filmov
tv
Все публикации
0:03:26
Security Operations 6-11: Vulnerability Validation
0:03:53
Security Operations 6-10: Reporting
0:02:28
Security Operations 6-9: Red Teams and Blue Teams
0:08:16
Security Operations 6-8: Penetration Testing (Pentesting)
0:16:18
Security Operations 6-7: Vulnerability Scanner Settings and Considerations
0:08:11
Security Operations 6-6: Vulnerability Scans
0:05:57
Security Operations 6-5: Discovering Application Vulnerabilities
0:07:24
Security Operations 6-4: Discovering Vulnerabilities
0:12:09
Security Operations 6-3: Common Vulnerability Scoring System (CVSS)
0:03:42
Security Operations 6-2: Common Vulnerabilities and Exposures (CVE)
0:13:47
Security Operations 6-1: Vulnerability Management
0:04:42
Security Operations 6-0: Module Intro
0:07:14
Security Operations 5-5: Decommissioning and Disposal
0:04:45
Security Operations 5-4: Monitoring and Asset tracking
0:02:55
Security Operations 5-3: Assignment and Accounting
0:07:57
Security Operations 5-2: Acquisition and Procurement
0:10:36
Security Operations 5-1: Asset Management
0:02:18
Security Operations 5-0: Module Intro
0:07:14
Security Operations 4-23: Planning and Prioritization
0:03:39
Security Operations 4-22: DEMO: ROI Worksheet
0:09:40
Security Operations 4-21: Calculating Return On Investment (ROI)
0:09:53
Security Operations 4-20: Cost-Benefit Analysis (CBA) Example
0:10:36
Security Operations 4-19: Trade-Off Analysis
0:01:37
Security Operations 4-18: Inherent and Residual Risk
Назад
Вперёд