TorBT - Torrents and Magnet Links Search Engine

Ultimate CISSP Certification Preparation Course 2026

File Name
Size
015_Chapter_15_CISSP_Domain_3_Physical_Security_Part_55/090-Environmental Security.mp4
61 MB
001_Chapter_1_CISSP_Training_Course_Introduction/001-Why Cissp Building The Future Of Global Security Leadership 2026.mp4
35 MB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/002-Cissp Domain 1 Introduction And Key Concepts Overview RUS.srt
33 kB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/002-Cissp Domain 1 Introduction And Key Concepts Overview.mp4
34 MB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/003-The Security Objective And Cia Triad RUS.srt
37 kB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/003-The Security Objective And Cia Triad.mp4
39 MB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/004-Cybersecurity Information Security And Information Assurance RUS.srt
39 kB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/004-Cybersecurity Information Security And Information Assurance.mp4
41 MB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/005-Isc2 Code Of Ethics RUS.srt
31 kB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/005-Isc2 Code Of Ethics.mp4
33 MB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/006-Basic Security Terminologies Security Foundations RUS.srt
32 kB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/006-Basic Security Terminologies Security Foundations.mp4
36 MB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/007-Abstraction Of Cyber Attacks RUS.srt
38 kB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/007-Abstraction Of Cyber Attacks.mp4
39 MB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/008-Security Vulnerabilities RUS.srt
30 kB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/008-Security Vulnerabilities.mp4
33 MB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/009-Bug Bounty Programs RUS.srt
34 kB
002_Chapter_2_CISSP_Domain_1_Security_Foundations_Part_16/009-Bug Bounty Programs.mp4
34 MB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/010-Adversaries And Threat Actors RUS.srt
39 kB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/010-Adversaries And Threat Actors.mp4
41 MB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/011-Apts And Ttps RUS.srt
37 kB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/011-Apts And Ttps.mp4
41 MB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/012-Threat Intelligence And Cert RUS.srt
41 kB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/012-Threat Intelligence And Cert.mp4
40 MB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/013-Digital Risk Protection And Dark Web Monitoring RUS.srt
41 kB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/013-Digital Risk Protection And Dark Web Monitoring.mp4
42 MB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/014-Malware Worm Virus Trojan RUS.srt
36 kB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/014-Malware Worm Virus Trojan.mp4
39 MB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/015-Cyber Attacks Dos And Ddos RUS.srt
38 kB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/015-Cyber Attacks Dos And Ddos.mp4
42 MB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/016-Ddos Protection RUS.srt
42 kB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/016-Ddos Protection.mp4
44 MB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/017-Cyber Attacks Mitm Man In The Middle On Path Attack RUS.srt
34 kB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/017-Cyber Attacks Mitm Man In The Middle On Path Attack.mp4
41 MB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/018-Web Application Attacks Owasp Top 10 RUS.srt
37 kB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/018-Web Application Attacks Owasp Top 10.mp4
39 MB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/019-Web Application Security Cwe Common Weakness Enumeration RUS.srt
31 kB
003_Chapter_3_CISSP_Domain_1_Cyber_Threats_Part_26/019-Web Application Security Cwe Common Weakness Enumeration.mp4
35 MB
004_Chapter_4_CISSP_Domain_1_Privacy_And_Laws_Part_36/020-Security Vs Privacy And Privacy Regulations RUS.srt
44 kB
004_Chapter_4_CISSP_Domain_1_Privacy_And_Laws_Part_36/020-Security Vs Privacy And Privacy Regulations.mp4
43 MB
004_Chapter_4_CISSP_Domain_1_Privacy_And_Laws_Part_36/021-Laws And Legal Regulations RUS.srt
31 kB
004_Chapter_4_CISSP_Domain_1_Privacy_And_Laws_Part_36/021-Laws And Legal Regulations.mp4
32 MB
004_Chapter_4_CISSP_Domain_1_Privacy_And_Laws_Part_36/022-Federal Laws 1 RUS.srt
39 kB
004_Chapter_4_CISSP_Domain_1_Privacy_And_Laws_Part_36/022-Federal Laws 1.mp4
41 MB
004_Chapter_4_CISSP_Domain_1_Privacy_And_Laws_Part_36/023-Federal Laws 2 RUS.srt
41 kB
004_Chapter_4_CISSP_Domain_1_Privacy_And_Laws_Part_36/023-Federal Laws 2.mp4
43 MB
004_Chapter_4_CISSP_Domain_1_Privacy_And_Laws_Part_36/024-Intellectual Property RUS.srt
30 kB
004_Chapter_4_CISSP_Domain_1_Privacy_And_Laws_Part_36/024-Intellectual Property.mp4
31 MB
004_Chapter_4_CISSP_Domain_1_Privacy_And_Laws_Part_36/025-Security Standards And Frameworks RUS.srt
48 kB
004_Chapter_4_CISSP_Domain_1_Privacy_And_Laws_Part_36/025-Security Standards And Frameworks.mp4
51 MB
004_Chapter_4_CISSP_Domain_1_Privacy_And_Laws_Part_36/026-Maturity Assessment Process RUS.srt
34 kB
004_Chapter_4_CISSP_Domain_1_Privacy_And_Laws_Part_36/026-Maturity Assessment Process.mp4
35 MB
