Index of {{url}}

Last Update: {{nowBrowsingMirror.last_update}} {{nowBrowsingMirror.status}}

/packages/cios-dhitechnical/Learning_Networking_PDFS/CBTNuggets - (ISC)2 CCSP - Certified Cloud Security Professional - (ISC)† Certification Training/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
99. Backups and Availability.mp443.9 MiB2025-Sep-26 16:47
98. Managing It All.mp432.8 MiB2025-Sep-26 16:47
97. Stand Alone Hosts in the Cloud.mp421.9 MiB2025-Sep-26 16:47
96. Operating System Security.mp422.6 MiB2025-Sep-26 16:47
95. Securing the Network.mp468.6 MiB2025-Sep-26 16:48
94. Controlling Access.mp429.6 MiB2025-Sep-26 16:47
93. Virtualization Toolset.mp423.4 MiB2025-Sep-26 16:47
92. Security Configurations.mp425.6 MiB2025-Sep-26 16:47
91. Hardware Specific Security Configurations.mp444.6 MiB2025-Sep-26 16:47
90. CASB and Secrets Management.mp435.0 MiB2025-Sep-26 16:48
9. Cryptography and Key Management.mp456.9 MiB2025-Sep-26 16:47
89. Federated Identity, MFA, OTP and SSO.mp444.3 MiB2025-Sep-26 16:47
88. Application Virtualization and Orchestratio..>54.9 MiB2025-Sep-26 16:47
87. Cryptography and Applications.mp456.6 MiB2025-Sep-26 16:47
86. Supplemental Security Components.mp482.0 MiB2025-Sep-26 16:47
85. Abuse Case Testing.mp422.2 MiB2025-Sep-26 16:47
84. Quality Assurance.mp431.5 MiB2025-Sep-26 16:47
83. Security Testing Methodologies.mp440.6 MiB2025-Sep-26 16:47
82. Functional and Non-Functional Testing.mp419.7 MiB2025-Sep-26 16:48
81. Cloud Development Basics.mp436.3 MiB2025-Sep-26 16:47
80. Common Cloud Application Vulnerabilities.mp4123.8 MiB2025-Sep-26 16:47
8. Impact From Emerging Technologies.mp461.8 MiB2025-Sep-26 16:47
79. Intro.mp417.5 MiB2025-Sep-26 16:47
78. Secure Coding Techniques.mp427.0 MiB2025-Sep-26 16:48
77. Threat Modeling.mp447.9 MiB2025-Sep-26 16:47
76. Cloud Specific Risks.mp442.9 MiB2025-Sep-26 16:48
75. Development Methodologies.mp430.0 MiB2025-Sep-26 16:48
74. Phases of the SDLC.mp430.4 MiB2025-Sep-26 16:47
73. Business Requirements.mp425.1 MiB2025-Sep-26 16:47
72. BCDR Testing.mp433.3 MiB2025-Sep-26 16:47
71. BCDR Strategy and Planning.mp451.5 MiB2025-Sep-26 16:47
70. Business Requirements for BCDR.mp443.2 MiB2025-Sep-26 16:47
7. Shared Responsibility.mp431.8 MiB2025-Sep-26 16:47
69. Risks Related to the Cloud and BCDR.mp453.3 MiB2025-Sep-26 16:47
68. Audit Mechanisms.mp428.2 MiB2025-Sep-26 16:47
67. Identification, Authentication and Authoriz..>35.1 MiB2025-Sep-26 16:47
66. Protecting Virtualized Systems.mp452.9 MiB2025-Sep-26 16:47
65. System and Communication Protection.mp446.6 MiB2025-Sep-26 16:48
64. Physical and Environmental Protection.mp419.7 MiB2025-Sep-26 16:48
