CISSP_PPT.zip

上传者: cheney72 | 上传时间: 2021-07-21 21:06:36 | 文件大小: 40.29MB | 文件类型: ZIP
CISSP最新培训讲义,包含安全与风险管理• 资产安全• 安全架构与工程• 通信与网络安全• 身份与访问管理• 安全评估与测试• 安全运营• 软件开发安全八个知识域60多课PPT讲解。

文件下载

资源详情

[{"title":"( 67 个子文件 40.29MB ) CISSP_PPT.zip","children":[{"title":"03-讲义(唐老师)","children":[{"title":"D7-7-系统的恢复和容错能力.pdf <span style='color:#111;'> 530.88KB </span>","children":null,"spread":false},{"title":"D6-2-技术控制措施的评估与测试.pdf <span style='color:#111;'> 934.58KB </span>","children":null,"spread":false},{"title":"D1-6-威胁建模和风险管理框架.pdf <span style='color:#111;'> 792.25KB </span>","children":null,"spread":false},{"title":"D3-3-安全模型和实例.pdf <span style='color:#111;'> 753.68KB </span>","children":null,"spread":false},{"title":"D8-7-恶意代码.pdf <span style='color:#111;'> 518.74KB </span>","children":null,"spread":false},{"title":"D2-7-数据泄露.pdf <span style='color:#111;'> 561.09KB </span>","children":null,"spread":false},{"title":"D2-1-信息生命周期.pdf <span style='color:#111;'> 577.81KB </span>","children":null,"spread":false},{"title":"D8-6-针对应用程序的相关攻击.pdf <span style='color:#111;'> 522.99KB </span>","children":null,"spread":false},{"title":"D4-3-网络组件安全.pdf <span style='color:#111;'> 694.28KB </span>","children":null,"spread":false},{"title":"D7-9-灾难恢复计划测试和其他.pdf <span style='color:#111;'> 504.79KB </span>","children":null,"spread":false},{"title":"D3-11-密钥管理和针对密码学的攻击.pdf <span style='color:#111;'> 545.29KB </span>","children":null,"spread":false},{"title":"D8-2-软件开发生命周期、模型和安全.pdf <span style='color:#111;'> 866.11KB </span>","children":null,"spread":false},{"title":"D5-1-访问控制概述.pdf <span style='color:#111;'> 714.66KB </span>","children":null,"spread":false},{"title":"D4-8-网络与协议安全机制.pdf <span style='color:#111;'> 1.06MB </span>","children":null,"spread":false},{"title":"D2-4-适当的数据保留.pdf <span style='color:#111;'> 648.14KB </span>","children":null,"spread":false},{"title":"讲义链接.docx <span style='color:#111;'> 29.16KB </span>","children":null,"spread":false},{"title":"D5-8-对访问控制的几种威胁和监控.pdf <span style='color:#111;'> 619.59KB </span>","children":null,"spread":false},{"title":"D5-5-联合身份管理和其它相关技术.pdf <span style='color:#111;'> 568.92KB </span>","children":null,"spread":false},{"title":"D3-1-使用安全设计原则实施和管理工程过程.pdf <span style='color:#111;'> 599.00KB </span>","children":null,"spread":false},{"title":"D7-4-配置项管理.pdf <span style='color:#111;'> 576.34KB </span>","children":null,"spread":false},{"title":"D7-6-事件响应和安全监测.pdf <span style='color:#111;'> 699.39KB </span>","children":null,"spread":false},{"title":"D2-3-信息相关的角色和责任.pdf <span style='color:#111;'> 512.27KB </span>","children":null,"spread":false},{"title":"D1-8-业务连续性计划概述.pdf <span style='color:#111;'> 559.51KB </span>","children":null,"spread":false},{"title":"D2-5-保护隐私.pdf <span style='color:#111;'> 605.02KB </span>","children":null,"spread":false},{"title":"D8-1-软件中的安全需求.pdf <span style='color:#111;'> 599.83KB </span>","children":null,"spread":false},{"title":"D8-3-编程语言和环境.pdf <span style='color:#111;'> 524.02KB </span>","children":null,"spread":false},{"title":"D3-2-系统架构和可信计算基.pdf <span style='color:#111;'> 602.92KB </span>","children":null,"spread":false},{"title":"D5-2-身份标识与身份认证技术.pdf <span style='color:#111;'> 694.99KB </span>","children":null,"spread":false},{"title":"D6-3-管理控制措施的评估与测试.pdf <span style='color:#111;'> 623.29KB </span>","children":null,"spread":false},{"title":"D7-3-安全资源配置.pdf <span style='color:#111;'> 868.13KB </span>","children":null,"spread":false},{"title":"D5-3-身份授权和可问责性技术.pdf <span style='color:#111;'> 618.92KB </span>","children":null,"spread":false},{"title":"D3-8-非对称密码学.pdf <span style='color:#111;'> 632.62KB </span>","children":null,"spread":false},{"title":"D8-4-数据库管理.pdf <span style='color:#111;'> 654.92KB </span>","children":null,"spread":false},{"title":"D8-5-Web应用安全.pdf <span style='color:#111;'> 550.81KB </span>","children":null,"spread":false},{"title":"D1-7-法律法规、采购中的风险和安全教育.pdf <span style='color:#111;'> 534.43KB </span>","children":null,"spread":false},{"title":"D3-9-散列算法.pdf <span style='color:#111;'> 894.83KB </span>","children":null,"spread":false},{"title":"D4-6-远程连接.pdf <span style='color:#111;'> 574.22KB </span>","children":null,"spread":false},{"title":"D1-1-安全基本概念.pdf <span style='color:#111;'> 646.10KB </span>","children":null,"spread":false},{"title":"D1-4-安全风险管理概述.pdf <span style='color:#111;'> 732.33KB </span>","children":null,"spread":false},{"title":"D1-9-业务连续性计划项目组成.pdf <span style='color:#111;'> 644.39KB </span>","children":null,"spread":false},{"title":"D6-4-评估与测试报告和管理.pdf <span style='color:#111;'> 512.16KB </span>","children":null,"spread":false},{"title":"D2-6-保护资产.pdf <span style='color:#111;'> 664.32KB </span>","children":null,"spread":false},{"title":"D7-1-安全事件调查和取证.pdf <span style='color:#111;'> 625.24KB </span>","children":null,"spread":false},{"title":"D3-6-密码学定义与概念.pdf <span style='color:#111;'> 843.92KB </span>","children":null,"spread":false},{"title":"D1-3-安全策略体系和安全人员管理.pdf <span style='color:#111;'> 821.97KB </span>","children":null,"spread":false},{"title":"D2-2-信息分类.pdf <span style='color:#111;'> 566.81KB </span>","children":null,"spread":false},{"title":"D4-5-无线网络.pdf <span style='color:#111;'> 860.21KB </span>","children":null,"spread":false},{"title":"D4-2-TCP IP模型和协议.pdf <span style='color:#111;'> 876.87KB </span>","children":null,"spread":false},{"title":"D7-8-灾难恢复计划.pdf <span style='color:#111;'> 639.82KB </span>","children":null,"spread":false},{"title":"D4-7-网络层攻击.pdf <span style='color:#111;'> 609.36KB </span>","children":null,"spread":false},{"title":"D3-7-对称密码学.pdf <span style='color:#111;'> 1010.20KB </span>","children":null,"spread":false},{"title":"D3-13-实施物理安全.pdf <span style='color:#111;'> 539.29KB </span>","children":null,"spread":false},{"title":"D7-5-预防措施.pdf <span style='color:#111;'> 524.53KB </span>","children":null,"spread":false},{"title":"D3-10-密码学应用.pdf <span style='color:#111;'> 1.10MB </span>","children":null,"spread":false},{"title":"D5-7-访问控制方法、技术和管理.pdf <span style='color:#111;'> 560.69KB </span>","children":null,"spread":false},{"title":"D3-5-一些对安全模型和架构的威胁.pdf <span style='color:#111;'> 506.56KB </span>","children":null,"spread":false},{"title":"D4-1-OSI参考模型与多层协议概述.pdf <span style='color:#111;'> 1.40MB </span>","children":null,"spread":false},{"title":"D1-10-业务影响评估.pdf <span style='color:#111;'> 640.37KB </span>","children":null,"spread":false},{"title":"D4-4-网络互联基础和设备.pdf <span style='color:#111;'> 860.21KB </span>","children":null,"spread":false},{"title":"D3-12-站点规划和设计.pdf <span style='color:#111;'> 802.75KB </span>","children":null,"spread":false},{"title":"D1-5-风险评估和处置.pdf <span style='color:#111;'> 945.50KB </span>","children":null,"spread":false},{"title":"D6-1-安全评估与测试概述.pdf <span style='color:#111;'> 565.74KB </span>","children":null,"spread":false},{"title":"D5-6-访问控制模型.pdf <span style='color:#111;'> 536.42KB </span>","children":null,"spread":false},{"title":"D7-2-行政管理和责任.pdf <span style='color:#111;'> 633.30KB </span>","children":null,"spread":false},{"title":"D1-2-安全治理、安全计划和框架.pdf <span style='color:#111;'> 606.20KB </span>","children":null,"spread":false},{"title":"D3-4-系统安全评估模型.pdf <span style='color:#111;'> 625.83KB </span>","children":null,"spread":false},{"title":"D5-4-身份管理和相关技术.pdf <span style='color:#111;'> 1.29MB </span>","children":null,"spread":false}],"spread":false}],"spread":true}]

评论信息

  • jxwpx :
    怎么是PDF,不是说好PPT。要求退费。
    2020-10-17

免责申明

【只为小站】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【只为小站】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【只为小站】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,zhiweidada#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明