005_Chapter_5_CISSP_Domain_1_Security_Controls_Part_46/027-Security Controls RUS.srt
40 kB
005_Chapter_5_CISSP_Domain_1_Security_Controls_Part_46/027-Security Controls.mp4
42 MB
005_Chapter_5_CISSP_Domain_1_Security_Controls_Part_46/028-Security Control Examples Itgcs And Strong Control Concepts RUS.srt
36 kB
005_Chapter_5_CISSP_Domain_1_Security_Controls_Part_46/028-Security Control Examples Itgcs And Strong Control Concepts.mp4
38 MB
005_Chapter_5_CISSP_Domain_1_Security_Controls_Part_46/029-Control Objectives And Compensating Controls RUS.srt
36 kB
005_Chapter_5_CISSP_Domain_1_Security_Controls_Part_46/029-Control Objectives And Compensating Controls.mp4
37 MB
005_Chapter_5_CISSP_Domain_1_Security_Controls_Part_46/030-Defense In Depth Layered Defense Strategy RUS.srt
38 kB
005_Chapter_5_CISSP_Domain_1_Security_Controls_Part_46/030-Defense In Depth Layered Defense Strategy.mp4
42 MB
005_Chapter_5_CISSP_Domain_1_Security_Controls_Part_46/031-Abstraction And Security Through Obscurity RUS.srt
33 kB
005_Chapter_5_CISSP_Domain_1_Security_Controls_Part_46/031-Abstraction And Security Through Obscurity.mp4
37 MB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/032-Security Manager Roles RUS.srt
39 kB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/032-Security Manager Roles.mp4
36 MB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/033-Organizational Structure RUS.srt
34 kB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/033-Organizational Structure.mp4
32 MB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/034-Security Program And Strategy RUS.srt
43 kB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/034-Security Program And Strategy.mp4
47 MB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/035-Governance And Management RUS.srt
30 kB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/035-Governance And Management.mp4
32 MB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/036-Information Security Governance RUS.srt
38 kB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/036-Information Security Governance.mp4
42 MB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/037-Policies RUS.srt
31 kB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/037-Policies.mp4
32 MB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/038-Standards RUS.srt
34 kB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/038-Standards.mp4
36 MB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/039-Procedures And Guidelines RUS.srt
33 kB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/039-Procedures And Guidelines.mp4
38 MB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/040-Policy Development And Review RUS.srt
43 kB
006_Chapter_6_CISSP_Domain_1_Security_Governance_Part_56/040-Policy Development And Review.mp4
46 MB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/041-Risk Management Overview RUS.srt
43 kB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/041-Risk Management Overview.mp4
47 MB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/042-Types Of Risk And Risk Levels RUS.srt
32 kB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/042-Types Of Risk And Risk Levels.mp4
33 MB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/043-Risk Management Frameworks RUS.srt
38 kB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/043-Risk Management Frameworks.mp4
38 MB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/044-Risk Identification RUS.srt
35 kB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/044-Risk Identification.mp4
36 MB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/045-Risk Analysis RUS.srt
21 kB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/045-Risk Analysis.mp4
36 MB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/046-Risk Evaluation And Response RUS.srt
38 kB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/046-Risk Evaluation And Response.mp4
40 MB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/047-Risk Reporting And Monitoring RUS.srt
42 kB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/047-Risk Reporting And Monitoring.mp4
46 MB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/048-Domain 1 Recap RUS.srt
41 kB
007_Chapter_7_CISSP_Domain_1_Risk_Management_Part_66/048-Domain 1 Recap.mp4
40 MB
008_Chapter_8_CISSP_Domain_2_Data_Security_And_Data_Controls_Part_13/049-Cissp Domain 2 Introduction And Key Concepts Overview RUS.srt
29 kB
008_Chapter_8_CISSP_Domain_2_Data_Security_And_Data_Controls_Part_13/049-Cissp Domain 2 Introduction And Key Concepts Overview.mp4
32 MB
008_Chapter_8_CISSP_Domain_2_Data_Security_And_Data_Controls_Part_13/050-Data Lifecycle RUS.srt
30 kB
008_Chapter_8_CISSP_Domain_2_Data_Security_And_Data_Controls_Part_13/050-Data Lifecycle.mp4
28 MB
008_Chapter_8_CISSP_Domain_2_Data_Security_And_Data_Controls_Part_13/051-Data Disposal And Destruction RUS.srt
35 kB
008_Chapter_8_CISSP_Domain_2_Data_Security_And_Data_Controls_Part_13/051-Data Disposal And Destruction.mp4
38 MB
008_Chapter_8_CISSP_Domain_2_Data_Security_And_Data_Controls_Part_13/052-Digital Rights Management RUS.srt
34 kB
008_Chapter_8_CISSP_Domain_2_Data_Security_And_Data_Controls_Part_13/052-Digital Rights Management.mp4
35 MB
008_Chapter_8_CISSP_Domain_2_Data_Security_And_Data_Controls_Part_13/053-Data Security Controls RUS.srt
34 kB
008_Chapter_8_CISSP_Domain_2_Data_Security_And_Data_Controls_Part_13/053-Data Security Controls.mp4
34 MB
009_Chapter_9_CISSP_Domain_2_Asset_Management_And_Protection_Part_23/054-Shadow It RUS.srt
