Udemy - Certified Information Systems Security Officer (CISSO) [G...
- Category Other
- Type Tutorials
- Language English
- Total size 5.4 GB
- Uploaded By CourseClub
- Downloads 266
- Last checked 2 days ago
- Date uploaded 3 years ago
- Seeders 5
- Leechers 9
Infohash : 949036079E5B4D9C692483092DB57E921C70F58E
Certified Information Systems Security Officer (CISSO)
Certified Information Systems Security Officer (CISSO) Certification Exam Prep Course
Created by Stone River eLearning
Last updated 8/2019
English
English [Auto]
For More Udemy Courses Visit: https://gigacourse.com
For More Courses Visit: https://Courseclub.me
Files:
[GigaCourse.Com] Udemy - Certified Information Systems Security Officer (CISSO) 0. Websites you may like- [CourseClub.Me].url (0.1 KB)
- [GigaCourse.Com].url (0.0 KB)
- 001 Agenda.mp4 (43.4 MB)
- 001 Agenda_en.vtt (17.9 KB)
- 002 Risk Management.mp4 (60.8 MB)
- 002 Risk Management_en.vtt (17.1 KB)
- 003 Quantitative Analysis.mp4 (60.7 MB)
- 003 Quantitative Analysis_en.vtt (18.0 KB)
- 12128224-CISSO-WB01.pdf (289.4 KB)
- 001 Security Management.mp4 (56.5 MB)
- 001 Security Management_en.vtt (17.5 KB)
- 002 Enterprise Security Program.mp4 (24.3 MB)
- 002 Enterprise Security Program_en.vtt (13.0 KB)
- 003 Roadmap to Maturity.mp4 (55.4 MB)
- 003 Roadmap to Maturity_en.vtt (16.9 KB)
- 004 Human Resources Issues.mp4 (49.6 MB)
- 004 Human Resources Issues_en.vtt (9.7 KB)
- 12128228-CISSO-WB02.pdf (284.1 KB)
- [CourseClub.Me].url (0.1 KB)
- [GigaCourse.Com].url (0.0 KB)
- 001 Authentication.mp4 (128.6 MB)
- 001 Authentication_en.vtt (17.3 KB)
- 002 Biometrics Error Types.mp4 (35.2 MB)
- 002 Biometrics Error Types_en.vtt (19.2 KB)
- 003 Memory Cards.mp4 (58.6 MB)
- 003 Memory Cards_en.vtt (13.6 KB)
- 004 Issues Pertaining to Kerberos.mp4 (38.9 MB)
- 004 Issues Pertaining to Kerberos_en.vtt (11.8 KB)
- 12128232-CISSO-WB03.pdf (283.2 KB)
- 001 Access Control.mp4 (115.4 MB)
- 001 Access Control_en.vtt (14.4 KB)
- 002 Access Control Characteristics.mp4 (64.6 MB)
- 002 Access Control Characteristics_en.vtt (19.0 KB)
- 003 Threats to Access Control.mp4 (65.2 MB)
- 003 Threats to Access Control_en.vtt (6.7 KB)
- 004 Information Classification.mp4 (74.7 MB)
- 004 Information Classification_en.vtt (9.7 KB)
- 005 Discretionary Access Control Model.mp4 (61.0 MB)
- 005 Discretionary Access Control Model_en.vtt (12.8 KB)
- 006 Access Control Administration.mp4 (56.9 MB)
- 006 Access Control Administration_en.vtt (12.6 KB)
- 12128242-CISSO-WB04.pdf (280.4 KB)
- 001 Security Models and Evaluation Criteria.mp4 (85.5 MB)
- 001 Security Models and Evaluation Criteria_en.vtt (17.9 KB)
- 002 What Does It Mean to Be in a Specific Ring.mp4 (131.4 MB)
- 002 What Does It Mean to Be in a Specific Ring_en.vtt (15.6 KB)
- 003 Non-Interference Model.mp4 (60.0 MB)
- 003 Non-Interference Model_en.vtt (12.8 KB)
- 004 ITSEC - Good and Bad.mp4 (86.4 MB)
- 004 ITSEC - Good and Bad_en.vtt (10.7 KB)
- 12128250-CISSO-WB05.pdf (283.4 KB)
- 001 Information Classification.mp4 (60.2 MB)
- 001 Information Classification_en.vtt (18.3 KB)
- 002 Product Implementation Concerns.mp4 (88.6 MB)
