RAR-files |
linkedin.learning.ccsp.cert.prep.2.data.security-xqzt.rar |
50,000,000 |
58BA50CC |
linkedin.learning.ccsp.cert.prep.2.data.security-xqzt.r00 |
50,000,000 |
83CDF6EA |
linkedin.learning.ccsp.cert.prep.2.data.security-xqzt.r01 |
50,000,000 |
FD6373EC |
linkedin.learning.ccsp.cert.prep.2.data.security-xqzt.r02 |
50,000,000 |
8946F47E |
linkedin.learning.ccsp.cert.prep.2.data.security-xqzt.r03 |
50,000,000 |
564A5B97 |
linkedin.learning.ccsp.cert.prep.2.data.security-xqzt.r04 |
50,000,000 |
E97571D9 |
linkedin.learning.ccsp.cert.prep.2.data.security-xqzt.r05 |
18,971,782 |
6D3C2A72 |
|
Total size: |
318,971,782 |
|
|
Archived
files |
01.01-securing_data_in_the_cloud.mkv
[c51c3b260a0ee11a]
|
7,613,815 |
4F34306D |
01.02-what_you_need_to_know.mkv
[7481c80afd0040bd]
|
1,304,169 |
04FE31D3 |
01.03-study_resources.mkv
[5af531c51c764261]
|
5,850,787 |
9C0E4826 |
01.04-cloud_data_lifecycle.mkv
[507bfbdf044ccb26]
|
6,562,413 |
0974B822 |
02.01-block_storage_types.mkv
[e815396d1a305b3f]
|
4,402,764 |
EFBF47F1 |
02.02-data_dispersion.mkv
[aa8c2bc67bc8c886]
|
6,499,289 |
6A49B45D |
02.03-cloud_storage_security_threats.mkv
[5f9af56d38e45d07]
|
10,591,636 |
F4FCE918 |
03.01-understanding_encryption.mkv
[bdecdccfd27728c5]
|
7,390,846 |
BBCAAEC3 |
03.02-symmetric_and_asymmetric_cryptography.mkv
[6046391da39b8cb4]
|
10,005,243 |
1941C443 |
03.03-goals_of_cryptography.mkv
[f2c7b69a2e4839f2]
|
10,646,845 |
20F248F6 |
03.04-choosing_encryption_algorithms.mkv
[6d9d86ef5e6298d]
|
7,929,260 |
27DD0E65 |
04.01-cryptographic_key_security.mkv
[3416966cf609209f]
|
7,479,069 |
C53AB955 |
04.02-key_exchange.mkv
[b7efa43cab1b2fd1]
|
6,195,612 |
D2CFCA85 |
04.03-diffie-hellman.mkv
[6dc1db0f91114d5a]
|
7,849,683 |
840B71D0 |
04.04-key_escrow.mkv
[fa4df1cde8bdff78]
|
8,839,809 |
227F6BC6 |
04.05-hardware_security_modules.mkv
[96251faaebbbdb5e]
|
7,083,501 |
C8F19DE0 |
05.01-trust_models.mkv
[ae603054f4ca3a09]
|
6,439,919 |
9600A566 |
05.02-pki_and_digital_certificates.mkv
[3bf4ee1a248adabd]
|
9,838,125 |
C86E843E |
05.03-hash_functions.mkv
[da094fdb94d6ddf4]
|
14,917,882 |
5784DE68 |
05.04-digital_signatures.mkv
[6c3984313c76ed6]
|
6,889,083 |
22A801AD |
05.05-creating_a_digital_certificate.mkv
[1e10904444171c5b]
|
10,799,344 |
45D9F7C1 |
05.06-revoking_a_digital_certificate.mkv
[a194c6cae973b05b]
|
4,923,395 |
78B3306F |
06.01-tls_and_ssl.mkv
[fecd66ff17550e2b]
|
8,258,127 |
E4134D60 |
06.02-ipsec.mkv
[96b6fe6177b2bd51]
|
7,874,357 |
2ADBACA4 |
06.03-securing_common_protocols.mkv
[98df3847abf86fa7]
|
18,866,728 |
BF575058 |
07.01-data_anonymization.mkv
[6ff5ae632d5ae017]
|
7,279,141 |
DD710270 |
07.02-data_obfuscation.mkv
[9ca1dc98f90da41c]
|
6,155,635 |
E3A65E4D |
07.03-data_loss_prevention.mkv
[a55be2e213b5b2a8]
|
13,982,218 |
872CE740 |
08.01-information_classification.mkv
[9985c1530ec8ea2c]
|
7,354,739 |
B4772D7C |
08.02-data_discovery.mkv
[918f76162ace2c78]
|
6,421,108 |
580D944B |
08.03-information_rights_management.mkv
[e1b8d8e5a64f7e25]
|
10,174,127 |
D13ED9E4 |
08.04-intellectual_property.mkv
[595bf65a0cb89957]
|
6,626,692 |
A55B21D4 |
08.05-data_security_policies.mkv
[40e964efd018c754]
|
12,036,325 |
908B0CCA |
08.06-ediscovery_and_evidence_preservation.mkv
[4994ec83d7661b32]
|
9,785,311 |
59F93124 |
09.01-security_event_logging.mkv
[102c66d3d504ed34]
|
9,637,515 |
1C053A04 |
09.02-tuning_and_configuring_siems.mkv
[7e83af72a1c60f62]
|
7,061,583 |
C48E40BF |
09.03-continuous_security_monitoring.mkv
[faf19468a7962491]
|
10,384,193 |
882D5E1D |
09.04-chain_of_custody.mkv
[42d83bb1abdb7093]
|
5,588,494 |
1EADC627 |
10.01-continuing_your_ccsp_certification_journey.mkv
[5a8a5bda828f2a86]
|
1,429,609 |
A125C3DE |
|
Total size: |
318,968,391 |
|
|