13 kB
009_Chapter_9_CISSP_Domain_2_Asset_Management_And_Protection_Part_23/054-Shadow It.mp4
31 MB
009_Chapter_9_CISSP_Domain_2_Asset_Management_And_Protection_Part_23/055-It Asset Management RUS.srt
36 kB
009_Chapter_9_CISSP_Domain_2_Asset_Management_And_Protection_Part_23/055-It Asset Management.mp4
35 MB
009_Chapter_9_CISSP_Domain_2_Asset_Management_And_Protection_Part_23/056-Roles In Data And Asset Protection RUS.srt
31 kB
009_Chapter_9_CISSP_Domain_2_Asset_Management_And_Protection_Part_23/056-Roles In Data And Asset Protection.mp4
34 MB
009_Chapter_9_CISSP_Domain_2_Asset_Management_And_Protection_Part_23/057-Raci Matrix RUS.srt
30 kB
009_Chapter_9_CISSP_Domain_2_Asset_Management_And_Protection_Part_23/057-Raci Matrix.mp4
33 MB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/058-Social Engineering RUS.srt
32 kB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/058-Social Engineering.mp4
34 MB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/059-Security Awareness Program RUS.srt
29 kB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/059-Security Awareness Program.mp4
31 MB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/060-Personnel Security Measures RUS.srt
38 kB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/060-Personnel Security Measures.mp4
42 MB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/061-Due Care Vs Due Diligence RUS.srt
31 kB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/061-Due Care Vs Due Diligence.mp4
33 MB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/062-Outsourcing RUS.srt
41 kB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/062-Outsourcing.mp4
41 MB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/063-Securing Supply Chain Risk Management RUS.srt
29 kB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/063-Securing Supply Chain Risk Management.mp4
31 MB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/064-A Real Case Study Crowdstrike Outage July 2024 RUS.srt
31 kB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/064-A Real Case Study Crowdstrike Outage July 2024.mp4
32 MB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/065-Domain 2 Recap RUS.srt
37 kB
010_Chapter_10_CISSP_Domain_2_Personnel_And_Vendor_Security_Part_33/065-Domain 2 Recap.mp4
36 MB
011_Chapter_11_CISSP_Domain_3_Cryptography_Basics_Part_15/066-Cissp Domain 3 Introduction And Key Concepts Overview RUS.srt
35 kB
011_Chapter_11_CISSP_Domain_3_Cryptography_Basics_Part_15/066-Cissp Domain 3 Introduction And Key Concepts Overview.mp4
36 MB
011_Chapter_11_CISSP_Domain_3_Cryptography_Basics_Part_15/067-Cryptography Overview RUS.srt
34 kB
011_Chapter_11_CISSP_Domain_3_Cryptography_Basics_Part_15/067-Cryptography Overview.mp4
36 MB
011_Chapter_11_CISSP_Domain_3_Cryptography_Basics_Part_15/068-Cryptography Key Concepts RUS.srt
34 kB
011_Chapter_11_CISSP_Domain_3_Cryptography_Basics_Part_15/068-Cryptography Key Concepts.mp4
35 MB
011_Chapter_11_CISSP_Domain_3_Cryptography_Basics_Part_15/069-Symmetric Encryption Overview RUS.srt
31 kB
011_Chapter_11_CISSP_Domain_3_Cryptography_Basics_Part_15/069-Symmetric Encryption Overview.mp4
33 MB
011_Chapter_11_CISSP_Domain_3_Cryptography_Basics_Part_15/070-Asymmetric Encryption Overview RUS.srt
41 kB
011_Chapter_11_CISSP_Domain_3_Cryptography_Basics_Part_15/070-Asymmetric Encryption Overview.mp4
42 MB
011_Chapter_11_CISSP_Domain_3_Cryptography_Basics_Part_15/071-Asymmetric Encryption In Action RUS.srt
27 kB
011_Chapter_11_CISSP_Domain_3_Cryptography_Basics_Part_15/071-Asymmetric Encryption In Action.mp4
30 MB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/072-Integrity Hashing And Salting RUS.srt
35 kB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/072-Integrity Hashing And Salting.mp4
37 MB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/073-Digital Signature RUS.srt
26 kB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/073-Digital Signature.mp4
28 MB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/074-Digital Certificate RUS.srt
35 kB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/074-Digital Certificate.mp4
38 MB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/075-Pki Public Key Infrastructure RUS.srt
33 kB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/075-Pki Public Key Infrastructure.mp4
36 MB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/076-Ssl Pinning Certificate Pinning RUS.srt
35 kB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/076-Ssl Pinning Certificate Pinning.mp4
37 MB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/077-Ssl And Mtls RUS.srt
31 kB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/077-Ssl And Mtls.mp4
38 MB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/078-Applications Of Encryption RUS.srt
36 kB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/078-Applications Of Encryption.mp4
44 MB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/079-Emerging Cryptographic Technologies RUS.srt
14 kB
012_Chapter_12_CISSP_Domain_3_Cryptography_Applications_Part_25/079-Emerging Cryptographic Technologies.mp4
45 MB
013_Chapter_13_CISSP_Domain_3_Secure_Design_Part_35/080-Secure Design Principles RUS.srt
33 kB
013_Chapter_13_CISSP_Domain_3_Secure_Design_Part_35/080-Secure Design Principles.mp4
41 MB
013_Chapter_13_CISSP_Domain_3_Secure_Design_Part_35/081-Zero Trust Trust But Verify RUS.srt
38 kB
013_Chapter_13_CISSP_Domain_3_Secure_Design_Part_35/081-Zero Trust Trust But Verify.mp4
