Index of {{url}}

Last Update: {{nowBrowsingMirror.last_update}} {{nowBrowsingMirror.status}}

/packages/cios-dhitechnical/hyp3core_training_mirror/course/Certification/ISC2/CBTNuggets - (ISC)2 CCSP - Certified Cloud Security Professional - (ISC)† Certification Training/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
1. Cloud Computing Roles.mp420.6 MiB2025-Sep-25 11:18
10. Access Control with IAM.mp439.2 MiB2025-Sep-25 11:18
100. Operational Controls and Standards.mp434.0 MiB2025-Sep-25 11:18
101. Supporting Digital Forensics.mp453.7 MiB2025-Sep-25 11:18
102. Managing Communications.mp425.5 MiB2025-Sep-25 11:18
103. Managing Security Operations.mp441.1 MiB2025-Sep-25 11:18
104. Intro to Legal, Risk and Privacy in the Cl..>12.2 MiB2025-Sep-25 11:18
105. Legal Requirements and Unique Risks in the..>20.6 MiB2025-Sep-25 11:18
106. Legal Frameworks and Guidelines.mp417.4 MiB2025-Sep-25 11:18
107. E-Discovery and Forensic Requirements.mp435.4 MiB2025-Sep-25 11:18
108. Contractual vs Regulated Private Data.mp417.2 MiB2025-Sep-25 11:18
109. Country-Specific Legislation of Data Priva..>46.2 MiB2025-Sep-25 11:18
11. Data and Media Sanitization.mp432.5 MiB2025-Sep-25 11:18
110. Privacy Standards and PIAs.mp445.5 MiB2025-Sep-25 11:18
111. Skill Review.mp471.2 MiB2025-Sep-25 11:18
112. Intro Auditing in the Cloud.mp46.7 MiB2025-Sep-25 11:18
113. Audit Controls and Assurance.mp432.2 MiB2025-Sep-25 11:18
114. Audit Reports.mp413.8 MiB2025-Sep-25 11:18
115. Gap Analysis and Audit Planning.mp424.6 MiB2025-Sep-25 11:18
116. ISMS and ISCS.mp420.5 MiB2025-Sep-25 11:18
117. Policies.mp418.9 MiB2025-Sep-25 11:18
118. identification and Involvement of Relevant..>18.4 MiB2025-Sep-25 11:18
119. Specialized Compliance Requirements.mp423.8 MiB2025-Sep-25 11:18
12. Network and Virtualization Security.mp468.5 MiB2025-Sep-25 11:18
120. Impact of a Distributed IT Model.mp423.9 MiB2025-Sep-25 11:18
121. Assessing Risk Management and Data Roles.mp431.4 MiB2025-Sep-25 11:18
122. Regulatory Transparency and Risk Treatment..>37.2 MiB2025-Sep-25 11:18
123. Risk Frameworks, Metrics and Environments.mp432.3 MiB2025-Sep-25 11:18
124. Business Requirements and Vendor Managemen..>54.9 MiB2025-Sep-25 11:18
125. Contract Management.mp432.1 MiB2025-Sep-25 11:18
126. Supply Chain Management.mp432.6 MiB2025-Sep-25 11:18
13. Common Threats in the Cloud.mp444.8 MiB2025-Sep-25 11:18
14. Cloud Secure Data Lifecycle.mp431.3 MiB2025-Sep-25 11:18
15. Data Governance.mp443.3 MiB2025-Sep-25 11:18
16. Cloud Based DR and BC.mp457.8 MiB2025-Sep-25 11:18
17. Cost Benefit Analysis.mp438.0 MiB2025-Sep-25 11:18
18. Functional Requirements.mp427.0 MiB2025-Sep-25 11:18
