"The great use of a life is to spend it for something that outlasts it." ―William James 1842-1910
  • U: Anonymous
  • D: 2019-04-18 10:56:47
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 APoLLo File size CRC
Download
13,939
Stored files
4,074 FC42657F
801 7CB7BD3E
RAR-files
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.rar 50,000,000 CFB6A1EB
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r00 50,000,000 14D1C581
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r01 50,000,000 29F85E03
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r02 50,000,000 4AEF1466
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r03 50,000,000 B7BC387A
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r04 50,000,000 7459F9B9
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r05 50,000,000 93668559
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r06 50,000,000 D7BDD9C2
lynda.casp.cert.prep.4.technical.integration.of.enterprise.security-apollo.r07 943,072 612CFA2C

Total size: 400,943,072
Archived files
01. Getting ready for domain 4 of the CASP+ exam - 89s.mp4 [61080bea98fdc38c] 4,950,741 20088625
02. What you should know - 87s.mp4 [acb84a200c3758b5] 2,790,823 6188E5B9
03. About the exam - 104s.mp4 [84d2b768f208f93b] 4,430,125 508C77F1
04. Adapting data flow security to changing business needs - 129s.mp4 [69d555e28c17ee66] 7,193,683 0CCF3088
05. Standards - 229s.mp4 [a7b73db9d4c4dfcd] 8,729,693 A254E6DA
06. Interoperability issues - 434s.mp4 [cc72618b1d43116d] 16,093,636 97BDA8AD
07. Resiliency issues - 237s.mp4 [d2f1781f0e8119c] 9,780,315 506CE034
08. Data security considerations - 364s.mp4 [6c4d08a727aa27d6] 13,854,607 0F9609AA
09. Provisioning and deprovisioning resources - 175s.mp4 [d90a89499191c39a] 5,982,786 85841C7D
10. Network segmentation and delegation - 82s.mp4 [ca60174303818014] 2,810,900 FD03CE70
11. Design considerations for mergers and acquisitions - 89s.mp4 [a44e612da63d07ae] 3,627,717 1183FD9D
12. Logical deployment diagrams - 106s.mp4 [312d11954750c362] 3,411,518 CA7441C9
13. Security and privacy considerations of storage integration - 71s.mp4 [505473e926d6589] 3,359,789 8D06C551
14. Security implications of enterprise applications - 312s.mp4 [20746379d70748e5] 10,504,367 A9C9A4C7
15. Cloud considerations - 287s.mp4 [3d94a811d9759cff] 12,792,700 8601CC23
16. Cloud service models - 320s.mp4 [27b549863653b4bf] 13,324,658 13B66DB2
17. Virtualization security considerations - 340s.mp4 [7a96fc85814b5e4a] 13,242,303 6C27FA61
18. Augmenting security in the cloud - 315s.mp4 [9a7222d6f028da7] 14,097,793 9CFFD365
19. Commingling considerations - 176s.mp4 [7e4ced175ee42aae] 6,272,625 A92E9700
20. Data security considerations - 162s.mp4 [c6908558eee62772] 6,589,136 68505F91
21. Provisioning and deprovisioning resources - 120s.mp4 [f28564c4aa722fd5] 6,987,025 0F7F4920
22. Authentication - 364s.mp4 [4a82caa77ffd735f] 15,828,203 4C6BAE06
23. Authorization - 359s.mp4 [f38cee5cb281af08] 11,421,443 9EB12DC3
24. Attestation - 146s.mp4 [7033b03644aa6dab] 5,898,131 C93E2E1B
25. Identity proofing - 133s.mp4 [a2ee07f7bda0e2f3] 5,569,151 CEF5E541
26. Identity propagation - 87s.mp4 [2d4071eb4f50bfd0] 2,739,575 B41581EC
27. Federated identification - 249s.mp4 [e533dd3f15f08e50] 8,882,099 4BCDE352
28. Trust models - 156s.mp4 [4fa56f5e511cd8a5] 6,029,295 6C1FD4AD
29. Cryptographic techniques - 419s.mp4 [60fa6d1687c05214] 15,101,958 7040FACD
30. Message authentication - 83s.mp4 [d498550aed2fa7a7] 2,553,091 6DE7440B
31. Protection of data - 386s.mp4 [c9d5be0b6d04960f] 15,403,421 452A974B
32. Cryptographic implementations - 333s.mp4 [cebbc6dbfb5a945b] 14,354,228 453F0BC9
33. Cryptographic implementation considerations - 114s.mp4 [367635db380bffe2] 6,627,840 45838647
34. Stream versus block ciphers - 134s.mp4 [2b9303f462774d8d] 4,902,763 1D9F5EF5
35. Symmetric encryption - 347s.mp4 [fd8b9a824d7ece69] 11,498,219 9502CBB1
36. Asymmetric encryption - 203s.mp4 [3a896db8863045ca] 6,673,727 BECDA880
37. Public key infrastructure - 234s.mp4 [3e5039e85be7649c] 7,615,464 BF269CAD
38. Cryptocurrency and blockchain - 102s.mp4 [442bf434d4d56abd] 4,425,245 55AB5E3B
39. Mobile device encryption considerations - 123s.mp4 [2356c7697c5dc4b2] 4,507,709 9A172D61
40. Remote access - 257s.mp4 [7e09f910ced85db] 9,582,941 F16DEF1C
41. Unified communication - 65s.mp4 [9fcefdfc4e986dfa] 2,769,960 D77CC700
42. Web conferencing - 182s.mp4 [503699cc1e354515] 7,115,294 452C6A4F
43. Audio and video conferencing - 164s.mp4 [97bec99ef5a6d63b] 7,755,130 87248002
44. Document and storage collaboration - 181s.mp4 [ca1bc0960e67f838] 7,918,295 00CF701A
45. Presence, instant messaging, and email - 308s.mp4 [d20c3ef247a9cb1d] 13,658,011 162DFB98
46. Telephony and VoIP integration - 193s.mp4 [163feee4094f4901] 8,162,850 7614CAAC
47. Cloud-based collaboration - 128s.mp4 [f2f23ffa3b16e048] 5,902,195 E41AFC12
48. Social media collaboration - 115s.mp4 [1be21abb3e213440] 5,384,581 A32D7E85
49. What next - 189s.mp4 [399ee60c7dc37689] 11,830,514 71D3AC9A

Total size: 400,938,273
RAR Recovery
Not Present
Labels UNKNOWN