- 002 Product Implementation Concerns_en.vtt (17.6 KB)
- 003 Redundant Array of Independent Disk (RAID).mp4 (51.3 MB)
- 003 Redundant Array of Independent Disk (RAID)_en.vtt (16.7 KB)
- 004 Methodology.mp4 (141.6 MB)
- 004 Methodology_en.vtt (18.5 KB)
- 12128256-CISSO-WB06.pdf (282.2 KB)
- 001 Symmetric Cryptography and Hashing.mp4 (59.7 MB)
- 001 Symmetric Cryptography and Hashing_en.vtt (16.8 KB)
- 002 Historical Uses of Symmetric Cryptography Vernam Cipher.mp4 (53.5 MB)
- 002 Historical Uses of Symmetric Cryptography Vernam Cipher_en.vtt (14.8 KB)
- 003 Information Classification.mp4 (157.8 MB)
- 003 Information Classification_en.vtt (18.7 KB)
- 004 Symmetric Algorithms - DS.mp4 (120.4 MB)
- 004 Symmetric Algorithms - DS_en.vtt (22.1 KB)
- 12128258-CISSO-WB07.pdf (277.1 KB)
- [CourseClub.Me].url (0.1 KB)
- [GigaCourse.Com].url (0.0 KB)
- 001 Asymmetric Cryptography and PKI.mp4 (60.8 MB)
- 001 Asymmetric Cryptography and PKI_en.vtt (18.7 KB)
- 002 Example of Hybrid Cryptography.mp4 (74.6 MB)
- 002 Example of Hybrid Cryptography_en.vtt (16.8 KB)
- 003 CA and RA Roles.mp4 (57.0 MB)
- 003 CA and RA Roles_en.vtt (18.9 KB)
- 004 Link versus End-to-End Encryption.mp4 (76.9 MB)
- 004 Link versus End-to-End Encryption_en.vtt (19.5 KB)
- 005 IPSec Handshaking Process.mp4 (51.2 MB)
- 005 IPSec Handshaking Process_en.vtt (17.4 KB)
- 006 Types of Physical IDS.mp4 (93.5 MB)
- 006 Types of Physical IDS_en.vtt (20.5 KB)
- 19401622-CISSO-WB08.pdf (221.7 KB)
- 001 Information Classification.mp4 (61.0 MB)
- 001 Information Classification_en.vtt (20.5 KB)
- 002 Summary of Topologies.mp4 (79.4 MB)
- 002 Summary of Topologies_en.vtt (21.4 KB)
- 003 Transmission Types - Number of Recievers.mp4 (57.2 MB)
- 003 Transmission Types - Number of Recievers_en.vtt (19.7 KB)
- 004 Network Topologies.mp4 (54.3 MB)
- 004 Network Topologies_en.vtt (18.4 KB)
- 005 WAN Technologies - DSL.mp4 (57.7 MB)
- 005 WAN Technologies - DSL_en.vtt (15.7 KB)
- 12128266-CISSO-WB09.pdf (284.8 KB)
- 001 Information Classification.mp4 (55.6 MB)
- 001 Information Classification_en.vtt (18.1 KB)
- 002 Transport Layer.mp4 (94.5 MB)
- 002 Transport Layer_en.vtt (20.3 KB)
- 003 Repeater.mp4 (69.0 MB)
- 003 Repeater_en.vtt (22.7 KB)
- 004 Firewall Types - Circuit - Level Proxy Firewall.mp4 (54.2 MB)
- 004 Firewall Types - Circuit - Level Proxy Firewall_en.vtt (18.3 KB)
- 005 TCPIP Suite.mp4 (51.5 MB)
- 005 TCPIP Suite_en.vtt (16.8 KB)
- 12128270-CISSO-WB10.pdf (278.0 KB)
- 001 Information Classification.mp4 (58.4 MB)
- 001 Information Classification_en.vtt (18.1 KB)
- 002 PBX Vulnerabilities.mp4 (39.1 MB)
- 002 PBX Vulnerabilities_en.vtt (11.9 KB)
- 003 SSLTLS.mp4 (27.8 MB)
- 003 SSLTLS_en.vtt (8.5 KB)
- 004 Wireless Network Topologies.mp4 (92.5 MB)
- 004 Wireless Network Topologies_en.vtt (18.1 KB)
- 005 WPA and WPA2 Mode Types.mp4 (113.7 MB)
- 005 WPA and WPA2 Mode Types_en.vtt (16.2 KB)
- 12128274-CISSO-WB11.pdf (222.0 KB)
- [CourseClub.Me].url (0.1 KB)
- [GigaCourse.Com].url (0.0 KB)
- 001 Information Classification.mp4 (118.7 MB)
- 001 Information Classification_en.vtt (15.7 KB)
- 002 Integrated Security is Designed Security.mp4 (63.4 MB)
