Become a Certified Information Systems Security Professional (CISSP)
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size10.6 GB
- Uploaded Bytutsnode
- Downloads625
- Last checkedJun. 10th '21
- Date uploadedJun. 07th '21
- Seeders 28
- Leechers25
Description
This learning path prepares you to pass the prestigious Certified Information Systems Security Professional (CISSP) exam. As you progress through 24 courses, you’ll build your knowledge across a broad range of technical and management topics ranging from secure software development and cryptography to security governance and risk management. Upon completion you’ll be prepared to earn your CISSP, one of the most in-demand security certifications available, and take your cybersecurity career to the next level.
Files:
Become a Certified Information Systems Security Professional (CISSP) [TutsNode.com] - Become a Certified Information Systems Security Professional (CISSP)- 013 - Risk Assessment.mp4 (144.1 MB)
- Notes on Kerberos.pdf (603.1 KB)
- Encryption.pdf (224.0 KB)
- Notes on Biometrics.pdf (204.4 KB)
- Notes on Access Control.pdf (173.1 KB)
- OSI Model.pdf (100.2 KB)
- Common Ports.pdf (94.0 KB)
- IPSec VPN.pdf (78.7 KB)
- 159 - Evidence.mp4 (141.4 MB)
- 174 - Recovery Process.mp4 (129.3 MB)
- 002 - C-I-A.mp4 (123.7 MB)
- 158 - Forensics.mp4 (121.3 MB)
- 101 - Network Cabling and Topology.mp4 (120.4 MB)
- 073 - Internal Facilities Security.mp4 (117.7 MB)
- 095 - IP Networking.mp4 (116.8 MB)
- 006 - Protecting Privacy.mp4 (116.6 MB)
- 005 - Regulatory Compliance.mp4 (115.5 MB)
- 070 - Physical Security.mp4 (112.9 MB)
- 182 - Software Development Models.mp4 (107.9 MB)
- 074 - Physical Intrusion Detection.mp4 (107.7 MB)
- 127 - Authentication.mp4 (106.1 MB)
- 106 - Wireless Networks.mp4 (105.0 MB)
- 071 - Perimeter Defenses.mp4 (101.0 MB)
- 027 - Managing Data.mp4 (100.9 MB)
- 103 - Network Attacks.mp4 (100.9 MB)
- 173 - Recovery Strategy.mp4 (100.8 MB)
- 165 - Preventive Measures.mp4 (96.9 MB)
- 093 - Network Devices.mp4 (96.5 MB)
- 079 - Utilities and HVAC.mp4 (95.6 MB)
- 186 - Software Testing.mp4 (94.8 MB)
- 139 - WLAN Authentication.mp4 (93.0 MB)
- 161 - Log Management.mp4 (92.4 MB)
- 107 - Mobile Systems.mp4 (92.4 MB)
- 100 - Converged Protocols.mp4 (91.0 MB)
- 157 - Investigations.mp4 (89.9 MB)
- 031 - Data at Rest.mp4 (89.3 MB)
- 090 - OSI Layers.mp4 (88.8 MB)
- 187 - Software Environment.mp4 (87.2 MB)
- 063 - Common Architecture Flaws.mp4 (86.9 MB)
- 080 - Fire Safety.mp4 (86.4 MB)
- 035 - Cryptography Terminology.mp4 (84.8 MB)
- 052 - Security Models Part 2.mp4 (84.5 MB)
- 170 - Incident Response Plan.mp4 (84.0 MB)
- 180 - Secure Software Design.mp4 (83.8 MB)
- 171 - Business Impact Analysis (BIA).mp4 (83.1 MB)
- 047 - Key Management.mp4 (82.8 MB)
- 164 - Operations Concepts.mp4 (82.1 MB)
- 022 - Personnel Security.mp4 (82.0 MB)
- 110 - Secure Communication Protocols.mp4 (81.8 MB)
- 043 - Digital Signatures.mp4 (81.1 MB)
- 113 - DMZ.mp4 (81.0 MB)
- 192 - Application Attacks.mp4 (80.7 MB)
- 003 - Security Governance Fundamentals.mp4 (80.3 MB)
- 097 - DNS and DHCP.mp4 (79.5 MB)
- 045 - PKI Definition and Components.mp4 (78.0 MB)
- 033 - Classification.mp4 (77.8 MB)
- 023 - Control Frameworks.mp4 (77.6 MB)
