[FreeTutorials.Eu] [UDEMY] Cyber Security and Information Security Fundamentals - [FTU]
File Information:
- Magnet Link:Magnet Link
- File Size:2.09 GB
- Creat Time:2024-07-07
- Active Degree:20
- Last Active:2024-11-21
- File Tags:FreeTutorials Eu UDEMY Cyber Security and Information Security Fundamentals FTU
- Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List:
- 1. Introduction/40. Interface Protection.mp4 87.21 MB
- 1. Introduction/50. Key Lifecycle Management.mp4 83.67 MB
- 1. Introduction/35. Security Requirements.mp4 76.47 MB
- 1. Introduction/36. Virtualization.mp4 65.00 MB
- 1. Introduction/39. Memory Protection.mp4 63.60 MB
- 1. Introduction/53. AES, Blowfish, and Twofish.mp4 62.62 MB
- 1. Introduction/55. RSA Encryption.mp4 62.36 MB
- 1. Introduction/38. Public Cloud Tiers.mp4 57.65 MB
- 1. Introduction/33. Secure Design Principles.mp4 57.64 MB
- 1. Introduction/58. Diffie-Hellman Key Exchange.mp4 55.60 MB
- 1. Introduction/37. Cloud Computing Models.mp4 50.15 MB
- 1. Introduction/41. High Availability and Fault Tolerance.mp4 49.15 MB
- 1. Introduction/47. Symmetric and Asymmetric Cryptography.mp4 48.93 MB
- 1. Introduction/30. Leveraging Industry Standards.mp4 46.90 MB
- 1. Introduction/34. Security Models.mp4 45.04 MB
- 1. Introduction/59. Key Escrow.mp4 43.93 MB
- 1. Introduction/42. OWASP Top 10.mp4 41.38 MB
- 1. Introduction/61. Public Key Infrastructure (PKI) and Digital Certificates.mp4 40.18 MB
- 1. Introduction/1. Introduction.mp4 34.04 MB
- 1. Introduction/3. Hashing.mp4 33.64 MB
- 1. Introduction/62. Hash Functions.mp4 33.63 MB
- 1. Introduction/52. Triple DES (3DES).mp4 33.06 MB
- 1. Introduction/9. Control Frameworks.mp4 32.95 MB
- 1. Introduction/44. Cross-Site Scripting Prevention.mp4 32.45 MB
- 1. Introduction/11. Industry Specific Laws.mp4 32.27 MB
- 1. Introduction/22. Quantitative Risk Factors.mp4 32.17 MB
- 1. Introduction/28. Data Privacy.mp4 31.25 MB
- 1. Introduction/46. Understanding Encryption.mp4 29.35 MB
- 1. Introduction/18. Business Continuity Controls and Key Technical Concepts.mp4 29.34 MB
- 1. Introduction/32. Understanding Encryption.mp4 29.33 MB
- 1. Introduction/16. Common Policies and Key Principles.mp4 27.78 MB
- 1. Introduction/43. SQL Injection Prevention.mp4 27.48 MB
- 1. Introduction/2. Understanding Information Security.mp4 26.68 MB
- 1. Introduction/26. Data Security Policies.mp4 26.66 MB
- 1. Introduction/23. Risk Management Strategies.mp4 26.22 MB
- 1. Introduction/51. Data Encryption Standards (DES).mp4 25.29 MB
- 1. Introduction/13. Software Licensing.mp4 24.53 MB
- 1. Introduction/19. RAID Technology.mp4 24.45 MB
- 1. Introduction/24. Security Controls.mp4 24.26 MB
- 1. Introduction/21. Risk Assessment Techniques.mp4 23.79 MB
- 1. Introduction/49. Codes and Ciphers.mp4 23.76 MB
- 1. Introduction/56. Elliptic-Curve Cryptography and Quantum Cryptography.mp4 23.58 MB
- 1. Introduction/31. Customizing Security Standards.mp4 23.48 MB
- 1. Introduction/29. Developing Security Baselines.mp4 23.37 MB
- 1. Introduction/60. Trust Models.mp4 23.31 MB
- 1. Introduction/57. Key Exchange.mp4 23.30 MB
- 1. Introduction/20. Risk Management.mp4 23.23 MB
- 1. Introduction/45. Cross-Site Request Forgery.mp4 22.00 MB
- 1. Introduction/10. Compliance and Ethics.mp4 21.75 MB
- 1. Introduction/25. Understanding Data Security.mp4 19.93 MB
[FreeTutorials.Eu] [UDEMY] Cyber Security and Information Security Fundamentals - [FTU]
Hot Tags: