12-25-2024, 09:12 PM
859.31 MB | 00:27:23 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English
Files Included :
01 course-introduction.mp4 (20.5 MB)
01 five-principles-to-follow-and-one-to-avoid.mp4 (68.84 MB)
02 fundamentals-of-confidentiality-integrity-and-availability.mp4 (55.91 MB)
03 roles-and-tools.mp4 (61.54 MB)
01 who-are-you-identity-and-access-management-really-wants-to-know.mp4 (133.62 MB)
02 endpoints-are-the-it-front-door-guard-them.mp4 (62.34 MB)
01 network-security.mp4 (135.63 MB)
02 lab-demo.mp4 (5.28 MB)
03 application-security.mp4 (86.76 MB)
04 data-security.mp4 (70.19 MB)
01 detection.mp4 (77.55 MB)
02 response.mp4 (80.85 MB)]
Screenshot
01 course-introduction.mp4 (20.5 MB)
01 five-principles-to-follow-and-one-to-avoid.mp4 (68.84 MB)
02 fundamentals-of-confidentiality-integrity-and-availability.mp4 (55.91 MB)
03 roles-and-tools.mp4 (61.54 MB)
01 who-are-you-identity-and-access-management-really-wants-to-know.mp4 (133.62 MB)
02 endpoints-are-the-it-front-door-guard-them.mp4 (62.34 MB)
01 network-security.mp4 (135.63 MB)
02 lab-demo.mp4 (5.28 MB)
03 application-security.mp4 (86.76 MB)
04 data-security.mp4 (70.19 MB)
01 detection.mp4 (77.55 MB)
02 response.mp4 (80.85 MB)]
Screenshot