19. Security Considerations for Different Cloud..>42.9 MiB2025-Sep-25 11:19
2. Cloud Computing Characteristics.mp453.3 MiB2025-Sep-25 11:19
20. Evaluating Cloud Service Providers.mp424.2 MiB2025-Sep-25 11:19
21. ISOIEC 27017.mp444.5 MiB2025-Sep-25 11:19
22. PCI-DSS.mp425.8 MiB2025-Sep-25 11:19
23. ENISA.mp471.3 MiB2025-Sep-25 11:19
24. CSA STAR.mp456.6 MiB2025-Sep-25 11:19
25. Additional Standards.mp474.1 MiB2025-Sep-25 11:19
26. Cloud Data Lifecycle.mp447.0 MiB2025-Sep-25 11:19
27. Data Functions.mp453.5 MiB2025-Sep-25 11:19
28. Data Dispersion.mp431.3 MiB2025-Sep-25 11:19
29. Cloud Storage Types.mp447.4 MiB2025-Sep-25 11:19
3. Cloud Deployment Models.mp453.4 MiB2025-Sep-25 11:19
30. Threats to Storage.mp437.7 MiB2025-Sep-25 11:19
31. The Encryption Process and the Cloud.mp436.0 MiB2025-Sep-25 11:19
32. IaaS Data Encryption Options.mp432.8 MiB2025-Sep-25 11:19
33. Key Management.mp445.0 MiB2025-Sep-25 11:19
34. Data Hashing - (ISC)² CCSP.mp434.1 MiB2025-Sep-25 11:19
35. Data Obfuscation and Anonymization.mp447.3 MiB2025-Sep-25 11:19
36. Data Loss Prevention (DLP).mp436.9 MiB2025-Sep-25 11:19
37. Data Discovery -.mp424.8 MiB2025-Sep-25 11:19
38. Data Discovery Techniques and Issues.mp428.8 MiB2025-Sep-25 11:19
39. Data Classification.mp434.0 MiB2025-Sep-25 11:19
4. Infrastructure as a Service (IaaS).mp430.1 MiB2025-Sep-25 11:19
40. Information Rights Management (IRM).mp443.3 MiB2025-Sep-25 11:19
41. Data Retention and Deletion.mp420.1 MiB2025-Sep-25 11:19
42. Data Archival.mp421.6 MiB2025-Sep-25 11:19
43. Logs and Auditability.mp421.9 MiB2025-Sep-25 11:19
44. Log Storage.mp426.8 MiB2025-Sep-25 11:19
45. Chain of Custody and Non-Repudiation.mp426.1 MiB2025-Sep-25 11:19
46. Intro.mp413.4 MiB2025-Sep-25 11:19
47. Physical Environment.mp446.7 MiB2025-Sep-25 11:19
48. Networking and Communications.mp463.1 MiB2025-Sep-25 11:19
49. Compute and Storage.mp450.9 MiB2025-Sep-25 11:19
5. Platform as a Service (PaaS).mp420.4 MiB2025-Sep-25 11:19
50. Virtualization.mp428.5 MiB2025-Sep-25 11:19
51. Management Plane.mp432.2 MiB2025-Sep-25 11:19
52. Intro.mp415.4 MiB2025-Sep-25 11:19
53. Datacenter Services.mp434.0 MiB2025-Sep-25 11:19
54. Datacenter Security.mp448.0 MiB2025-Sep-25 11:19
55. Physical Design.mp432.6 MiB2025-Sep-25 11:19
56. Temperature and Humidity.mp432.8 MiB2025-Sep-25 11:19
57. The Importance of Airflow.mp448.8 MiB2025-Sep-25 11:19
58. Multi-Vendor Pathway Connectivity.mp421.3 MiB2025-Sep-25 11:19
59. Risk Assessments.mp446.3 MiB2025-Sep-25 11:19
6. Software as a Service (SaaS).mp429.4 MiB2025-Sep-25 11:19
60. Cloud Infrastructure Risk and Security.mp447.8 MiB2025-Sep-25 11:19
