New-Folder-iGJb
2 - 2 - CISO Kirk Bailey and Ernie Hayden Part 1 - Three Areas.mp414.74MB
2 - 3 - CISO Kirk Bailey and Ernie Hayden Part 2 - Background of Industry.mp423.80MB
2 - 4 - CISO Kirk Bailey and Ernie Hayden Part 3 - CISO CISSP and CI.mp424.17MB
2 - 5 - CISO Kirk Bailey and Ernie Hayden Part 4 - CISSP.mp422.69MB
2 - 6 - CISO Kirk Bailey and Ernie Hayden Part 5 - Strategic Security Plan An Example.mp43.98MB
2 - 7 - CISO Kirk Bailey and Ernie Hayden Part 6 - Security Events Example and Priority Response List.mp455.25MB
2 - 8 - CISO Kirk Bailey and Ernie Hayden Part 7 - CISO A Quick Definition.mp45.26MB
2 - 9 - CISO Mike Hamilton - Types of Jobs in Infortion Security.mp424.96MB
3 - 1 - Welcome to Week 2.mp410.54MB
3 - 2 - Introduction to the Infortion Age.mp411.33MB
3 - 3 - Unintended Consequences of Embracing the Internet.mp414.68MB
3 - 4 - What Does All This Mean.mp420.33MB
3 - 5 - Academic Context_the McCumber Cube.mp412.48MB
3 - 6 - The Evolution of Vulnerabilities.mp48.75MB
3 - 7 - The Problem.mp410.93MB
3 - 8 - Our Solution.mp42.17MB
3 - 9 - Reference Sites.mp42.18MB
4 - 1 - Welcome to Week 3 (154).mp46.17MB
4 - 10 - Final Part of an Assesent Mike Simon (317).mp414.05MB
4 - 2 - Governance (917).mp416.57MB
4 - 3 - Incident Response (303).mp45.46MB
4 - 4 - Compliance nagement (559).mp410.57MB
4 - 5 - Digital Forensics (1413).mp424.54MB
4 - 6 - Introduction to Mike Simon (045).mp42.27MB
4 - 7 - Introduction to Policy Mike Simon (956).mp437.65MB
4 - 8 - Elements of a Good Policy Mike Simon (1704).mp470.76MB
4 - 9 - Analyzing Policy and Capability turity Model Mike Simon (1740).mp474.39MB
5 - 1 - Welcome to Week 4 (142).mp45.39MB
5 - 10 - Planning Assurance in the Security System Jim Poland (1157).mp422.16MB
5 - 11 - Planning Security Models Jim Poland (731).mp424.17MB
5 - 12 - Planning Protection Measures and Certif. and Accredit. of Systems Jim Poland (328).mp410.75MB
5 - 13 - Planning QA and Conclusion Jim Poland (1307).mp444.98MB
5 - 2 - Basics of IA Planning Dr. Endicott-Popovsky (1212).mp420.15MB
5 - 3 - Strategic Planning Dr. Endicott-Popovsky (1027).mp417.18MB
5 - 4 - Tips for Planning Dr. Endicott-Popovsky (523).mp49.36MB
5 - 5 - Planning Jim Poland Introduction (227).mp48.78MB
5 - 6 - Planning Are Security Controls Good Enough Jim Poland (209).mp48.30MB
5 - 7 - Planning Sensitivity of Data Jim Poland (316).mp412.92MB
5 - 8 - Planning Protection Mechanis Part 1 Jim Poland (426).mp417.21MB
5 - 9 - Planning Protection Mechanis Part 2 Jim Poland (1705).mp433.43MB
6 - 1 - Welcome to Week 5 (104).mp43.17MB
6 - 10 - Technologies Dr. Koblitz Part 5 Xedni Calculus (0).mp421.35MB
6 - 11 - Technologies Dr. Koblitz Part 6 Competition Reflection RSA vs. ECC (257).mp410.72MB
6 - 12 - Technologies Dr. Koblitz Part 7 QA (233).mp48.55MB
6 - 13 - Technologies Mr. Gregory Introduction (034).mp41.81MB
6 - 14 - Technologies Mr. Gregory Part 1 CISSP Doins (656).mp417.08MB
6 - 15 - Technologies Mr. Gregory Part 2 Computer Architecture (837).mp417.24MB
6 - 16 - Technologies Mr. Gregory Part 3 Security Architecture (1356).mp435.36MB