46 MB
013_Chapter_13_CISSP_Domain_3_Secure_Design_Part_35/082-Trusted Computing Base RUS.srt
31 kB
013_Chapter_13_CISSP_Domain_3_Secure_Design_Part_35/082-Trusted Computing Base.mp4
38 MB
013_Chapter_13_CISSP_Domain_3_Secure_Design_Part_35/083-Side Channel Attack RUS.srt
32 kB
013_Chapter_13_CISSP_Domain_3_Secure_Design_Part_35/083-Side Channel Attack.mp4
40 MB
014_Chapter_14_CISSP_Domain_3_Security_Evaluation_Models_Part_45/084-Information System Modeling Tools RUS.srt
29 kB
014_Chapter_14_CISSP_Domain_3_Security_Evaluation_Models_Part_45/084-Information System Modeling Tools.mp4
34 MB
014_Chapter_14_CISSP_Domain_3_Security_Evaluation_Models_Part_45/085-Security Models Blp And Biba RUS.srt
36 kB
014_Chapter_14_CISSP_Domain_3_Security_Evaluation_Models_Part_45/085-Security Models Blp And Biba.mp4
45 MB
014_Chapter_14_CISSP_Domain_3_Security_Evaluation_Models_Part_45/086-Clark Wilson Brewer Nash And Hru Security Models RUS.srt
33 kB
014_Chapter_14_CISSP_Domain_3_Security_Evaluation_Models_Part_45/086-Clark Wilson Brewer Nash And Hru Security Models.mp4
40 MB
014_Chapter_14_CISSP_Domain_3_Security_Evaluation_Models_Part_45/087-Tcsec Itsec And Common Criteria RUS.srt
43 kB
014_Chapter_14_CISSP_Domain_3_Security_Evaluation_Models_Part_45/087-Tcsec Itsec And Common Criteria.mp4
56 MB
015_Chapter_15_CISSP_Domain_3_Physical_Security_Part_55/088-Security Facility Design RUS.srt
36 kB
015_Chapter_15_CISSP_Domain_3_Physical_Security_Part_55/088-Security Facility Design.mp4
46 MB
015_Chapter_15_CISSP_Domain_3_Physical_Security_Part_55/089-Physical Security Control RUS.srt
37 kB
015_Chapter_15_CISSP_Domain_3_Physical_Security_Part_55/089-Physical Security Control.mp4
45 MB
015_Chapter_15_CISSP_Domain_3_Physical_Security_Part_55/090-Environmental Security RUS.srt
54 kB
001_Chapter_1_CISSP_Training_Course_Introduction/001-Why Cissp Building The Future Of Global Security Leadership 2026 RUS.srt
34 kB
015_Chapter_15_CISSP_Domain_3_Physical_Security_Part_55/091-Secure Area Policies RUS.srt
33 kB
015_Chapter_15_CISSP_Domain_3_Physical_Security_Part_55/091-Secure Area Policies.mp4
43 MB
015_Chapter_15_CISSP_Domain_3_Physical_Security_Part_55/092-Domain 3 Recap RUS.srt
35 kB
015_Chapter_15_CISSP_Domain_3_Physical_Security_Part_55/092-Domain 3 Recap.mp4
44 MB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/093-Cissp Domain 4 Introduction And Key Concepts Overview RUS.srt
34 kB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/093-Cissp Domain 4 Introduction And Key Concepts Overview.mp4
42 MB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/094-Introduction To It Networks And Networking Basic Concepts RUS.srt
47 kB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/094-Introduction To It Networks And Networking Basic Concepts.mp4
53 MB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/095-Osi And Tcpip Models Overview RUS.srt
47 kB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/095-Osi And Tcpip Models Overview.mp4
49 MB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/096-Explaining Osi Lower Layers Physical Layer RUS.srt
46 kB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/096-Explaining Osi Lower Layers Physical Layer.mp4
46 MB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/097-Explaining Osi Lower Layers Data Link Layer RUS.srt
35 kB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/097-Explaining Osi Lower Layers Data Link Layer.mp4
37 MB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/098-Network Addresses And Arp Protocol RUS.srt
34 kB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/098-Network Addresses And Arp Protocol.mp4
37 MB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/099-Explaining Osi Lower Layers Network Layer RUS.srt
42 kB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/099-Explaining Osi Lower Layers Network Layer.mp4
42 MB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/100-Explaining Osi Higher Layers Transport To Application RUS.srt
44 kB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/100-Explaining Osi Higher Layers Transport To Application.mp4
42 MB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/101-Communication Types Unicast Multicast Broadcast RUS.srt
31 kB
016_Chapter_16_CISSP_Domain_4_IT_Network_Foundations_Part_13/101-Communication Types Unicast Multicast Broadcast.mp4
31 MB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/102-Wireless And Radio Frequencybased Communication RUS.srt
38 kB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/102-Wireless And Radio Frequencybased Communication.mp4
41 MB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/103-Routing And Routed Protocols RUS.srt
36 kB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/103-Routing And Routed Protocols.mp4
36 MB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/104-Dns Dnssec And Dns Threats And Mitigation RUS.srt
37 kB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/104-Dns Dnssec And Dns Threats And Mitigation.mp4
40 MB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/105-Converged Networks And Voip Poe And Qos RUS.srt
32 kB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/105-Converged Networks And Voip Poe And Qos.mp4
33 MB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/106-Homing And Network Redundancy RUS.srt
37 kB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/106-Homing And Network Redundancy.mp4
38 MB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/107-Air Gap In Band And Out Of Band Oob Concepts RUS.srt
