05_04 - Technology.mp4 |
119.1 MB |
Lynda - Learning IT Security/05. Information Assurance Model/05_05 - Applying the information assurance model.mp4 |
144.1 MB |
Lynda - Learning IT Security/06. Defense in Depth/06_01 - Introduction to defense in depth.mp4 |
117.4 MB |
Lynda - Learning IT Security/06. Defense in Depth/06_02 - Data.mp4 |
70.9 MB |
Lynda - Learning IT Security/06. Defense in Depth/06_03 - Application.mp4 |
81.9 MB |
Lynda - Learning IT Security/06. Defense in Depth/06_04 - Host.mp4 |
85 MB |
Lynda - Learning IT Security/06. Defense in Depth/06_05 - Internal network.mp4 |
76.3 MB |
Lynda - Learning IT Security/06. Defense in Depth/06_06 - Network perimeter.mp4 |
73.4 MB |
Lynda - Learning IT Security/06. Defense in Depth/06_07 - External network.mp4 |
65.2 MB |
Lynda - Learning IT Security/06. Defense in Depth/06_08 - Physical encompassing.mp4 |
79.8 MB |
Lynda - Learning IT Security/06. Defense in Depth/06_09 - Stewardship encompassing.mp4 |
105.9 MB |
Lynda - Learning IT Security/07. Scenarios for Using the Defense in Depth Model/07_01 - Using the defense in depth model.mp4 |
112.6 MB |
Lynda - Learning IT Security/07. Scenarios for Using the Defense in Depth Model/07_02 - The IT desktop PC.mp4 |
75.3 MB |
Lynda - Learning IT Security/07. Scenarios for Using the Defense in Depth Model/07_03 - The sales user's laptop.mp4 |
88.9 MB |
Lynda - Learning IT Security/07. Scenarios for Using the Defense in Depth Model/07_04 - The typical user's phone.mp4 |
138.1 MB |
Lynda - Learning IT Security/07. Scenarios for Using the Defense in Depth Model/07_05 - The CEO's Android tablet.mp4 |
116.1 MB |
Lynda - Learning IT Security/07. Scenarios for Using the Defense in Depth Model/07_06 - The CEO's iMac.mp4 |
133.1 MB |
Lynda - Learning IT Security/07. Scenarios for Using the Defense in Depth Model/07_07 - The data center server.mp4 |
115 MB |
Lynda - Learning IT Security/Torrent Downloaded From Katcr.co - Kickasstorrents.txt |
52 B |