搜索
[ WebToolTip.com ] Udemy - Data Security Fundamentals
磁力链接/BT种子名称
[ WebToolTip.com ] Udemy - Data Security Fundamentals
磁力链接/BT种子简介
种子哈希:
5263fffc5ebd40aaa1b08fe8abf674bd9d0ca8ee
文件大小:
1.67G
已经下载:
397
次
下载速度:
极快
收录时间:
2025-06-20
最近下载:
2025-08-10
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:5263FFFC5EBD40AAA1B08FE8ABF674BD9D0CA8EE
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
TikTok成人版
PornHub
草榴社区
哆哔涩漫
呦乐园
萝莉岛
最近搜索
男奴
megapack+-+incest
破解家庭网络摄像头偷拍各种夫妻激情啪啪
zell+am+see+summernights+frestival
monarch legacy of monsters
loland
kenzie love - megapack
指定特定相談支援事業
yngr
fc2+ppv+♀+
约炮大神狮子座
【国产大合集】
fc2-ppv+-3181466+
heizhen
胖子传媒
wolfs
韩国
pdf editor
熟女
nikia
电影
cosplaybunbun
alien: covenant - advent
nikia 黑人
doctor+strange+in+the+multiverse+of+madness++2022
roxy.
ladyboy aobi
fc2ppv+美乳
黑皮猪
按摩
文件列表
~Get Your Files Here !/1 - Introduction/2 -Data Security Masterclass.pdf
76.4 MB
~Get Your Files Here !/10 - Security Operations & Incident Response/6 -Data Disaster Recovery.mp4
63.4 MB
~Get Your Files Here !/2 - Data Security Foundations/2 -Importance of Data Protection - real examples.mp4
53.5 MB
~Get Your Files Here !/9 - Data Loss Prevention/2 -Key Components of a DLP Solution.mp4
51.7 MB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/3 -Data Security Risk Register.mp4
51.1 MB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/1 -Data Security Policy.mp4
49.1 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/13 -AI-based Attacks.mp4
45.0 MB
~Get Your Files Here !/10 - Security Operations & Incident Response/4 -Digital Forensics Fundamentals.mp4
38.3 MB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/2 -Data Classification Policy.mp4
37.1 MB
~Get Your Files Here !/11 - Human Factors & Security Culture/4 -Creating a Security-Aware Culture.mp4
36.7 MB
~Get Your Files Here !/10 - Security Operations & Incident Response/3 -Incident Response Planning.mp4
32.5 MB
~Get Your Files Here !/2 - Data Security Foundations/5 -Data states at rest, in transit, in processing.mp4
32.2 MB
~Get Your Files Here !/5 - PRACTICE Data Security Tasks/2 -Solution Classify different types of organizational data.mp4
31.2 MB
~Get Your Files Here !/11 - Human Factors & Security Culture/3 -Measuring Security Awareness.mp4
29.6 MB
~Get Your Files Here !/9 - Data Loss Prevention/3 -Data Loss Prevention Policy - template included for download.mp4
29.1 MB
~Get Your Files Here !/1 - Introduction/1 -Introduction.mp4
28.8 MB
~Get Your Files Here !/13 - Data Security Standards/1 -Intro to Data Security Standards.mp4
28.5 MB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/4 -Data Retention Policy.mp4
28.1 MB
~Get Your Files Here !/10 - Security Operations & Incident Response/5 -Business Continuity.mp4
28.1 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/3 -Malware.mp4
27.4 MB
~Get Your Files Here !/7 - Identity and Access Management/5 -Privileged Access Management (PAM).mp4
26.9 MB
~Get Your Files Here !/11 - Human Factors & Security Culture/2 -Developing Security Awareness Programs.mp4
25.7 MB
~Get Your Files Here !/6 - Cryptography Fundamentals/1 -Principles of Cryptography.mp4
24.6 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/10 -Denial of Service (DoS) & Distributed DoS (DDoS) Attacks.mp4
24.3 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/8 -Data Leakage & Accidental Exposure.mp4
24.0 MB
~Get Your Files Here !/10 - Security Operations & Incident Response/1 -Security Monitoring and Logging.mp4
23.5 MB
~Get Your Files Here !/13 - Data Security Standards/5 -SOC 2 (Service Organization Control 2).mp4
23.4 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/1 -Phishing.mp4
23.2 MB
~Get Your Files Here !/6 - Cryptography Fundamentals/2 -Symmetric Encryption.mp4
22.9 MB
~Get Your Files Here !/12 - Staying compliant with leading data security regulations/3 -California Consumer Privacy Act (CCPA) & California Privacy Rights Act (CPRA).mp4
22.8 MB
~Get Your Files Here !/10 - Security Operations & Incident Response/2 -Incident Detection.mp4
22.5 MB
~Get Your Files Here !/12 - Staying compliant with leading data security regulations/5 -Regional and Sector-Specific Laws.mp4
22.2 MB
