Torrent Info
Title [GigaCourse.Com] Udemy - Certified Information Systems Security Officer (CISSO)
Category
Size 5.42GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[CourseClub.Me].url 122B
[CourseClub.Me].url 122B
[CourseClub.Me].url 122B
[CourseClub.Me].url 122B
[CourseClub.Me].url 122B
[CourseClub.Me].url 122B
[CourseClub.Me].url 122B
[GigaCourse.Com].url 49B
[GigaCourse.Com].url 49B
[GigaCourse.Com].url 49B
[GigaCourse.Com].url 49B
[GigaCourse.Com].url 49B
[GigaCourse.Com].url 49B
[GigaCourse.Com].url 49B
001 Access Control_en.vtt 14.44KB
001 Access Control.mp4 115.39MB
001 Agenda_en.vtt 17.91KB
001 Agenda.mp4 43.43MB
001 Asymmetric Cryptography and PKI_en.vtt 18.70KB
001 Asymmetric Cryptography and PKI.mp4 60.84MB
001 Authentication_en.vtt 17.30KB
001 Authentication.mp4 128.59MB
001 Disaster Recovery_en.vtt 15.10KB
001 Disaster Recovery.mp4 47.93MB
001 Information Classification_en.vtt 18.35KB
001 Information Classification_en.vtt 20.54KB
001 Information Classification_en.vtt 18.07KB
001 Information Classification_en.vtt 18.10KB
001 Information Classification_en.vtt 15.66KB
001 Information Classification_en.vtt 18.22KB
001 Information Classification_en.vtt 18.29KB
001 Information Classification_en.vtt 18.63KB
001 Information Classification_en.vtt 18.27KB
001 Information Classification_en.vtt 19.05KB
001 Information Classification.mp4 60.21MB
001 Information Classification.mp4 60.96MB
001 Information Classification.mp4 55.61MB
001 Information Classification.mp4 58.40MB
001 Information Classification.mp4 118.73MB
001 Information Classification.mp4 144.45MB
001 Information Classification.mp4 83.45MB
001 Information Classification.mp4 98.75MB
001 Information Classification.mp4 129.46MB
001 Information Classification.mp4 135.27MB
001 Malware and Attacks_en.vtt 18.39KB
001 Malware and Attacks.mp4 130.56MB
001 Security Management_en.vtt 17.54KB
001 Security Management.mp4 56.53MB
001 Security Models and Evaluation Criteria_en.vtt 17.89KB
001 Security Models and Evaluation Criteria.mp4 85.51MB
001 Symmetric Cryptography and Hashing_en.vtt 16.84KB
001 Symmetric Cryptography and Hashing.mp4 59.75MB
002 Access Control Characteristics_en.vtt 19.04KB
002 Access Control Characteristics.mp4 64.56MB
002 Artificial Intelligence_en.vtt 19.56KB
002 Artificial Intelligence.mp4 140.97MB
002 Biometrics Error Types_en.vtt 19.15KB
002 Biometrics Error Types.mp4 35.23MB
002 Development Methodologies_en.vtt 13.31KB
002 Development Methodologies.mp4 44.82MB
002 Enterprise Security Program_en.vtt 12.99KB
002 Enterprise Security Program.mp4 24.25MB
002 Example of Hybrid Cryptography_en.vtt 16.77KB
002 Example of Hybrid Cryptography.mp4 74.61MB
002 Historical Uses of Symmetric Cryptography Vernam Cipher_en.vtt 14.84KB
002 Historical Uses of Symmetric Cryptography Vernam Cipher.mp4 53.48MB
002 How to Identify the Most Critical Company Functions_en.vtt 12.39KB
002 How to Identify the Most Critical Company Functions.mp4 43.58MB
002 Integrated Security is Designed Security_en.vtt 20.45KB
002 Integrated Security is Designed Security.mp4 63.35MB
002 Intellectual Property Law_en.vtt 17.98KB
002 Intellectual Property Law.mp4 56.77MB
002 PBX Vulnerabilities_en.vtt 11.88KB
002 PBX Vulnerabilities.mp4 39.06MB
002 Product Implementation Concerns_en.vtt 17.64KB
002 Product Implementation Concerns.mp4 88.65MB
002 Recovery Plan_en.vtt 23.16KB
002 Recovery Plan.mp4 98.52MB
002 Risk Management_en.vtt 17.09KB
002 Risk Management.mp4 60.80MB
002 Summary of Topologies_en.vtt 21.44KB
002 Summary of Topologies.mp4 79.44MB
002 Transport Layer_en.vtt 20.30KB
002 Transport Layer.mp4 94.46MB
002 What Does It Mean to Be in a Specific Ring_en.vtt 15.62KB
002 What Does It Mean to Be in a Specific Ring.mp4 131.42MB
003 CA and RA Roles_en.vtt 18.95KB
003 CA and RA Roles.mp4 57.04MB