63. Countermeasure Strategies.mp434.6 MiB2025-Sep-26 16:47
62. Virtualization Risks.mp435.6 MiB2025-Sep-26 16:47
61. Cloud Specific Risks.mp423.5 MiB2025-Sep-26 16:47
60. Cloud Infrastructure Risk and Security.mp447.8 MiB2025-Sep-26 16:47
6. Software as a Service (SaaS).mp429.4 MiB2025-Sep-26 16:47
59. Risk Assessments.mp446.3 MiB2025-Sep-26 16:47
58. Multi-Vendor Pathway Connectivity.mp421.3 MiB2025-Sep-26 16:47
57. The Importance of Airflow.mp448.8 MiB2025-Sep-26 16:48
56. Temperature and Humidity.mp432.8 MiB2025-Sep-26 16:47
55. Physical Design.mp432.6 MiB2025-Sep-26 16:47
54. Datacenter Security.mp448.0 MiB2025-Sep-26 16:47
53. Datacenter Services.mp434.0 MiB2025-Sep-26 16:47
52. Intro.mp415.4 MiB2025-Sep-26 16:47
51. Management Plane.mp432.2 MiB2025-Sep-26 16:47
50. Virtualization.mp428.5 MiB2025-Sep-26 16:47
5. Platform as a Service (PaaS).mp420.4 MiB2025-Sep-26 16:47
49. Compute and Storage.mp450.9 MiB2025-Sep-26 16:47
48. Networking and Communications.mp463.1 MiB2025-Sep-26 16:47
47. Physical Environment.mp446.7 MiB2025-Sep-26 16:47
46. Intro.mp413.4 MiB2025-Sep-26 16:47
45. Chain of Custody and Non-Repudiation.mp426.1 MiB2025-Sep-26 16:48
44. Log Storage.mp426.8 MiB2025-Sep-26 16:47
43. Logs and Auditability.mp421.9 MiB2025-Sep-26 16:48
42. Data Archival.mp421.6 MiB2025-Sep-26 16:47
41. Data Retention and Deletion.mp420.1 MiB2025-Sep-26 16:47
40. Information Rights Management (IRM).mp443.3 MiB2025-Sep-26 16:47
4. Infrastructure as a Service (IaaS).mp430.1 MiB2025-Sep-26 16:47
39. Data Classification.mp434.0 MiB2025-Sep-26 16:47
38. Data Discovery Techniques and Issues.mp428.8 MiB2025-Sep-26 16:47
37. Data Discovery -.mp424.8 MiB2025-Sep-26 16:47
36. Data Loss Prevention (DLP).mp436.9 MiB2025-Sep-26 16:47
35. Data Obfuscation and Anonymization.mp447.3 MiB2025-Sep-26 16:47
34. Data Hashing - (ISC)² CCSP.mp434.1 MiB2025-Sep-26 16:47
33. Key Management.mp445.0 MiB2025-Sep-26 16:47
32. IaaS Data Encryption Options.mp432.8 MiB2025-Sep-26 16:47
31. The Encryption Process and the Cloud.mp436.0 MiB2025-Sep-26 16:48
30. Threats to Storage.mp437.7 MiB2025-Sep-26 16:47
3. Cloud Deployment Models.mp453.4 MiB2025-Sep-26 16:47
29. Cloud Storage Types.mp447.4 MiB2025-Sep-26 16:48
28. Data Dispersion.mp431.3 MiB2025-Sep-26 16:48
27. Data Functions.mp453.5 MiB2025-Sep-26 16:48
26. Cloud Data Lifecycle.mp447.0 MiB2025-Sep-26 16:47
25. Additional Standards.mp474.1 MiB2025-Sep-26 16:47
24. CSA STAR.mp456.6 MiB2025-Sep-26 16:47
23. ENISA.mp471.3 MiB2025-Sep-26 16:47
22. PCI-DSS.mp425.8 MiB2025-Sep-26 16:47
21. ISOIEC 27017.mp444.5 MiB2025-Sep-26 16:47