35 kB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/107-Air Gap In Band And Out Of Band Oob Concepts.mp4
35 MB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/108-Sdn Software Defined Network Overview RUS.srt
35 kB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/108-Sdn Software Defined Network Overview.mp4
36 MB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/109-Practical Sdn Applications RUS.srt
40 kB
017_Chapter_17_CISSP_Domain_4_Advanced_Network_Concepts_Part_23/109-Practical Sdn Applications.mp4
43 MB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/110-Network Load Balancer RUS.srt
32 kB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/110-Network Load Balancer.mp4
32 MB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/111-Network Segmentation RUS.srt
32 kB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/111-Network Segmentation.mp4
33 MB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/112-Layer 2 Attacks Wired Network Attacks And Countermeasures RUS.srt
46 kB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/112-Layer 2 Attacks Wired Network Attacks And Countermeasures.mp4
46 MB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/113-Wireless Network Security RUS.srt
47 kB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/113-Wireless Network Security.mp4
47 MB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/114-Firewalls Overview RUS.srt
40 kB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/114-Firewalls Overview.mp4
39 MB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/115-Dmz And Bastion Host RUS.srt
31 kB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/115-Dmz And Bastion Host.mp4
33 MB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/116-Intrusion Prevention And Detection Systems RUS.srt
33 kB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/116-Intrusion Prevention And Detection Systems.mp4
35 MB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/117-Proxy And Content Filtering RUS.srt
33 kB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/117-Proxy And Content Filtering.mp4
32 MB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/118-Email Security RUS.srt
32 kB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/118-Email Security.mp4
34 MB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/119-Secure Communication Channels RUS.srt
34 kB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/119-Secure Communication Channels.mp4
37 MB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/120-Ot And Ics Security Best Practices RUS.srt
39 kB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/120-Ot And Ics Security Best Practices.mp4
44 MB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/121-Ssl Decryption And Offloading RUS.srt
38 kB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/121-Ssl Decryption And Offloading.mp4
39 MB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/122-Packet Broker RUS.srt
39 kB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/122-Packet Broker.mp4
41 MB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/123-Noc And Monitoring RUS.srt
37 kB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/123-Noc And Monitoring.mp4
40 MB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/124-Domain 4 Recap RUS.srt
32 kB
018_Chapter_18_CISSP_Domain_4_Network_Security_Part_33/124-Domain 4 Recap.mp4
34 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/125-Cissp Domain 5 Introduction And Key Concepts Overview RUS.srt
32 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/125-Cissp Domain 5 Introduction And Key Concepts Overview.mp4
33 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/126-Iam Function RUS.srt
41 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/126-Iam Function.mp4
42 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/127-Aaa Overview RUS.srt
41 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/127-Aaa Overview.mp4
46 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/128-Mfa And Biometric Authentication RUS.srt
33 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/128-Mfa And Biometric Authentication.mp4
34 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/129-Passwordless Authentication Methods RUS.srt
38 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/129-Passwordless Authentication Methods.mp4
38 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/130-Sso And Rso Single Sign On And Reduced Sign On Concepts RUS.srt
30 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/130-Sso And Rso Single Sign On And Reduced Sign On Concepts.mp4
32 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/131-Access Control Concepts RUS.srt
32 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/131-Access Control Concepts.mp4
31 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/132-Authorization And Access Control Models RUS.srt
33 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/132-Authorization And Access Control Models.mp4
34 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/133-Accounting And Auditing RUS.srt
36 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/133-Accounting And Auditing RUS_2.srt
11 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/133-Accounting And Auditing.mp4
36 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/134-Identity And Access Management Protocols And Solutions RUS.srt