003 Countries Working Together_en.vtt 17.87KB
003 Countries Working Together.mp4 119.64MB
003 Facility Backups - Hot Site_en.vtt 10.69KB
003 Facility Backups - Hot Site.mp4 70.10MB
003 Information Classification_en.vtt 18.70KB
003 Information Classification.mp4 157.78MB
003 Memory Cards_en.vtt 13.59KB
003 Memory Cards.mp4 58.60MB
003 Non-Interference Model_en.vtt 12.84KB
003 Non-Interference Model.mp4 60.00MB
003 Quantitative Analysis_en.vtt 18.00KB
003 Quantitative Analysis.mp4 60.73MB
003 Redundant Array of Independent Disk (RAID)_en.vtt 16.65KB
003 Redundant Array of Independent Disk (RAID).mp4 51.31MB
003 Repeater_en.vtt 22.67KB
003 Repeater.mp4 69.01MB
003 Return to Normal Operations_en.vtt 14.94KB
003 Return to Normal Operations.mp4 47.74MB
003 Roadmap to Maturity_en.vtt 16.91KB
003 Roadmap to Maturity.mp4 55.44MB
003 Security Issues_en.vtt 14.74KB
003 Security Issues.mp4 46.93MB
003 SSLTLS_en.vtt 8.54KB
003 SSLTLS.mp4 27.78MB
003 System Functionality_en.vtt 12.64KB
003 System Functionality.mp4 40.30MB
003 Threats to Access Control_en.vtt 6.72KB
003 Threats to Access Control.mp4 65.16MB
003 Transmission Types - Number of Recievers_en.vtt 19.65KB
003 Transmission Types - Number of Recievers.mp4 57.23MB
003 Virus_en.vtt 9.32KB
003 Virus.mp4 77.63MB
004 Attacking Through Applications_en.vtt 13.50KB
004 Attacking Through Applications.mp4 42.51MB
004 DDoS_en.vtt 10.70KB
004 DDoS.mp4 56.44MB
004 Firewall Types - Circuit - Level Proxy Firewall_en.vtt 18.35KB
004 Firewall Types - Circuit - Level Proxy Firewall.mp4 54.24MB
004 Human Resources Issues_en.vtt 9.69KB
004 Human Resources Issues.mp4 49.64MB
004 Information Classification_en.vtt 9.69KB
004 Information Classification.mp4 74.67MB
004 Issues Pertaining to Kerberos_en.vtt 11.84KB
004 Issues Pertaining to Kerberos.mp4 38.91MB
004 ITSEC - Good and Bad_en.vtt 10.72KB
004 ITSEC - Good and Bad.mp4 86.44MB
004 Linking Through COM_en.vtt 17.64KB
004 Linking Through COM.mp4 125.39MB
004 Link versus End-to-End Encryption_en.vtt 19.48KB
004 Link versus End-to-End Encryption.mp4 76.88MB
004 Methodology_en.vtt 18.48KB
004 Methodology.mp4 141.61MB
004 Network Topologies_en.vtt 18.43KB
004 Network Topologies.mp4 54.28MB
004 Privacy of Sensitive Data_en.vtt 12.98KB
004 Privacy of Sensitive Data.mp4 52.94MB
004 Symmetric Algorithms - DS_en.vtt 22.06KB
004 Symmetric Algorithms - DS.mp4 120.35MB
004 Wireless Network Topologies_en.vtt 18.08KB
004 Wireless Network Topologies.mp4 92.51MB
005 Discretionary Access Control Model_en.vtt 12.84KB
005 Discretionary Access Control Model.mp4 61.01MB
005 IPSec Handshaking Process_en.vtt 17.45KB
005 IPSec Handshaking Process.mp4 51.19MB
005 TCPIP Suite_en.vtt 16.82KB
005 TCPIP Suite.mp4 51.49MB
005 WAN Technologies - DSL_en.vtt 15.66KB
005 WAN Technologies - DSL.mp4 57.72MB
005 WPA and WPA2 Mode Types_en.vtt 16.19KB
005 WPA and WPA2 Mode Types.mp4 113.72MB
006 Access Control Administration_en.vtt 12.59KB
006 Access Control Administration.mp4 56.85MB
006 Types of Physical IDS_en.vtt 20.49KB
006 Types of Physical IDS.mp4 93.46MB
12128224-CISSO-WB01.pdf 289.36KB
12128228-CISSO-WB02.pdf 284.08KB
12128232-CISSO-WB03.pdf 283.16KB
12128242-CISSO-WB04.pdf 280.37KB
12128250-CISSO-WB05.pdf 283.38KB
12128256-CISSO-WB06.pdf 282.20KB
12128258-CISSO-WB07.pdf 277.08KB
12128266-CISSO-WB09.pdf 284.82KB
12128270-CISSO-WB10.pdf 277.97KB
12128274-CISSO-WB11.pdf 221.97KB
12128278-CISSO-WB12.pdf 280.49KB
12128288-CISSO-WB14.pdf 221.33KB
12128292-CISSO-WB15.pdf 281.96KB
12128298-CISSO-WB16.pdf 220.77KB
12128306-CISSO-WB17.pdf 220.96KB
12128308-CISSO-WB18.pdf 280.88KB
12128322-CISSO-WB19.pdf 282.44KB
19401620-CISSO-WB13.pdf 276.79KB
19401622-CISSO-WB08.pdf 221.67KB
Distribution statistics by country
Republic of Korea (KR) 1
United States (US) 1
Romania (RO) 1
Total 3
IP List List of IP addresses which were distributed this torrent