- 134 - Something You Have.mp4 (76.6 MB)
- 122 - Virtualization.mp4 (76.6 MB)
- 177 - Backups.mp4 (75.9 MB)
- 112 - Firewalls.mp4 (74.8 MB)
- 039 - Asymmetric Cryptography.mp4 (74.7 MB)
- 108 - WAN Technologies.mp4 (74.7 MB)
- 126 - Access Control Categories.mp4 (74.3 MB)
- 036 - Hashing.mp4 (74.1 MB)
- 169 - Business Continuity Planning.mp4 (72.8 MB)
- 153 - Penetration Testing.mp4 (72.3 MB)
- 083 - Database Terminology.mp4 (72.2 MB)
- 162 - Egress Monitoring.mp4 (71.7 MB)
- 007 - Intellectual Property.mp4 (71.7 MB)
- 143 - Access Control Models.mp4 (71.0 MB)
- 088 - OSI Protocols.mp4 (70.7 MB)
- 072 - Doors and Locks.mp4 (70.7 MB)
- 053 - Security Models Part 3.mp4 (70.6 MB)
- 029 - Data Security Controls.mp4 (70.1 MB)
- 048 - Key Exchange.mp4 (70.1 MB)
- 152 - Control Testing.mp4 (69.5 MB)
- 064 - Web-Based Vulnerabilities.mp4 (69.5 MB)
- 038 - Symmetric Cryptography.mp4 (67.9 MB)
- 051 - Security Models Part 1.mp4 (67.9 MB)
- 116 - IDS.mp4 (67.7 MB)
- 062 - Protection Mechanisms.mp4 (67.6 MB)
- 032 - Data in Transit.mp4 (66.8 MB)
- 050 - Secure Design Principles.mp4 (66.7 MB)
- 181 - Secure SDLC.mp4 (66.5 MB)
- 149 - Access Provisioning.mp4 (66.4 MB)
- 014 - Threats and Threat Agents.mp4 (66.0 MB)
- 011 - Risk Definitions.mp4 (66.0 MB)
- 135 - Something You Are (Biometrics).mp4 (65.8 MB)
- 086 - Database Attacks.mp4 (65.4 MB)
- 019 - Vendor Security.mp4 (64.9 MB)
- 017 - Security Awareness.mp4 (64.5 MB)
- 037 - Cryptographic Attacks.mp4 (63.9 MB)
- 068 - Facility Design.mp4 (63.7 MB)
- 061 - Computer Components.mp4 (62.2 MB)
- 119 - VPN and VLAN.mp4 (61.5 MB)
- 109 - Remote Access.mp4 (61.0 MB)
- 015 - Risk Assignment.mp4 (60.4 MB)
- 121 - Distributed and Cloud Computing.mp4 (60.2 MB)
- 125 - Access Control Basics.mp4 (59.0 MB)
- 185 - Change Control.mp4 (58.5 MB)
- 030 - Data Remanence.mp4 (58.0 MB)
- 183 - Maturity Models.mp4 (56.8 MB)
- 151 - Security Assessment Goals.mp4 (56.4 MB)
- 147 - Social Engineering.mp4 (55.6 MB)
- 057 - Common Criteria.mp4 (54.9 MB)
- 146 - Access Control Attacks.mp4 (54.8 MB)
- 133 - Something You Know.mp4 (54.3 MB)
- 163 - Configuration Management.mp4 (54.2 MB)
- 018 - Due Diligence and Due Care.mp4 (52.9 MB)
- 129 - Account Management.mp4 (52.8 MB)
- 055 - Evaluation Models.mp4 (52.4 MB)
- 123 - Virtualized Networks.mp4 (52.1 MB)
- 012 - Risk Frameworks.mp4 (51.6 MB)
- 141 - Federated Identity.mp4 (51.1 MB)
- 077 - Data Center Security.mp4 (50.3 MB)
- 094 - Network Security.mp4 (49.7 MB)
- 175 - Disaster Recovery Plan (DRP) Testing.mp4 (49.5 MB)
- 130 - Single Sign-On (SSO).mp4 (49.4 MB)
- 154 - Security Management Processes.mp4 (49.3 MB)
- 178 - Network Redundancy.mp4 (49.0 MB)
- 021 - Policy.mp4 (48.8 MB)
Code:
- udp://inferno.demonoid.pw:3391/announce
- udp://tracker.openbittorrent.com:80/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://torrent.gresille.org:80/announce
- udp://glotorrents.pw:6969/announce
- udp://tracker.leechers-paradise.org:6969/announce
- udp://tracker.pirateparty.gr:6969/announce
- udp://tracker.coppersurfer.tk:6969/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://9.rarbg.to:2710/announce
- udp://shadowshq.yi.org:6969/announce
- udp://tracker.zer0day.to:1337/announce