~Get Your Files Here !/13 - Data Security Standards/2 -ISOIEC 27001.mp4
22.2 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/2 -Phishing email example identifying a phishing email.mp4
21.8 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/4 -Ransomware.mp4
21.0 MB
~Get Your Files Here !/2 - Data Security Foundations/1 -What is Data Security.mp4
20.9 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/14 -Zero-Day Vulnerabilities.mp4
20.5 MB
~Get Your Files Here !/12 - Staying compliant with leading data security regulations/1 -General Data Protection Regulation (GDPR).mp4
20.3 MB
~Get Your Files Here !/7 - Identity and Access Management/2 -IAM Principles.mp4
20.2 MB
~Get Your Files Here !/14 - Data Security Certifications/1 -Which Data Security Certification to pursue - how to choose.mp4
19.9 MB
~Get Your Files Here !/5 - PRACTICE Data Security Tasks/1 -Exercise Classify different types of organizational data.mp4
19.7 MB
~Get Your Files Here !/2 - Data Security Foundations/4 -The CIA Triad Confidentiality, Integrity and Availability.mp4
19.4 MB
~Get Your Files Here !/7 - Identity and Access Management/1 -What is Identity and Access Management (IAM).mp4
19.3 MB
~Get Your Files Here !/2 - Data Security Foundations/3 -Types of sensitive data to be protected.mp4
18.3 MB
~Get Your Files Here !/8 - Secure Software Development/5 -DevSecOps Principles.mp4
18.2 MB
~Get Your Files Here !/6 - Cryptography Fundamentals/3 -Hands-On exercise Let's do symmetric encryption on a message.mp4
18.1 MB
~Get Your Files Here !/7 - Identity and Access Management/4 -Authorization and Access Control Models.mp4
18.1 MB
~Get Your Files Here !/11 - Human Factors & Security Culture/1 -Social Engineering Attacks.mp4
17.3 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/11 -Insecure APIs & Third-party integrations.mp4
17.1 MB
~Get Your Files Here !/6 - Cryptography Fundamentals/5 -Hands-On exercise Let's do asymmetric encryption on a message.mp4
16.8 MB
~Get Your Files Here !/9 - Data Loss Prevention/4 -Types of DLP and Implementation Considerations.mp4
16.6 MB
~Get Your Files Here !/8 - Secure Software Development/2 -Secure Coding Principles.mp4
16.5 MB
~Get Your Files Here !/6 - Cryptography Fundamentals/6 -Hashing for Data Integrity.mp4
16.4 MB
~Get Your Files Here !/8 - Secure Software Development/1 -Security in the SDLC.mp4
15.3 MB
~Get Your Files Here !/6 - Cryptography Fundamentals/4 -Asymmetric Encryption.mp4
14.8 MB
~Get Your Files Here !/9 - Data Loss Prevention/1 -Introduction to Data Loss Prevention (DLP).mp4
14.7 MB
~Get Your Files Here !/13 - Data Security Standards/4 -Payment Card Industry Data Security Standard (PCI DSS).mp4
14.4 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/5 -Insider Threats.mp4
13.8 MB
~Get Your Files Here !/12 - Staying compliant with leading data security regulations/4 -India’s Digital Personal Data Protection Act (DPDP).mp4
13.5 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/6 -Weak Passwords & Credential Theft.mp4
13.3 MB
~Get Your Files Here !/6 - Cryptography Fundamentals/7 -Hands-On exercise Let's hash a password.mp4
13.2 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/9 -Man-in-the-Middle (MitM) Attacks.mp4
12.9 MB
~Get Your Files Here !/7 - Identity and Access Management/3 -Authentication Methods.mp4
12.6 MB
~Get Your Files Here !/14 - Data Security Certifications/2 -Certified Information Systems Security Professional (CISSP).mp4
12.6 MB
~Get Your Files Here !/13 - Data Security Standards/3 -NIST SP 800-53.mp4
12.4 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/12 -Physical Security Breaches.mp4
11.9 MB
~Get Your Files Here !/3 - Threats and Vulnerabilities/7 -Unpatched Software Vulnerabilities.mp4
11.6 MB
~Get Your Files Here !/12 - Staying compliant with leading data security regulations/2 -Health Insurance Portability and Accountability Act (HIPAA).mp4
10.5 MB
~Get Your Files Here !/14 - Data Security Certifications/11 -GDPR - Certified Data Protection Officer (CDPO).mp4
10.4 MB
~Get Your Files Here !/14 - Data Security Certifications/7 -Certified Cloud Security Professional (CCSP).mp4
10.2 MB
~Get Your Files Here !/14 - Data Security Certifications/10 -HealthCare Information Security and Privacy Practitioner (HCISPP).mp4