6 - 17 - Technologies Mr. Gregory Part 4 Security Models (1742).mp451.01MB
6 - 18 - Technologies Mr. Gregory Part 5 Evaluation Criteria (910).mp418.28MB
6 - 19 - Technologies Mr. Gregory Part 6 QA and Exam Prep (228).mp48.18MB
6 - 2 - Technologies Dr. Endicott-Popovsky Part 1 (1518).mp426.28MB
6 - 3 - Technologies Dr. Endicott-Popovsky Part 2 (1116).mp419.37MB
6 - 4 - Technologies Dr. Endicott-Popovsky Part 3 (1522).mp426.32MB
6 - 5 - Technologies Dr. Koblitz Introduction (030).mp41.56MB
6 - 6 - Technologies Dr. Koblitz Part 1 Cryptography History (402).mp414.28MB
6 - 7 - Technologies Dr. Koblitz Part 2 Public Key Cryptography (1214).mp435.26MB
6 - 8 - Technologies Dr. Koblitz Part 3 Elliptic Curve Cryptography (1302).mp438.40MB
6 - 9 - Technologies Dr. Koblitz Part 4 RSA vs. ECC (1628).mp450.40MB
7 - 1 - Welcome to Week 6 (037).mp42.26MB
7 - 10 - Hun Factors Mr. Opaki Part 4 - Organizational Behior (152).mp43.67MB
7 - 11 - Hun Factors Mr. Opaki Part 5 - Systems Theory (216).mp46.03MB
7 - 12 - Hun Factors Mr. Opaki Part 6 - Managing Human Factors (1012).mp430.42MB
7 - 2 - Hun Factors Dr. Endicott-Popovsky Part 1 (940).mp415.65MB
7 - 3 - Hun Factors Dr. Endicott-Popovsky Part 2 (932).mp415.90MB
7 - 4 - Hun Factors Dr. Endicott-Popovsky Part 3 (4).mp411.55MB
7 - 5 - Hun Factors Dr. Endicott-Popovsky Part 4 (917).mp414.90MB
7 - 6 - Hun Factors Mr. Opaki Introduction (025).mp41.38MB
7 - 7 - Hun Factors Mr. Opaki Part 1 - Human Problems (453).mp414.75MB
7 - 8 - Hun Factors Mr. Opaki Part 2 - Psychology (1025).mp427.12MB
7 - 9 - Hun Factors Mr. Opaki Part 3 - Behioral (440).mp410.74MB
8 - 1 - Welcome to Week 7 (056).mp43.19MB
8 - 10 - Business Continuity and Disaster Recovery Michael Ness Part 3 - Why He a Plan (534).mp410.31MB
8 - 11 - Business Continuity and Disaster Recovery Michael Ness Part 4 - Do Your Initiatives Satisfy (227).mp45.69MB
8 - 12 - Business Continuity and Disaster Recovery Michael Ness Part 5 - QA Comments Concerns (2306).mp489.46MB
8 - 13 - Business Continuity and Disaster Recovery Ivan Orton - Introduction (034).mp41.88MB
8 - 14 - Business Continuity and Disaster Recovery Ivan Orton Part 1 - Four Players in Breach Legal Liability (1003).mp433.51MB
8 - 15 - Business Continuity and Disaster Recovery Ivan Orton Part 2 - Changes in Law Future Trends Part A (346).mp413.12MB
8 - 16 - Business Continuity and Disaster Recovery Ivan Orton Part 3 - Changes in Law Future Trends Part B (8).mp449.65MB
8 - 17 - Business Continuity and Disaster Recovery Ivan Orton Part 4 - Changes in Law Future Trends Part C (1219).mp451.45MB
8 - 18 - Business Continuity and Disaster Recovery Ivan Orton Part 5 - Changes in Law Future Trends Part D (951).mp439.54MB
8 - 19 - Business Continuity and Disaster Recovery Ivan Orton Part 6 - Capetown Rio Case (1416).mp443.02MB
8 - 2 - After a Breach Dr. Endicott-Popovsky Part 1 - Inevitability of Attacks(826).mp414.34MB
8 - 3 - After a Breach Dr. Endicott-Popovsky Part 2 - Business Continuity Planning (2153).mp436.80MB