61. Cloud Specific Risks.mp423.5 MiB2025-Sep-25 11:19
62. Virtualization Risks.mp435.6 MiB2025-Sep-25 11:19
63. Countermeasure Strategies.mp434.6 MiB2025-Sep-25 11:19
64. Physical and Environmental Protection.mp419.7 MiB2025-Sep-25 11:19
65. System and Communication Protection.mp446.6 MiB2025-Sep-25 11:19
66. Protecting Virtualized Systems.mp452.9 MiB2025-Sep-25 11:19
67. Identification, Authentication and Authoriz..>35.1 MiB2025-Sep-25 11:19
68. Audit Mechanisms.mp428.2 MiB2025-Sep-25 11:19
69. Risks Related to the Cloud and BCDR.mp453.3 MiB2025-Sep-25 11:19
7. Shared Responsibility.mp431.8 MiB2025-Sep-25 11:19
70. Business Requirements for BCDR.mp443.2 MiB2025-Sep-25 11:19
71. BCDR Strategy and Planning.mp451.5 MiB2025-Sep-25 11:19
72. BCDR Testing.mp433.3 MiB2025-Sep-25 11:19
73. Business Requirements.mp425.1 MiB2025-Sep-25 11:19
74. Phases of the SDLC.mp430.4 MiB2025-Sep-25 11:19
75. Development Methodologies.mp430.0 MiB2025-Sep-25 11:19
76. Cloud Specific Risks.mp442.9 MiB2025-Sep-25 11:19
77. Threat Modeling.mp447.9 MiB2025-Sep-25 11:19
78. Secure Coding Techniques.mp427.0 MiB2025-Sep-25 11:19
79. Intro.mp417.5 MiB2025-Sep-25 11:19
8. Impact From Emerging Technologies.mp461.8 MiB2025-Sep-25 11:19
80. Common Cloud Application Vulnerabilities.mp4123.8 MiB2025-Sep-25 11:19
81. Cloud Development Basics.mp436.3 MiB2025-Sep-25 11:19
82. Functional and Non-Functional Testing.mp419.7 MiB2025-Sep-25 11:19
83. Security Testing Methodologies.mp440.6 MiB2025-Sep-25 11:19
84. Quality Assurance.mp431.5 MiB2025-Sep-25 11:19
85. Abuse Case Testing.mp422.2 MiB2025-Sep-25 11:19
86. Supplemental Security Components.mp482.0 MiB2025-Sep-25 11:19
87. Cryptography and Applications.mp456.6 MiB2025-Sep-25 11:19
88. Application Virtualization and Orchestratio..>54.9 MiB2025-Sep-25 11:19
89. Federated Identity, MFA, OTP and SSO.mp444.3 MiB2025-Sep-25 11:19
9. Cryptography and Key Management.mp456.9 MiB2025-Sep-25 11:19
90. CASB and Secrets Management.mp435.0 MiB2025-Sep-25 11:19
91. Hardware Specific Security Configurations.mp444.6 MiB2025-Sep-25 11:19
92. Security Configurations.mp425.6 MiB2025-Sep-25 11:19
93. Virtualization Toolset.mp423.4 MiB2025-Sep-25 11:19
94. Controlling Access.mp429.6 MiB2025-Sep-25 11:19
95. Securing the Network.mp468.6 MiB2025-Sep-25 11:19
96. Operating System Security.mp422.6 MiB2025-Sep-25 11:19
97. Stand Alone Hosts in the Cloud.mp421.9 MiB2025-Sep-25 11:19
98. Managing It All.mp432.8 MiB2025-Sep-25 11:19
99. Backups and Availability.mp443.9 MiB2025-Sep-25 11:19

本站相关源码可在 这里(镜像管理器)这里(镜像站网页) 获取。

根据相关法律法规,本站不对欧盟用户提供服务。

本站相关源码可在 这里(镜像管理器)这里(镜像站网页) 获取。

根据相关法律法规,本站不对欧盟用户提供服务。