RAR-files |
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.rar |
50,000,000 |
CFB6A1EB |
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r00 |
50,000,000 |
14D1C581 |
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r01 |
50,000,000 |
29F85E03 |
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r02 |
50,000,000 |
4AEF1466 |
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r03 |
50,000,000 |
B7BC387A |
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r04 |
50,000,000 |
7459F9B9 |
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r05 |
50,000,000 |
93668559 |
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r06 |
50,000,000 |
D7BDD9C2 |
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r07 |
943,072 |
612CFA2C |
|
Total size: |
400,943,072 |
|
|
Archived
files |
01. Getting ready for domain 4 of the CASP+ exam - 89s.mp4
[61080bea98fdc38c]
|
4,950,741 |
20088625 |
02. What you should know - 87s.mp4
[acb84a200c3758b5]
|
2,790,823 |
6188E5B9 |
03. About the exam - 104s.mp4
[84d2b768f208f93b]
|
4,430,125 |
508C77F1 |
04. Adapting data flow security to changing business needs - 129s.mp4
[69d555e28c17ee66]
|
7,193,683 |
0CCF3088 |
05. Standards - 229s.mp4
[a7b73db9d4c4dfcd]
|
8,729,693 |
A254E6DA |
06. Interoperability issues - 434s.mp4
[cc72618b1d43116d]
|
16,093,636 |
97BDA8AD |
07. Resiliency issues - 237s.mp4
[d2f1781f0e8119c]
|
9,780,315 |
506CE034 |
08. Data security considerations - 364s.mp4
[6c4d08a727aa27d6]
|
13,854,607 |
0F9609AA |
09. Provisioning and deprovisioning resources - 175s.mp4
[d90a89499191c39a]
|
5,982,786 |
85841C7D |
10. Network segmentation and delegation - 82s.mp4
[ca60174303818014]
|
2,810,900 |
FD03CE70 |
11. Design considerations for mergers and acquisitions - 89s.mp4
[a44e612da63d07ae]
|
3,627,717 |
1183FD9D |
12. Logical deployment diagrams - 106s.mp4
[312d11954750c362]
|
3,411,518 |
CA7441C9 |
13. Security and privacy considerations of storage integration - 71s.mp4
[505473e926d6589]
|
3,359,789 |
8D06C551 |
14. Security implications of enterprise applications - 312s.mp4
[20746379d70748e5]
|
10,504,367 |
A9C9A4C7 |
15. Cloud considerations - 287s.mp4
[3d94a811d9759cff]
|
12,792,700 |
8601CC23 |
16. Cloud service models - 320s.mp4
[27b549863653b4bf]
|
13,324,658 |
13B66DB2 |
17. Virtualization security considerations - 340s.mp4
[7a96fc85814b5e4a]
|
13,242,303 |
6C27FA61 |
18. Augmenting security in the cloud - 315s.mp4
[9a7222d6f028da7]
|
14,097,793 |
9CFFD365 |
19. Commingling considerations - 176s.mp4
[7e4ced175ee42aae]
|
6,272,625 |
A92E9700 |
20. Data security considerations - 162s.mp4
[c6908558eee62772]
|
6,589,136 |
68505F91 |
21. Provisioning and deprovisioning resources - 120s.mp4
[f28564c4aa722fd5]
|
6,987,025 |
0F7F4920 |
22. Authentication - 364s.mp4
[4a82caa77ffd735f]
|
15,828,203 |
4C6BAE06 |
23. Authorization - 359s.mp4
[f38cee5cb281af08]
|
11,421,443 |
9EB12DC3 |
24. Attestation - 146s.mp4
[7033b03644aa6dab]
|
5,898,131 |
C93E2E1B |
25. Identity proofing - 133s.mp4
[a2ee07f7bda0e2f3]
|
5,569,151 |
CEF5E541 |
26. Identity propagation - 87s.mp4
[2d4071eb4f50bfd0]
|
2,739,575 |
B41581EC |
27. Federated identification - 249s.mp4
[e533dd3f15f08e50]
|
8,882,099 |
4BCDE352 |
28. Trust models - 156s.mp4
[4fa56f5e511cd8a5]
|
6,029,295 |
6C1FD4AD |
29. Cryptographic techniques - 419s.mp4
[60fa6d1687c05214]
|
15,101,958 |
7040FACD |
30. Message authentication - 83s.mp4
[d498550aed2fa7a7]
|
2,553,091 |
6DE7440B |
31. Protection of data - 386s.mp4
[c9d5be0b6d04960f]
|
15,403,421 |
452A974B |
32. Cryptographic implementations - 333s.mp4
[cebbc6dbfb5a945b]
|
14,354,228 |
453F0BC9 |
33. Cryptographic implementation considerations - 114s.mp4
[367635db380bffe2]
|
6,627,840 |
45838647 |
34. Stream versus block ciphers - 134s.mp4
[2b9303f462774d8d]
|
4,902,763 |
1D9F5EF5 |
35. Symmetric encryption - 347s.mp4
[fd8b9a824d7ece69]
|
11,498,219 |
9502CBB1 |
36. Asymmetric encryption - 203s.mp4
[3a896db8863045ca]
|
6,673,727 |
BECDA880 |
37. Public key infrastructure - 234s.mp4
[3e5039e85be7649c]
|
7,615,464 |
BF269CAD |
38. Cryptocurrency and blockchain - 102s.mp4
[442bf434d4d56abd]
|
4,425,245 |
55AB5E3B |
39. Mobile device encryption considerations - 123s.mp4
[2356c7697c5dc4b2]
|
4,507,709 |
9A172D61 |
40. Remote access - 257s.mp4
[7e09f910ced85db]
|
9,582,941 |
F16DEF1C |
41. Unified communication - 65s.mp4
[9fcefdfc4e986dfa]
|
2,769,960 |
D77CC700 |
42. Web conferencing - 182s.mp4
[503699cc1e354515]
|
7,115,294 |
452C6A4F |
43. Audio and video conferencing - 164s.mp4
[97bec99ef5a6d63b]
|
7,755,130 |
87248002 |
44. Document and storage collaboration - 181s.mp4
[ca1bc0960e67f838]
|
7,918,295 |
00CF701A |
45. Presence, instant messaging, and email - 308s.mp4
[d20c3ef247a9cb1d]
|
13,658,011 |
162DFB98 |
46. Telephony and VoIP integration - 193s.mp4
[163feee4094f4901]
|
8,162,850 |
7614CAAC |
47. Cloud-based collaboration - 128s.mp4
[f2f23ffa3b16e048]
|
5,902,195 |
E41AFC12 |
48. Social media collaboration - 115s.mp4
[1be21abb3e213440]
|
5,384,581 |
A32D7E85 |
49. What next - 189s.mp4
[399ee60c7dc37689]
|
11,830,514 |
71D3AC9A |
|
Total size: |
400,938,273 |
|
|