9.9 MB
~Get Your Files Here !/14 - Data Security Certifications/6 -CompTIA Security+.mp4
9.1 MB
~Get Your Files Here !/15 - Course Closure/1 -Next Steps.mp4
8.6 MB
~Get Your Files Here !/14 - Data Security Certifications/9 -Certified Information Privacy Technologist (CIPT).mp4
8.5 MB
~Get Your Files Here !/14 - Data Security Certifications/8 -Offensive Security Certified Professional (OSCP).mp4
8.5 MB
~Get Your Files Here !/1 - Introduction/2 -Download the course materials.mp4
8.4 MB
~Get Your Files Here !/8 - Secure Software Development/3 -API Security Basics.mp4
8.3 MB
~Get Your Files Here !/14 - Data Security Certifications/4 -Certified Information Systems Auditor (CISA).mp4
7.9 MB
~Get Your Files Here !/14 - Data Security Certifications/5 -Certified Ethical Hacker (CEH).mp4
7.7 MB
~Get Your Files Here !/8 - Secure Software Development/4 -Automated Security Testing.mp4
7.7 MB
~Get Your Files Here !/14 - Data Security Certifications/3 -Certified Information Security Manager (CISM).mp4
6.4 MB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/2 -Data Classification Policy.docx
114.7 kB
~Get Your Files Here !/3 - Threats and Vulnerabilities/1 -Phishing Poster - for printing.pdf
65.8 kB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/4 -Data Retention Policy.docx
38.6 kB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/1 -Data Security Policy.docx
31.0 kB
~Get Your Files Here !/9 - Data Loss Prevention/3 -Data Loss Prevention Policy.docx
27.7 kB
~Get Your Files Here !/10 - Security Operations & Incident Response/3 -Incident Response Plan for Data Security.docx
19.5 kB
~Get Your Files Here !/7 - Identity and Access Management/2 -Identity and Access Management.docx
19.0 kB
~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/3 -Risk Register.xlsx
14.4 kB
~Get Your Files Here !/14 - Data Security Certifications/1 -Data Security Certifications.xlsx
13.4 kB
~Get Your Files Here !/5 - PRACTICE Data Security Tasks/2 -Data Classification Exercise_Solution.xlsx
12.3 kB
~Get Your Files Here !/5 - PRACTICE Data Security Tasks/1 -Data Classification Exercise.xlsx
12.0 kB
~Get Your Files Here !/11 - Human Factors & Security Culture/2 -Security_Awareness_Program_Template.xlsx
10.4 kB
~Get Your Files Here !/15 - Course Closure/2 - Bonus Lecture.html
4.5 kB
Get Bonus Downloads Here.url
180 Bytes
~Get Your Files Here !/8 - Secure Software Development/2 -Secure Coding Principles Checklist.url
134 Bytes
~Get Your Files Here !/13 - Data Security Standards/5 -SOC 2.url
119 Bytes
~Get Your Files Here !/8 - Secure Software Development/4 -Automated Security Testing article.url
101 Bytes
~Get Your Files Here !/6 - Cryptography Fundamentals/6 -Hashing 101.url
89 Bytes
~Get Your Files Here !/7 - Identity and Access Management/5 -Detailed Guide on PAM.url
84 Bytes
~Get Your Files Here !/8 - Secure Software Development/5 -DevSecOps Principles article.url
80 Bytes
~Get Your Files Here !/6 - Cryptography Fundamentals/1 -Cryptography 101.url
79 Bytes
~Get Your Files Here !/6 - Cryptography Fundamentals/4 -IBM guide on Asymmetric Encryption.url
77 Bytes
~Get Your Files Here !/6 - Cryptography Fundamentals/2 -IBM guide on Symmetric Encryption.url
76 Bytes
~Get Your Files Here !/13 - Data Security Standards/3 -NIST SP 800-53.url
73 Bytes
~Get Your Files Here !/13 - Data Security Standards/4 -PCI DSS.url
70 Bytes
~Get Your Files Here !/Bonus Resources.txt
70 Bytes
~Get Your Files Here !/13 - Data Security Standards/2 -ISO 27001.url
69 Bytes
~Get Your Files Here !/3 - Threats and Vulnerabilities/4 -Ransomware article to read with 11 famous examples.url
63 Bytes
~Get Your Files Here !/8 - Secure Software Development/3 -API Security 101 article.url
61 Bytes
~Get Your Files Here !/8 - Secure Software Development/1 -Secure Software Development Lifecycle (SSDLC).url
60 Bytes
~Get Your Files Here !/6 - Cryptography Fundamentals/7 -Hashing tool.url
57 Bytes
~Get Your Files Here !/6 - Cryptography Fundamentals/5 -Asymmetric encryption online tool.url
54 Bytes
~Get Your Files Here !/6 - Cryptography Fundamentals/3 -Online encryption tool.url
50 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!