首页
磁力链接怎么用
한국어
English
日本語
简体中文
繁體中文
[FreeCourseSite.com] Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23
文件类型
收录时间
最后活跃
资源热度
文件大小
文件数量
视频
2024-1-31 19:25
2024-12-10 19:00
102
5.36 GB
137
磁力链接
magnet:?xt=urn:btih:2570dbe15bec901f6b4c7cf73ba5e9686622ffca
迅雷链接
thunder://QUFtYWduZXQ6P3h0PXVybjpidGloOjI1NzBkYmUxNWJlYzkwMWY2YjRjN2NmNzNiYTVlOTY4NjYyMmZmY2FaWg==
二维码链接
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
相关链接
FreeCourseSite
com
Udemy
-
The
Complete
Certified
in
Cybersecurity
CC
course
ISC2
'23
文件列表
01 - Introduction/001 Introduction and download your free study guides.mp4
11.55MB
01 - Introduction/002 Connect with me on Social media and the Udemy ratings system.mp4
12.13MB
01 - Introduction/003 How to get the most out of my courses and the Udemy interface.mp4
29.24MB
01 - Introduction/004 How to approach certification studying.mp4
26.5MB
02 - Domain 1 Security Principles/001 Domain 1 - What we will be covering.mp4
10.44MB
02 - Domain 1 Security Principles/002 The differences between Information Security, IT Security, and Cybersecurity.mp4
55.99MB
02 - Domain 1 Security Principles/003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1.mp4
21.43MB
02 - Domain 1 Security Principles/004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2.mp4
18.57MB
02 - Domain 1 Security Principles/005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3.mp4
9.47MB
02 - Domain 1 Security Principles/006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4.mp4
23.36MB
02 - Domain 1 Security Principles/007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5.mp4
12.71MB
02 - Domain 1 Security Principles/008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1.mp4
44.28MB
02 - Domain 1 Security Principles/009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2.mp4
21.54MB
02 - Domain 1 Security Principles/010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3.mp4
34.34MB
02 - Domain 1 Security Principles/011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4.mp4
67.93MB
02 - Domain 1 Security Principles/012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5.mp4
18.76MB
02 - Domain 1 Security Principles/013 Privacy.mp4
16.11MB
02 - Domain 1 Security Principles/014 Risk Management - part 1.mp4
12.94MB
02 - Domain 1 Security Principles/015 Risk Management - part 2.mp4
30.33MB
02 - Domain 1 Security Principles/016 Risk Management - part 3.mp4
26.77MB
02 - Domain 1 Security Principles/017 Risk Management - part 4.mp4
30.8MB
02 - Domain 1 Security Principles/018 Risk Management - part 5.mp4
47.26MB
02 - Domain 1 Security Principles/019 Risk Management - part 6.mp4
24.03MB
02 - Domain 1 Security Principles/020 Access Control Categories and Types - part 1.mp4
28.19MB
02 - Domain 1 Security Principles/021 Access Control Categories and Types - part 2.mp4
39.31MB
02 - Domain 1 Security Principles/022 The Ethics of your organizations and (ISC)2.mp4
17.73MB
02 - Domain 1 Security Principles/023 Governance vs. Management.mp4
45.51MB
02 - Domain 1 Security Principles/024 Laws and regulations - part 1.mp4
77.44MB
02 - Domain 1 Security Principles/025 Laws and regulations - part 2.mp4
55.54MB
02 - Domain 1 Security Principles/026 Security governance principles.mp4
60.3MB
02 - Domain 1 Security Principles/027 What we covered in Domain 1.mp4
8.34MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/001 Domain 2 - What we will be covering.mp4
9.15MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/002 BCP - Business Continuity Planning - Part 1.mp4
40.19MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/003 BCP - Business Continuity Planning - Part 2.mp4
31.03MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/004 BCP - Business Continuity Planning - Part 3.mp4
45.47MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/005 DRP - Disaster Recovery Planning - Part 1.mp4
44.9MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/006 DRP - Disaster Recovery Planning - Part 2.mp4
37.65MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/007 DRP - Disaster Recovery Planning - Part 3.mp4
47.13MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/008 DRP - Disaster Recovery Planning - Part 4.mp4