39 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/134-Identity And Access Management Protocols And Solutions.mp4
40 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/135-Ldap Server Active Directory RUS.srt
37 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/135-Ldap Server Active Directory.mp4
39 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/136-Password Attacks And Countermeasures RUS.srt
48 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/136-Password Attacks And Countermeasures.mp4
51 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/137-Separation Of Duties Sod RUS.srt
27 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/137-Separation Of Duties Sod.mp4
31 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/138-Manage Privileged Accounts RUS.srt
38 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/138-Manage Privileged Accounts.mp4
41 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/139-Understand Pam Solutions RUS.srt
36 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/139-Understand Pam Solutions.mp4
38 MB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/140-Domain 5 Recap RUS.srt
41 kB
019_Chapter_19_CISSP_Domain_5_Identity_And_Access_Management_IAM/140-Domain 5 Recap.mp4
48 MB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/141-Cissp Domain 6 Introduction And Key Concepts Overview RUS.srt
31 kB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/141-Cissp Domain 6 Introduction And Key Concepts Overview.mp4
31 MB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/142-Security Testing Assessment And Auditing RUS.srt
35 kB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/142-Security Testing Assessment And Auditing.mp4
43 MB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/143-Information System Auditing RUS.srt
28 kB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/143-Information System Auditing.mp4
28 MB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/144-Vulnerability And Patch Management RUS.srt
29 kB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/144-Vulnerability And Patch Management.mp4
31 MB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/145-Penetration Testing RUS.srt
37 kB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/145-Penetration Testing.mp4
40 MB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/146-Threat Modeling Overview RUS.srt
35 kB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/146-Threat Modeling Overview.mp4
36 MB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/147-Service Organization Controls Soc Audit RUS.srt
30 kB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/147-Service Organization Controls Soc Audit.mp4
32 MB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/148-Pci Dss Overview RUS.srt
31 kB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/148-Pci Dss Overview.mp4
34 MB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/149-Pci Dss Requirements RUS.srt
38 kB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/149-Pci Dss Requirements.mp4
41 MB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/150-Nist Csf Overview RUS.srt
33 kB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/150-Nist Csf Overview.mp4
35 MB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/151-Nist Csf RUS.srt
49 kB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/151-Nist Csf.mp4
51 MB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/152-Quality Assurance And Quality Control RUS.srt
38 kB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/152-Quality Assurance And Quality Control.mp4
37 MB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/153-Performance Management RUS.srt
43 kB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/153-Performance Management.mp4
45 MB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/154-Key Performance Indicators Kpi Kgi Kci RUS.srt
41 kB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/154-Key Performance Indicators Kpi Kgi Kci.mp4
42 MB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/155-Domain 6 Recap RUS.srt
33 kB
020_Chapter_20_CISSP_Domain_6_Security_Assessment_And_Testing/155-Domain 6 Recap.mp4
34 MB
021_Chapter_21_CISSP_Domain_7_Security_Operations_Part_14/156-Cissp Domain 7 Introduction And Key Concepts Overview RUS.srt
33 kB
021_Chapter_21_CISSP_Domain_7_Security_Operations_Part_14/156-Cissp Domain 7 Introduction And Key Concepts Overview.mp4
34 MB
021_Chapter_21_CISSP_Domain_7_Security_Operations_Part_14/157-Change Management Process RUS.srt
38 kB
021_Chapter_21_CISSP_Domain_7_Security_Operations_Part_14/157-Change Management Process.mp4
39 MB
021_Chapter_21_CISSP_Domain_7_Security_Operations_Part_14/158-Release Management RUS.srt
34 kB
021_Chapter_21_CISSP_Domain_7_Security_Operations_Part_14/158-Release Management.mp4
34 MB
021_Chapter_21_CISSP_Domain_7_Security_Operations_Part_14/159-Configuration Management RUS.srt
32 kB
021_Chapter_21_CISSP_Domain_7_Security_Operations_Part_14/159-Configuration Management.mp4
33 MB
021_Chapter_21_CISSP_Domain_7_Security_Operations_Part_14/160-Financial Portfolio Capacity And Supplier Management RUS.srt
38 kB
021_Chapter_21_CISSP_Domain_7_Security_Operations_Part_14/160-Financial Portfolio Capacity And Supplier Management.mp4
48 MB
021_Chapter_21_CISSP_Domain_7_Security_Operations_Part_14/161-Capex And Opex And Roi And Rosi RUS.srt
37 kB
021_Chapter_21_CISSP_Domain_7_Security_Operations_Part_14/161-Capex And Opex And Roi And Rosi.mp4
35 MB
022_Chapter_22_CISSP_Domain_7_Security_Operations_Part_24/162-Incident Management Overview RUS.srt
37 kB
022_Chapter_22_CISSP_Domain_7_Security_Operations_Part_24/162-Incident Management Overview.mp4
39 MB
022_Chapter_22_CISSP_Domain_7_Security_Operations_Part_24/163-Incident Response Plan RUS.srt
39 kB
022_Chapter_22_CISSP_Domain_7_Security_Operations_Part_24/163-Incident Response Plan.mp4
41 MB
022_Chapter_22_CISSP_Domain_7_Security_Operations_Part_24/164-Collecting Digital Evidence And Forensics RUS.srt
31 kB
022_Chapter_22_CISSP_Domain_7_Security_Operations_Part_24/164-Collecting Digital Evidence And Forensics.mp4
33 MB
022_Chapter_22_CISSP_Domain_7_Security_Operations_Part_24/165-Incident Response Training RUS.srt
31 kB
022_Chapter_22_CISSP_Domain_7_Security_Operations_Part_24/165-Incident Response Training.mp4
31 MB
022_Chapter_22_CISSP_Domain_7_Security_Operations_Part_24/166-Communication During Incidents RUS.srt
35 kB
022_Chapter_22_CISSP_Domain_7_Security_Operations_Part_24/166-Communication During Incidents.mp4
37 MB
022_Chapter_22_CISSP_Domain_7_Security_Operations_Part_24/167-Post Incident Activities RUS.srt
26 kB
022_Chapter_22_CISSP_Domain_7_Security_Operations_Part_24/167-Post Incident Activities.mp4
28 MB
022_Chapter_22_CISSP_Domain_7_Security_Operations_Part_24/168-Incident Response Review And Evaluation RUS.srt
28 kB
022_Chapter_22_CISSP_Domain_7_Security_Operations_Part_24/168-Incident Response Review And Evaluation.mp4
30 MB
023_Chapter_23_CISSP_Domain_7_Security_Operations_Part_34/169-Security Operations Center Soc RUS.srt
34 kB
023_Chapter_23_CISSP_Domain_7_Security_Operations_Part_34/169-Security Operations Center Soc.mp4
34 MB
023_Chapter_23_CISSP_Domain_7_Security_Operations_Part_34/170-Siem Architecture And Monitoring Protocols RUS.srt
41 kB
023_Chapter_23_CISSP_Domain_7_Security_Operations_Part_34/170-Siem Architecture And Monitoring Protocols.mp4
43 MB
023_Chapter_23_CISSP_Domain_7_Security_Operations_Part_34/171-Endpoint Security Software RUS.srt
42 kB
023_Chapter_23_CISSP_Domain_7_Security_Operations_Part_34/171-Endpoint Security Software.mp4
43 MB
023_Chapter_23_CISSP_Domain_7_Security_Operations_Part_34/172-Edr Ndr Xdr And Soar RUS.srt
34 kB
023_Chapter_23_CISSP_Domain_7_Security_Operations_Part_34/172-Edr Ndr Xdr And Soar.mp4
36 MB
023_Chapter_23_CISSP_Domain_7_Security_Operations_Part_34/173-File Integrity Monitoring Fim RUS.srt
34 kB
023_Chapter_23_CISSP_Domain_7_Security_Operations_Part_34/173-File Integrity Monitoring Fim.mp4
37 MB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/174-What Is Disaster And Bia RUS.srt
31 kB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/174-What Is Disaster And Bia.mp4
36 MB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/175-Disaster Recovery Plan RUS.srt
33 kB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/175-Disaster Recovery Plan.mp4
36 MB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/176-Business Continuity Plan RUS.srt
38 kB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/176-Business Continuity Plan.mp4
39 MB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/177-Rpo And Rto And Recovery Metrics RUS.srt
43 kB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/177-Rpo And Rto And Recovery Metrics.mp4
44 MB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/178-Recovery Strategies And Alternate Processing Facilities RUS.srt
37 kB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/178-Recovery Strategies And Alternate Processing Facilities.mp4
36 MB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/179-Bcp Testing And Evaluation RUS.srt
36 kB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/179-Bcp Testing And Evaluation.mp4
38 MB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/180-Data Backup RUS.srt
38 kB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/180-Data Backup.mp4
39 MB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/181-Storage Redundancy Using Raid RUS.srt
38 kB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/181-Storage Redundancy Using Raid.mp4
39 MB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/182-Domain 7 Recap RUS.srt
33 kB
024_Chapter_24_CISSP_Domain_7_Security_Operations_Part_44/182-Domain 7 Recap.mp4
33 MB
025_Chapter_25_CISSP_Domain_8_Software_Development_Security_Part_14/183-Cissp Domain 8 Introduction And Key Concepts Overview RUS.srt
31 kB
025_Chapter_25_CISSP_Domain_8_Software_Development_Security_Part_14/183-Cissp Domain 8 Introduction And Key Concepts Overview.mp4
32 MB
025_Chapter_25_CISSP_Domain_8_Software_Development_Security_Part_14/184-Software Development Methodologies RUS.srt
34 kB
025_Chapter_25_CISSP_Domain_8_Software_Development_Security_Part_14/184-Software Development Methodologies.mp4
35 MB
025_Chapter_25_CISSP_Domain_8_Software_Development_Security_Part_14/185-Devops And Cicd RUS.srt
32 kB
025_Chapter_25_CISSP_Domain_8_Software_Development_Security_Part_14/185-Devops And Cicd.mp4
35 MB
025_Chapter_25_CISSP_Domain_8_Software_Development_Security_Part_14/186-Devsecops RUS.srt
31 kB
025_Chapter_25_CISSP_Domain_8_Software_Development_Security_Part_14/186-Devsecops.mp4
34 MB
025_Chapter_25_CISSP_Domain_8_Software_Development_Security_Part_14/187-Software Defined Security Sds RUS.srt
46 kB
025_Chapter_25_CISSP_Domain_8_Software_Development_Security_Part_14/187-Software Defined Security Sds.mp4
43 MB
025_Chapter_25_CISSP_Domain_8_Software_Development_Security_Part_14/188-Software Testing RUS.srt
