RAR-files |
lynda.casp.cert.prep.5.research.development.and.collaboration-apollo.rar |
50,000,000 |
06D4B44D |
lynda.casp.cert.prep.5.research.development.and.collaboration-apollo.r00 |
50,000,000 |
525B78DA |
lynda.casp.cert.prep.5.research.development.and.collaboration-apollo.r01 |
50,000,000 |
458F4179 |
lynda.casp.cert.prep.5.research.development.and.collaboration-apollo.r02 |
50,000,000 |
C9128527 |
lynda.casp.cert.prep.5.research.development.and.collaboration-apollo.r03 |
50,000,000 |
F6F639B4 |
lynda.casp.cert.prep.5.research.development.and.collaboration-apollo.r04 |
13,170,624 |
B2E19335 |
|
Total size: |
263,170,624 |
|
|
Archived
files |
01. Research, development, and enterprise cybersecurity - 92s.mp4
[baff7707a5871255]
|
4,195,118 |
B7C0EB72 |
02. What you should know - 87s.mp4
[84b8edc7ed6d45b8]
|
2,174,977 |
5C690F8E |
03. About the exam - 108s.mp4
[895136b5b9ad63c0]
|
3,876,661 |
14DFF9E7 |
04. Conducting research - 376s.mp4
[435d9dc3ad7c4beb]
|
14,248,622 |
555A64EE |
05. Threat intelligence on latest attacks - 181s.mp4
[346338ad64495cd8]
|
9,226,412 |
C99C203D |
06. Current threats and threat models - 119s.mp4
[3c00733bbe6fb66]
|
3,027,768 |
603276A4 |
07. Zero-day mitigation controls - 147s.mp4
[b692578298a43436]
|
4,628,312 |
EB3F2D1C |
08. Emerging social media platforms - 76s.mp4
[8901c3fa8c434324]
|
2,797,911 |
74541D62 |
09. Big data and artificial intelligence - 231s.mp4
[9a53e839ec0fcba4]
|
8,594,567 |
FD0EBDC9 |
10. Integration research within the business - 135s.mp4
[98089a52140fbfbb]
|
5,498,349 |
E39E3072 |
11. Computer emergency response team (CERT) - 97s.mp4
[726f8ef58b16e251]
|
4,250,287 |
D946C8A4 |
12. Conferences, conventions, consultants, and vendors - 121s.mp4
[aaaf187e8dfd8d2c]
|
5,358,594 |
31451C43 |
13. Threat actor activities - 140s.mp4
[912cc5b1648f77c2]
|
4,902,576 |
210FF68F |
14. Emerging threat sources - 85s.mp4
[3991fbed9cf46183]
|
5,531,307 |
AD8FCB9D |
15. Systems development life cycle - 276s.mp4
[152ee6826d256be5]
|
11,106,648 |
13A1FC20 |
16. Operational activities - 259s.mp4
[d49dd1ca5a9f88f9]
|
11,940,670 |
7639F389 |
17. Asset disposal and asset reuse - 201s.mp4
[13cb45b109290646]
|
6,815,919 |
ABE9F1E7 |
18. Software development life cycle - 252s.mp4
[f3d1a881ad8359a0]
|
9,873,477 |
3461F2D3 |
19. Application security frameworks - 69s.mp4
[e871ed3fa8bf8475]
|
4,147,716 |
23F315C5 |
20. Software assurance - 572s.mp4
[f2d59b7d106ade1d]
|
17,703,898 |
CAF9C658 |
21. Approaches to development - 345s.mp4
[20dbacc24fc799f1]
|
9,511,255 |
43E4BED3 |
22. Secure coding standards - 57s.mp4
[7223f0bd85de0b10]
|
1,760,088 |
D6989AE3 |
23. Documentation - 210s.mp4
[b4a3a7f88027a624]
|
5,897,731 |
CE52F327 |
24. Validation and acceptance testing - 171s.mp4
[18cbae74aa97def0]
|
4,908,034 |
FB1F6DA9 |
25. Adapting solutions to meet a need - 189s.mp4
[25c7d47356ebb083]
|
5,956,613 |
59913EFB |
26. Asset management and inventory control - 260s.mp4
[74b78f0950a5aa7]
|
12,189,780 |
23CEE8AE |
27. Collaboration across business units - 113s.mp4
[43a43d9c1841cc0b]
|
4,286,231 |
9236AA0E |
28. Sales staff - 98s.mp4
[4ed3e8749ed3f162]
|
4,788,907 |
50BABA98 |
29. Programmer - 66s.mp4
[a78ee8b2dddad00f]
|
3,712,002 |
C42E8F24 |
30. Database administrator - 106s.mp4
[5e7c7a95ea92ae08]
|
5,224,452 |
3AAA0511 |
31. Network administrator - 111s.mp4
[1241c97f35848124]
|
4,242,092 |
EBFA9D1A |
32. Management and executive management - 274s.mp4
[ace4de37e32535c4]
|
10,414,892 |
17847C7F |
33. Financial - 87s.mp4
[bdc41fa0b5083331]
|
4,917,292 |
8BA63E01 |
34. Human resources - 62s.mp4
[7fe467ad457a5e4f]
|
1,947,091 |
CD28311D |
35. Emergency response team - 97s.mp4
[775d0cb845e7001f]
|
3,918,852 |
DBDB6168 |
36. Facilities manager - 91s.mp4
[cfaddde2bb54b4c6]
|
3,026,608 |
2013CF8C |
37. Physical security manager - 82s.mp4
[3ca3e4328f0692d3]
|
4,585,988 |
E06AACB4 |
38. Legal counsel - 109s.mp4
[813543d2237f8255]
|
5,336,069 |
A29F0E5B |
39. Governance, risk, and compliance committee - 158s.mp4
[2bd493acef73b0ee]
|
5,544,452 |
E2C03639 |
40. Providing guidance to senior management - 177s.mp4
[f1fe13d88d78d149]
|
6,944,907 |
B043B945 |
41. Effective collaboration to implement security solutions - 137s.mp4
[fbe9d4a26158fb50]
|
5,106,482 |
20C3E304 |
42. What to do next - 169s.mp4
[7d6700ba06bd1a12]
|
9,047,032 |
32AC3D91 |
|
Total size: |
263,166,639 |
|
|