64.44MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/009 Incidents Response - Part 1.mp4
35.9MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/010 Incidents Response - Part 2.mp4
28.47MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/011 Incidents Response - Part 3.mp4
18.5MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/012 Incidents Response - Part 4.mp4
23.22MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/013 Incidents Response - Part 5.mp4
44.03MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/014 What we covered in Domain 2.mp4
6.97MB
04 - Domain 3 Access Controls Concepts/001 Domain 3 - What we will be covering.mp4
7.58MB
04 - Domain 3 Access Controls Concepts/002 Physical Security - part 1.mp4
43.48MB
04 - Domain 3 Access Controls Concepts/003 Physical Security - part 2.mp4
43.88MB
04 - Domain 3 Access Controls Concepts/004 Physical Security - part 3.mp4
27.8MB
04 - Domain 3 Access Controls Concepts/005 Physical Security - part 4.mp4
25.06MB
04 - Domain 3 Access Controls Concepts/006 Physical Security - part 5.mp4
22.64MB
04 - Domain 3 Access Controls Concepts/007 Logical Access Control - Part 1.mp4
27.12MB
04 - Domain 3 Access Controls Concepts/008 Logical Access Control - Part 2.mp4
18.17MB
04 - Domain 3 Access Controls Concepts/009 Logical Access Control - Part 3.mp4
78.46MB
04 - Domain 3 Access Controls Concepts/010 Logical Access Control - Part 4.mp4
43.94MB
04 - Domain 3 Access Controls Concepts/011 Logical Access Control - Part 5.mp4
81.13MB
04 - Domain 3 Access Controls Concepts/012 What we covered in Domain 3.mp4
6.91MB
05 - Domain 4 Network Security/001 Domain 4 - What we will be covering.mp4
8.24MB
05 - Domain 4 Network Security/002 Network Basics and Definitions - Part 1.mp4
44.54MB
05 - Domain 4 Network Security/003 Network Basics and Definitions - Part 2.mp4
38.86MB
05 - Domain 4 Network Security/004 The OSI Model - Part 1.mp4
100.95MB
05 - Domain 4 Network Security/005 The OSI Model - Part 2.mp4
49.81MB
05 - Domain 4 Network Security/006 The OSI Model - Part 3.mp4
56.88MB
05 - Domain 4 Network Security/007 The TCPIP model.mp4
48.74MB
05 - Domain 4 Network Security/008 IP addresses, port numbers, and MAC addresses - Part 1.mp4
45.83MB
05 - Domain 4 Network Security/009 IP addresses, port numbers, and MAC addresses - Part 2.mp4
24.34MB
05 - Domain 4 Network Security/010 IP addresses, port numbers, and MAC addresses - Part 3.mp4
20.89MB
05 - Domain 4 Network Security/011 IP support protocols - Part 1.mp4
46.51MB
05 - Domain 4 Network Security/012 IP support protocols - Part 2.mp4
33.89MB
05 - Domain 4 Network Security/013 Cables - Part 1.mp4
22.32MB
05 - Domain 4 Network Security/014 Cables - Part 2.mp4
45.97MB
05 - Domain 4 Network Security/015 LAN topologies.mp4
26.23MB
05 - Domain 4 Network Security/016 Wi-Fi.mp4
51.74MB
05 - Domain 4 Network Security/017 Wireless networks - Part 1.mp4
20.06MB
05 - Domain 4 Network Security/018 Wireless networks - Part 2.mp4
40.54MB
05 - Domain 4 Network Security/019 VLANs and Routers - Part 1.mp4
41.41MB
05 - Domain 4 Network Security/020 VLANs and Routers - Part 2.mp4
42.52MB
05 - Domain 4 Network Security/021 VPNs, NAC, and third-party connectivity.mp4
49.27MB
05 - Domain 4 Network Security/022 SDN, SD-WAN, and SDX.mp4
37.67MB
05 - Domain 4 Network Security/023 Attacks and attackers - Part 1.mp4
29.25MB
05 - Domain 4 Network Security/024 Attacks and attackers - Part 2.mp4
37.67MB
05 - Domain 4 Network Security/025 Attacks and attackers - Part 3.mp4
64.59MB
05 - Domain 4 Network Security/026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1.mp4
26.55MB
05 - Domain 4 Network Security/027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2.mp4
35.91MB
05 - Domain 4 Network Security/028 SIEM and SOAR systems.mp4
26.21MB
05 - Domain 4 Network Security/029 Honeynets and Honeypots.mp4
10.89MB
05 - Domain 4 Network Security/030 Firewalls - Part 1.mp4
28.95MB
05 - Domain 4 Network Security/031 Firewalls - Part 2.mp4
34.78MB
05 - Domain 4 Network Security/032 0-day attacks and exploits.mp4
56.09MB
05 - Domain 4 Network Security/033 Vulnerability Scanning.mp4
16.41MB
05 - Domain 4 Network Security/034 Virtualization, Cloud, and Distributed Computing - Part 1.mp4
29.24MB