39 kB
025_Chapter_25_CISSP_Domain_8_Software_Development_Security_Part_14/188-Software Testing.mp4
45 MB
025_Chapter_25_CISSP_Domain_8_Software_Development_Security_Part_14/189-What Is An Api RUS.srt
36 kB
025_Chapter_25_CISSP_Domain_8_Software_Development_Security_Part_14/189-What Is An Api.mp4
41 MB
026_Chapter_26_CISSP_Domain_8_Software_Development_Security_Part_24/190-Version Control Systems And Code Repositories RUS.srt
34 kB
026_Chapter_26_CISSP_Domain_8_Software_Development_Security_Part_24/190-Version Control Systems And Code Repositories.mp4
43 MB
026_Chapter_26_CISSP_Domain_8_Software_Development_Security_Part_24/191-Application Security Testing RUS.srt
37 kB
026_Chapter_26_CISSP_Domain_8_Software_Development_Security_Part_24/191-Application Security Testing.mp4
44 MB
026_Chapter_26_CISSP_Domain_8_Software_Development_Security_Part_24/192-Secure Coding Practices RUS.srt
40 kB
026_Chapter_26_CISSP_Domain_8_Software_Development_Security_Part_24/192-Secure Coding Practices.mp4
51 MB
026_Chapter_26_CISSP_Domain_8_Software_Development_Security_Part_24/193-Certification Vs Accreditation And Authorization To Operate RUS.srt
34 kB
026_Chapter_26_CISSP_Domain_8_Software_Development_Security_Part_24/193-Certification Vs Accreditation And Authorization To Operate.mp4
44 MB
026_Chapter_26_CISSP_Domain_8_Software_Development_Security_Part_24/194-Software Project Acquisition Steps RUS.srt
35 kB
026_Chapter_26_CISSP_Domain_8_Software_Development_Security_Part_24/194-Software Project Acquisition Steps.mp4
42 MB
026_Chapter_26_CISSP_Domain_8_Software_Development_Security_Part_24/195-Project Management Tools Gantt Pert Cpm Timeboxing RUS.srt
30 kB
026_Chapter_26_CISSP_Domain_8_Software_Development_Security_Part_24/195-Project Management Tools Gantt Pert Cpm Timeboxing.mp4
38 MB
027_Chapter_27_CISSP_Domain_8_Software_Development_Security_Part_34/196-Database Overview RUS.srt
33 kB
027_Chapter_27_CISSP_Domain_8_Software_Development_Security_Part_34/196-Database Overview.mp4
38 MB
027_Chapter_27_CISSP_Domain_8_Software_Development_Security_Part_34/197-Database Security RUS.srt
36 kB
027_Chapter_27_CISSP_Domain_8_Software_Development_Security_Part_34/197-Database Security.mp4
43 MB
027_Chapter_27_CISSP_Domain_8_Software_Development_Security_Part_34/198-Database Resiliency And Data Availability RUS.srt
37 kB
027_Chapter_27_CISSP_Domain_8_Software_Development_Security_Part_34/198-Database Resiliency And Data Availability.mp4
44 MB
027_Chapter_27_CISSP_Domain_8_Software_Development_Security_Part_34/199-Transparent Data Encryption Tde RUS.srt
36 kB
027_Chapter_27_CISSP_Domain_8_Software_Development_Security_Part_34/199-Transparent Data Encryption Tde.mp4
46 MB
027_Chapter_27_CISSP_Domain_8_Software_Development_Security_Part_34/200-Virtualization And Sddc RUS.srt
36 kB
027_Chapter_27_CISSP_Domain_8_Software_Development_Security_Part_34/200-Virtualization And Sddc.mp4
44 MB
027_Chapter_27_CISSP_Domain_8_Software_Development_Security_Part_34/201-Containers And Microservices RUS.srt
37 kB
027_Chapter_27_CISSP_Domain_8_Software_Development_Security_Part_34/201-Containers And Microservices.mp4
45 MB
027_Chapter_27_CISSP_Domain_8_Software_Development_Security_Part_34/202-Serverless Computing RUS.srt
38 kB
027_Chapter_27_CISSP_Domain_8_Software_Development_Security_Part_34/202-Serverless Computing.mp4
46 MB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/203-Cloud Computing RUS.srt
41 kB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/203-Cloud Computing.mp4
49 MB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/204-Cloud Deployment Models RUS.srt
37 kB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/204-Cloud Deployment Models.mp4
47 MB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/205-Cloud Service Models RUS.srt
39 kB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/205-Cloud Service Models.mp4
48 MB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/206-Cloud Shared Responsibility Matrix RUS.srt
39 kB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/206-Cloud Shared Responsibility Matrix.mp4
49 MB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/207-Cloud Contracts RUS.srt
38 kB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/207-Cloud Contracts.mp4
48 MB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/208-Sase And Casb Overview RUS.srt
36 kB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/208-Sase And Casb Overview.mp4
45 MB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/209-Cdn Content Delivery Network RUS.srt
34 kB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/209-Cdn Content Delivery Network.mp4
41 MB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/210-Embedded Systems Iot Edge Computing And Hpc RUS.srt
36 kB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/210-Embedded Systems Iot Edge Computing And Hpc.mp4
43 MB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/211-Quantum Computing Overview RUS.srt
32 kB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/211-Quantum Computing Overview.mp4
41 MB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/212-Domain 8 Recap RUS.srt
40 kB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/212-Domain 8 Recap.mp4
46 MB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/213-Cissp Exam Format And How To Get Certified RUS.srt
33 kB
028_Chapter_28_CISSP_Domain_8_Software_Development_Security_Part_44/213-Cissp Exam Format And How To Get Certified.mp4
45 MB