Pluralsight - ISO_IEC 27001 Information Security_ The Big Picture

seeders: 16
leechers: 13
Added on June 6, 2016 by XXXIII33in Other > Tutorials
Torrent verified.



Pluralsight - ISO_IEC 27001 Information Security_ The Big Picture (Size: 271.75 MB)
 001 - Course Overview - Course Overview.mp47.84 MB
 002 - Why ISO_IEC 27001 Is so Important - Overview.mp43.46 MB
 003 - Why ISO_IEC 27001 Is so Important - What Is the ISO_IEC 27001_.mp48.16 MB
 004 - Why ISO_IEC 27001 Is so Important - Controls and Domains.mp47.08 MB
 005 - Why ISO_IEC 27001 Is so Important - ISO_IEC 27001 History and Difference to Other...7.35 MB
 006 - Why ISO_IEC 27001 Is so Important - Being Certified - Requirements and Benefits.mp48.78 MB
 007 - Why ISO_IEC 27001 Is so Important - Demo.mp41.28 MB
 008 - Why ISO_IEC 27001 Is so Important - Purchasing the ISO_IEC 27001 Documentation.mp49.84 MB
 009 - Why ISO_IEC 27001 Is so Important - Sample Certificates from AWS, Dropbox, and Microsoft.mp416.92 MB
 010 - Why ISO_IEC 27001 Is so Important - Case Study and Summary.mp44.22 MB
 011 - Understanding the Standard’s Structure - Module Overview.mp43.61 MB
 012 - Understanding the Standard’s Structure - Structure of the Standard Document.mp43.86 MB
 013 - Understanding the Standard’s Structure - Clauses 4-10.mp48.1 MB
 014 - Understanding the Standard’s Structure - Annex A.mp45.57 MB
 015 - Understanding the Standard’s Structure - Establishing Scope.mp410.65 MB
 016 - Understanding the Standard’s Structure - Risk Assessment.mp45.12 MB
 017 - Understanding the Standard’s Structure - Determining the Applicability of Controls.mp44.8 MB
 018 - Understanding the Standard’s Structure - Mandatory Document and Records.mp410.13 MB
 019 - Understanding the Standard’s Structure - Demo - Establishing Scope.mp412.06 MB
 020 - Understanding the Standard’s Structure - Demo - Creating a Statement of Applicability.mp413.85 MB
 021 - Understanding the Standard’s Structure - Module Summary.mp41.45 MB
 022 - Certification Life Cycle - Attaining Your Certification - Module Overview.mp42.3 MB
 023 - Certification Life Cycle - Attaining Your Certification - Map of Certification.mp46.08 MB
 024 - Certification Life Cycle - Attaining Your Certification - The Audit and Audit Findings.mp47.59 MB
 025 - Certification Life Cycle - Attaining Your Certification - Audit Findings.mp47.71 MB
 026 - Certification Life Cycle - Attaining Your Certification - Stage 1 and Stage 2 Audit.mp49.33 MB
 027 - Certification Life Cycle - Attaining Your Certification - Certification Timeframes.mp45.58 MB
 028 - Certification Life Cycle - Attaining Your Certification - Module Summary.mp42.01 MB
 029 - Certification Life Cycle - Retaining Your Certification - Module Overview.mp42.15 MB
 030 - Certification Life Cycle - Retaining Your Certification - Frequency of Surveillance Audit.mp420.76 MB

Description

Ethical Hacking: Buffer Overflow
by James D. Murray

Buffer overflow is a topic that only software developers using low-level programming languages really get an opportunity to fully understand. However, IT security professionals are increasingly called upon to better understand how vulnerabilities created by poor software design and implementation practices can be exploited to create security issues in systems and networks. The problem is that most IT professionals do not have the extensive software development background needed to tackle the subject of buffer overflow. This course breaks down the technical subjects of computer memory management, controlling code, and data inside of a running program, and exploiting poor quality software into terms that IT people with no software development experience can understand. Also examined are ways to prevent buffer overflow conditions and minimize the impact of buffer overflows that do happen. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Sharing Widget


Download torrent
271.75 MB
seeders:16
leechers:13
Pluralsight - ISO_IEC 27001 Information Security_ The Big Picture