05 - Domain 4 Network Security/035 Virtualization, Cloud, and Distributed Computing - Part 2.mp4
26.52MB
05 - Domain 4 Network Security/036 Virtualization, Cloud, and Distributed Computing - Part 3.mp4
21.58MB
05 - Domain 4 Network Security/037 Virtualization, Cloud, and Distributed Computing - Part 4.mp4
58.58MB
05 - Domain 4 Network Security/038 Virtualization, Cloud, and Distributed Computing - Part 5.mp4
87.42MB
05 - Domain 4 Network Security/039 The Internet of Things (IoT).mp4
19.93MB
05 - Domain 4 Network Security/040 Asset tracking and hardware hardening.mp4
24.47MB
05 - Domain 4 Network Security/041 Electricity.mp4
58.2MB
05 - Domain 4 Network Security/042 Backups - Part 1.mp4
33.52MB
05 - Domain 4 Network Security/043 Backups - Part 2.mp4
30.14MB
05 - Domain 4 Network Security/044 Fault tolerance, redundancy, and resiliency - Part 1.mp4
19.65MB
05 - Domain 4 Network Security/045 Fault tolerance, redundancy, and resiliency - Part 2.mp4
22.04MB
05 - Domain 4 Network Security/046 Fault tolerance, redundancy, and resiliency - Part 3.mp4
23.09MB
05 - Domain 4 Network Security/047 Fire suppression - Part 1.mp4
18.61MB
05 - Domain 4 Network Security/048 Fire suppression - Part 2.mp4
30.38MB
05 - Domain 4 Network Security/049 Secure design principles - Part 1.mp4
57.32MB
05 - Domain 4 Network Security/050 Secure design principles - Part 2.mp4
36.04MB
05 - Domain 4 Network Security/051 What we covered in Domain 4.mp4
7.43MB
06 - Domain 5 Security Operations/001 Domain 5 - What we will be covering.mp4
6.41MB
06 - Domain 5 Security Operations/002 Configuration Management.mp4
15.25MB
06 - Domain 5 Security Operations/003 Patch Management.mp4
28.32MB
06 - Domain 5 Security Operations/004 Change Management.mp4
42.65MB
06 - Domain 5 Security Operations/005 Cryptography - Part 1.mp4
31.71MB
06 - Domain 5 Security Operations/006 Cryptography - Part 2.mp4
51.12MB
06 - Domain 5 Security Operations/007 Cryptography - Part 3.mp4
32.74MB
06 - Domain 5 Security Operations/008 Hashing.mp4
19MB
06 - Domain 5 Security Operations/009 Attacks on our cryptography.mp4
27.86MB
06 - Domain 5 Security Operations/010 Data handling, data storage and data retention - Part 1.mp4
56.9MB
06 - Domain 5 Security Operations/011 Data handling, data storage and data retention - Part 2.mp4
39.16MB
06 - Domain 5 Security Operations/012 Data handling, data storage and data retention - Part 3.mp4
28.28MB
06 - Domain 5 Security Operations/013 Administrative (Directive) Controls.mp4
87.94MB
06 - Domain 5 Security Operations/014 Training and awareness.mp4
28.09MB
06 - Domain 5 Security Operations/015 Social Engineering attacks - Part 1.mp4
31.51MB
06 - Domain 5 Security Operations/016 Social Engineering attacks - Part 2.mp4
41.6MB
06 - Domain 5 Security Operations/017 What we covered in Domain 5.mp4
8.47MB
07 - Domain recaps/001 Domain 1 recap Certified in Cybersecurity (CC).mp4
120.29MB
07 - Domain recaps/002 Domain 2 recap Certified in Cybersecurity (CC).mp4
87.58MB
07 - Domain recaps/003 Domain 3 recap Certified in Cybersecurity (CC).mp4
88.62MB
07 - Domain recaps/004 Domain 4 recap Certified in Cybersecurity (CC).mp4
408.01MB
07 - Domain recaps/005 Domain 5 recap Certified in Cybersecurity (CC).mp4
161.52MB
08 - The study process, material, tips, tricks and practice tests!/001 Why you should want to get Certified in Cybersecurity.mp4
18.05MB
08 - The study process, material, tips, tricks and practice tests!/002 Scheduling your exam and what to expect.mp4
42.74MB
08 - The study process, material, tips, tricks and practice tests!/003 What to expect on exam day and after.mp4
33.22MB
08 - The study process, material, tips, tricks and practice tests!/004 I passed the exam now what.mp4
20.3MB
08 - The study process, material, tips, tricks and practice tests!/005 I failed the exam now what.mp4
24.49MB
08 - The study process, material, tips, tricks and practice tests!/006 How to approach practice questions.mp4
118.51MB
08 - The study process, material, tips, tricks and practice tests!/007 How to design your career and certification path.mp4
74.37MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:
[email protected]
概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统