- 002 Integrated Security is Designed Security_en.vtt (20.5 KB)
- 003 System Functionality.mp4 (40.3 MB)
- 003 System Functionality_en.vtt (12.6 KB)
- 004 Attacking Through Applications.mp4 (42.5 MB)
- 004 Attacking Through Applications_en.vtt (13.5 KB)
- 12128278-CISSO-WB12.pdf (280.5 KB)
- 001 Information Classification.mp4 (144.5 MB)
- 001 Information Classification_en.vtt (18.2 KB)
- 002 Development Methodologies.mp4 (44.8 MB)
- 002 Development Methodologies_en.vtt (13.3 KB)
- 003 Security Issues.mp4 (46.9 MB)
- 003 Security Issues_en.vtt (14.7 KB)
- 004 Linking Through COM.mp4 (125.4 MB)
- 004 Linking Through COM_en.vtt (17.6 KB)
- 19401620-CISSO-WB13.pdf (276.8 KB)
- 001 Information Classification.mp4 (83.5 MB)
- 001 Information Classification_en.vtt (18.3 KB)
- 002 Artificial Intelligence.mp4 (141.0 MB)
- 002 Artificial Intelligence_en.vtt (19.6 KB)
- 003 Virus.mp4 (77.6 MB)
- 003 Virus_en.vtt (9.3 KB)
- 004 DDoS.mp4 (56.4 MB)
- 004 DDoS_en.vtt (10.7 KB)
- 12128288-CISSO-WB14.pdf (221.3 KB)
- 001 Malware and Attacks.mp4 (130.6 MB)
- 001 Malware and Attacks_en.vtt (18.4 KB)
- 12128292-CISSO-WB15.pdf (282.0 KB)
- [CourseClub.Me].url (0.1 KB)
- [GigaCourse.Com].url (0.0 KB)
- 001 Information Classification.mp4 (98.7 MB)
- 001 Information Classification_en.vtt (18.6 KB)
- 002 How to Identify the Most Critical Company Functions.mp4 (43.6 MB)
- 002 How to Identify the Most Critical Company Functions_en.vtt (12.4 KB)
- 003 Facility Backups - Hot Site.mp4 (70.1 MB)
- 003 Facility Backups - Hot Site_en.vtt (10.7 KB)
- 12128298-CISSO-WB16.pdf (220.8 KB)
- 001 Disaster Recovery.mp4 (47.9 MB)
- 001 Disaster Recovery_en.vtt (15.1 KB)
- 002 Recovery Plan.mp4 (98.5 MB)
- 002 Recovery Plan_en.vtt (23.2 KB)
- 003 Return to Normal Operations.mp4 (47.7 MB)
- 003 Return to Normal Operations_en.vtt (14.9 KB)
- 12128306-CISSO-WB17.pdf (221.0 KB)
- 001 Information Classification.mp4 (129.5 MB)
- 001 Information Classification_en.vtt (18.3 KB)
- 002 Intellectual Property Law.mp4 (56.8 MB)
- 002 Intellectual Property Law_en.vtt (18.0 KB)
- 003 Countries Working Together.mp4 (119.6 MB)
- 003 Countries Working Together_en.vtt (17.9 KB)
- 004 Privacy of Sensitive Data.mp4 (52.9 MB)
- 004 Privacy of Sensitive Data_en.vtt (13.0 KB)
- 12128308-CISSO-WB18.pdf (280.9 KB)
- [CourseClub.Me].url (0.1 KB)
- [GigaCourse.Com].url (0.0 KB)
- 001 Information Classification.mp4 (135.3 MB)
- 001 Information Classification_en.vtt (19.1 KB)
- 12128322-CISSO-WB19.pdf (282.4 KB)
- [CourseClub.Me].url (0.1 KB)
- [GigaCourse.Com].url (0.0 KB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://tracker.tiny-vps.com:6969/announce
- udp://fasttracker.foreverpirates.co:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://explodie.org:6969/announce
- udp://open.stealth.si:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://tracker.uw0.xyz:6969/announce
- udp://tracker.dler.org:6969/announce
- udp://9.rarbg.to:2710/announce
- udp://6ahddutb1ucc3cp.ru:6969/announce
- udp://tracker2.dler.com:80/announce
- udp://tracker.jordan.im:6969/announce
- udp://tracker.dix.tf:6969/announce
- udp://tracker.auctor.tv:6969/announce