[FreeTutorials.Eu] [UDEMY] Cyber Security and Information Security Fundamentals - [FTU]

File Information:
  1. Magnet Link:Magnet LinkMagnet Link
  2. File Size:2.09 GB
  3. Creat Time:2024-07-07
  4. Active Degree:20
  5. Last Active:2024-11-21
  6. File Tags:FreeTutorials  Eu  UDEMY  Cyber  Security  and  Information  Security  Fundamentals  FTU  
  7. Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List:

    [FreeTutorials.Eu] [UDEMY] Cyber Security and Information Security Fundamentals - [FTU]

  1. 1. Introduction/40. Interface Protection.mp4 87.21 MB
  2. 1. Introduction/50. Key Lifecycle Management.mp4 83.67 MB
  3. 1. Introduction/35. Security Requirements.mp4 76.47 MB
  4. 1. Introduction/36. Virtualization.mp4 65.00 MB
  5. 1. Introduction/39. Memory Protection.mp4 63.60 MB
  6. 1. Introduction/53. AES, Blowfish, and Twofish.mp4 62.62 MB
  7. 1. Introduction/55. RSA Encryption.mp4 62.36 MB
  8. 1. Introduction/38. Public Cloud Tiers.mp4 57.65 MB
  9. 1. Introduction/33. Secure Design Principles.mp4 57.64 MB
  10. 1. Introduction/58. Diffie-Hellman Key Exchange.mp4 55.60 MB
  11. 1. Introduction/37. Cloud Computing Models.mp4 50.15 MB
  12. 1. Introduction/41. High Availability and Fault Tolerance.mp4 49.15 MB
  13. 1. Introduction/47. Symmetric and Asymmetric Cryptography.mp4 48.93 MB
  14. 1. Introduction/30. Leveraging Industry Standards.mp4 46.90 MB
  15. 1. Introduction/34. Security Models.mp4 45.04 MB
  16. 1. Introduction/59. Key Escrow.mp4 43.93 MB
  17. 1. Introduction/42. OWASP Top 10.mp4 41.38 MB
  18. 1. Introduction/61. Public Key Infrastructure (PKI) and Digital Certificates.mp4 40.18 MB
  19. 1. Introduction/1. Introduction.mp4 34.04 MB
  20. 1. Introduction/3. Hashing.mp4 33.64 MB
  21. 1. Introduction/62. Hash Functions.mp4 33.63 MB
  22. 1. Introduction/52. Triple DES (3DES).mp4 33.06 MB
  23. 1. Introduction/9. Control Frameworks.mp4 32.95 MB
  24. 1. Introduction/44. Cross-Site Scripting Prevention.mp4 32.45 MB
  25. 1. Introduction/11. Industry Specific Laws.mp4 32.27 MB
  26. 1. Introduction/22. Quantitative Risk Factors.mp4 32.17 MB
  27. 1. Introduction/28. Data Privacy.mp4 31.25 MB
  28. 1. Introduction/46. Understanding Encryption.mp4 29.35 MB
  29. 1. Introduction/18. Business Continuity Controls and Key Technical Concepts.mp4 29.34 MB
  30. 1. Introduction/32. Understanding Encryption.mp4 29.33 MB
  31. 1. Introduction/16. Common Policies and Key Principles.mp4 27.78 MB
  32. 1. Introduction/43. SQL Injection Prevention.mp4 27.48 MB
  33. 1. Introduction/2. Understanding Information Security.mp4 26.68 MB
  34. 1. Introduction/26. Data Security Policies.mp4 26.66 MB
  35. 1. Introduction/23. Risk Management Strategies.mp4 26.22 MB
  36. 1. Introduction/51. Data Encryption Standards (DES).mp4 25.29 MB
  37. 1. Introduction/13. Software Licensing.mp4 24.53 MB
  38. 1. Introduction/19. RAID Technology.mp4 24.45 MB
  39. 1. Introduction/24. Security Controls.mp4 24.26 MB
  40. 1. Introduction/21. Risk Assessment Techniques.mp4 23.79 MB
  41. 1. Introduction/49. Codes and Ciphers.mp4 23.76 MB
  42. 1. Introduction/56. Elliptic-Curve Cryptography and Quantum Cryptography.mp4 23.58 MB
  43. 1. Introduction/31. Customizing Security Standards.mp4 23.48 MB
  44. 1. Introduction/29. Developing Security Baselines.mp4 23.37 MB
  45. 1. Introduction/60. Trust Models.mp4 23.31 MB
  46. 1. Introduction/57. Key Exchange.mp4 23.30 MB
  47. 1. Introduction/20. Risk Management.mp4 23.23 MB
  48. 1. Introduction/45. Cross-Site Request Forgery.mp4 22.00 MB
  49. 1. Introduction/10. Compliance and Ethics.mp4 21.75 MB
  50. 1. Introduction/25. Understanding Data Security.mp4 19.93 MB