20. Evaluating Cloud Service Providers.mp424.2 MiB2025-Sep-26 16:48
2. Cloud Computing Characteristics.mp453.3 MiB2025-Sep-26 16:47
19. Security Considerations for Different Cloud..>42.9 MiB2025-Sep-26 16:48
18. Functional Requirements.mp427.0 MiB2025-Sep-26 16:47
17. Cost Benefit Analysis.mp438.0 MiB2025-Sep-26 16:47
16. Cloud Based DR and BC.mp457.8 MiB2025-Sep-26 16:47
15. Data Governance.mp443.3 MiB2025-Sep-26 16:47
14. Cloud Secure Data Lifecycle.mp431.3 MiB2025-Sep-26 16:47
13. Common Threats in the Cloud.mp444.8 MiB2025-Sep-26 16:47
126. Supply Chain Management.mp432.6 MiB2025-Sep-26 16:47
125. Contract Management.mp432.1 MiB2025-Sep-26 16:47
124. Business Requirements and Vendor Managemen..>54.9 MiB2025-Sep-26 16:47
123. Risk Frameworks, Metrics and Environments.mp432.3 MiB2025-Sep-26 16:47
122. Regulatory Transparency and Risk Treatment..>37.2 MiB2025-Sep-26 16:47
121. Assessing Risk Management and Data Roles.mp431.4 MiB2025-Sep-26 16:47
120. Impact of a Distributed IT Model.mp423.9 MiB2025-Sep-26 16:48
12. Network and Virtualization Security.mp468.5 MiB2025-Sep-26 16:47
119. Specialized Compliance Requirements.mp423.8 MiB2025-Sep-26 16:47
118. identification and Involvement of Relevant..>18.4 MiB2025-Sep-26 16:47
117. Policies.mp418.9 MiB2025-Sep-26 16:47
116. ISMS and ISCS.mp420.5 MiB2025-Sep-26 16:47
115. Gap Analysis and Audit Planning.mp424.6 MiB2025-Sep-26 16:47
114. Audit Reports.mp413.8 MiB2025-Sep-26 16:47
113. Audit Controls and Assurance.mp432.2 MiB2025-Sep-26 16:47
112. Intro Auditing in the Cloud.mp46.7 MiB2025-Sep-26 16:47
111. Skill Review.mp471.2 MiB2025-Sep-26 16:47
110. Privacy Standards and PIAs.mp445.5 MiB2025-Sep-26 16:47
11. Data and Media Sanitization.mp432.5 MiB2025-Sep-26 16:47
109. Country-Specific Legislation of Data Priva..>46.2 MiB2025-Sep-26 16:47
108. Contractual vs Regulated Private Data.mp417.2 MiB2025-Sep-26 16:47
107. E-Discovery and Forensic Requirements.mp435.4 MiB2025-Sep-26 16:48
106. Legal Frameworks and Guidelines.mp417.4 MiB2025-Sep-26 16:47
105. Legal Requirements and Unique Risks in the..>20.6 MiB2025-Sep-26 16:47
104. Intro to Legal, Risk and Privacy in the Cl..>12.2 MiB2025-Sep-26 16:47
103. Managing Security Operations.mp441.1 MiB2025-Sep-26 16:47
102. Managing Communications.mp425.5 MiB2025-Sep-26 16:47
101. Supporting Digital Forensics.mp453.7 MiB2025-Sep-26 16:47
100. Operational Controls and Standards.mp434.0 MiB2025-Sep-26 16:47
10. Access Control with IAM.mp439.2 MiB2025-Sep-26 16:47
1. Cloud Computing Roles.mp420.6 MiB2025-Sep-26 16:47

本站相关源码可在 这里(镜像管理器)这里(镜像站网页) 获取。

根据相关法律法规,本站不对欧盟用户提供服务。

本站相关源码可在 这里(镜像管理器)这里(镜像站网页) 获取。

根据相关法律法规,本站不对欧盟用户提供服务。