8 - 4 - After a Breach Dr. Endicott-Popovsky Part 3 - Disaster Recovery Planning (505).mp48.29MB
8 - 5 - After a Breach Dr. Endicott-Popovsky Part 4 - Incident Response (1705).mp429.39MB
8 - 6 - After a Breach Dr. Endicott-Popovsky Part 5 - Digital Forensics (1045).mp418.51MB
8 - 7 - Business Continuity and Disaster Recovery Michael Ness - Introduction (027).mp41.51MB
8 - 8 - Business Continuity and Disaster Recovery Michael Ness Part 1 - Leadership Selling Your Ideas (1542).mp446.77MB
8 - 9 - Business Continuity and Disaster Recovery Michael Ness Part 2 - Your Presentation (3).mp442.24MB
9 - 1 - Welcome to Week 8 Infortion Assurance Audit Dr. Endicott-Popovsky (1849).mp432.09MB
9 - 10 - Risk Assesent Part 7 Seth Shapiro - Risk Identification Part B (1404).mp440.23MB
9 - 11 - Risk Assesent Part 8 Seth Shapiro - Risk Acceptance (1250).mp435.12MB
9 - 12 - Risk Assesent Part 9 Seth Shapiro - Discussion and QA (6).mp426.75MB
9 - 2 - Penetration Testing Part 1 Dr. Endicott-Popovsky (1212).mp420.30MB
9 - 3 - Penetration Testing Part 2 Dr. Endicott-Popovsky (1212).mp421.64MB
9 - 4 - Risk Assesent Part 1 Seth Shapiro - Overview What is Risk (1349).mp431.97MB
9 - 5 - Risk Assesent Part 2 Seth Shapiro - Procedure for Risk Analysis Part A (549).mp412.42MB
9 - 6 - Risk Assesent Part 3 Seth Shapiro - Procedure for Risk Analysis Part B (1531).mp441.31MB
9 - 7 - Risk Assesent Part 4 Seth Shapiro - Methods for Risk Analysis Part A (516).mp411.88MB
9 - 8 - Risk Assesent Part 5 Seth Shapiro - Methods for Risk Analysis Part B (1628).mp436.61MB
9 - 9 - Risk Assesent Part 6 Seth Shapiro - Risk Identification Part A (7).mp432.95MB
- CreateTime2017-05-02
- UpdateTime2017-12-01
- FileTotalCount102
- TotalSize2.16GBHotTimes6ViewTimes13DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.ONED-830 2.MBYD-148 3.ONSD-599 4.KIRD-167 5.ONSD-590 6.WSS-114 7.ADD-007 8.WSP-067 9.ONSD-522 10.RKI-162 11.JUSD-433 12.MIBD-607 13.BKSP-089 14.DIGI-099 15.IDBD-418 16.ONSD-176 17.ONSD-396 18.CSD-04 19.DVH-197 20.ALD-628 21.APAE-021 22.MIBD-484 23.LADS-032 24.ONSD-393 25.IDBD-327 26.MIBD-463 27.RKI-261 28.JUX-069 29.RKI-220 30.TYWD-030 31.ZXY-016 32.LOM-007 33.YUBA-02 34.EMU-040 35.MVBD-067 36.KAZ-079 37.IENE-184 38.DPHA-007 39.GNJD-010 40.TMRD-490 41.SDDL-152 42.JKS-027 43.DYNS-005 44.RCT-010 45.CCDV-1094 46.BOBB-177 47.XV-1120 48.ID-018 49.EZD-020 50.AVGP-016 51.SWF-101 52.BNDV-778 53.KRMV-782 54.D-680 55.ZGIX-001 56.AEIL-120 57.BR-003 58.NDV-410 59.CAT-216 60.GSX-019 61.SNS-532 62.GYJ-047 63.BF-009 64.AR-025 65.KSZR-013 66.BKD-46 67.OKAS-079 68.RD-349 69.NOV-8384 70.MA-351 71.830 72.148 73.599 74.167 75.590 76. 77.007 78.067 79.522 80.162 81.433 82.607 83.089 84.099 85.418 86.176 87.396 88.04 89.197 90.628 91.021 92.484 93.032 94.393 95.327 96.463 97.261 98.069 99.220 100.030 101.016 102.007 103.02 104.040 105.067 106.079 107.184 108.007 109.010 110.490 111.152 112.027 113.005 114.010 115.1094 116.177 117.1120 118.018 119.020 120.016 121.101 122.778 123.782 124.680 125.001 126.120 127.003 128.410 129.216 130.019 131.532 132.047 133.009 134.025 135.013 136.46 137.079 138.349 139.8384 140.351