本站已收录 番号和无损神作磁力链接/BT种子 

coursera-designing-and-executing-information-security-strategies

种子简介

种子名称: coursera-designing-and-executing-information-security-strategies
文件类型: 视频
文件数目: 62个文件
文件大小: 955.47 MB
收录时间: 2017-8-1 21:46
已经下载: 3
资源热度: 271
最近下载: 2024-11-27 20:38

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:55284a002672598923af36bc55f3205b42c93b00&dn=coursera-designing-and-executing-information-security-strategies 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

coursera-designing-and-executing-information-security-strategies.torrent
  • lectures/week1/Designing and Executing Information Security Strategies 0.0 Part 1 - Course Overview (544).mp48.31MB
  • lectures/week1/Designing and Executing Information Security Strategies 0.1 Part 2 - HackMeCo Basics (1623).mp423.4MB
  • lectures/week1/Designing and Executing Information Security Strategies 0.2 Part 3 - Case 1 Background Part 1 of 2 (1655).mp424.17MB
  • lectures/week1/Designing and Executing Information Security Strategies 0.3 Part 4 - Case 1 Background Part 2 of 2 (1241).mp419.02MB
  • lectures/week1/Designing and Executing Information Security Strategies 0.4 Part 5 - Controls Review (914).mp413.82MB
  • lectures/week1/Designing and Executing Information Security Strategies 0.5 Part 6 - Case 1 (1108).mp416.96MB
  • lectures/week10/Designing and Executing Information Security Strategies 9.0 Part 1 - Sources and Uses for Threat Information (705).mp49.83MB
  • lectures/week10/Designing and Executing Information Security Strategies 9.1 Part 2 - Sources of Threats Part 1 of 3 (935).mp413.58MB
  • lectures/week10/Designing and Executing Information Security Strategies 9.2 Part 3 - Sources of Threats Part 2 of 3 (958).mp413.85MB
  • lectures/week10/Designing and Executing Information Security Strategies 9.3 Part 4 - Sources of Threats Part 3 of 3 (815).mp411.31MB
  • lectures/week10/Designing and Executing Information Security Strategies 9.4 Part 5 - Why What and Who (756).mp410.88MB
  • lectures/week10/Designing and Executing Information Security Strategies 9.5 Part 6 - What to do With What You Find (758).mp411.05MB
  • lectures/week10/Designing and Executing Information Security Strategies 9.6 Bonus Lecture Part 1 of 2 (1232).mp449.76MB
  • lectures/week10/Designing and Executing Information Security Strategies 9.7 Bonus Lecture Part 2 of 2 (1233).mp453.68MB
  • lectures/week2/Designing and Executing Information Security Strategies 1.0 Part 1 - Week 1 Review (617).mp49.31MB
  • lectures/week2/Designing and Executing Information Security Strategies 1.1 Part 2 - Incident Response Part 1 of 2 (1408).mp420.21MB
  • lectures/week2/Designing and Executing Information Security Strategies 1.2 Part 3 - Incident Response Part 2 of 2 (1401).mp420.07MB
  • lectures/week2/Designing and Executing Information Security Strategies 1.3 Part 4 - My Monday Part 1 of 2 (1528).mp422.39MB
  • lectures/week2/Designing and Executing Information Security Strategies 1.4 Part 5 - My Monday Part 2 of 2 (1508).mp422.08MB
  • lectures/week3/Designing and Executing Information Security Strategies 2.0 Part 1 - Compliance (1438).mp420.98MB
  • lectures/week3/Designing and Executing Information Security Strategies 2.1 Part 2 - Penalties (828).mp412.25MB
  • lectures/week3/Designing and Executing Information Security Strategies 2.2 Part 3 - Complicated Landscape (607).mp49.08MB
  • lectures/week3/Designing and Executing Information Security Strategies 2.3 Part 4 - Compliance (1109).mp416.07MB
  • lectures/week3/Designing and Executing Information Security Strategies 2.4 Part 5 - Your Case (711).mp410.8MB
  • lectures/week4/Designing and Executing Information Security Strategies 3.0 Part 1 - Approach to Lesson 3 (328).mp45MB
  • lectures/week4/Designing and Executing Information Security Strategies 3.1 Part 2 - Organizational Risk (1100).mp415.79MB
  • lectures/week4/Designing and Executing Information Security Strategies 3.2 Part 3 - Context - Who is Right (846).mp413.15MB
  • lectures/week4/Designing and Executing Information Security Strategies 3.3 Part 4 - Mini Assignment (144).mp42.56MB
  • lectures/week4/Designing and Executing Information Security Strategies 3.4 Part 5 - Information Assurance and Progress (757).mp412.22MB
  • lectures/week4/Designing and Executing Information Security Strategies 3.5 Part 6 - Enabling Information Assurance (1113).mp416.7MB
  • lectures/week5/Designing and Executing Information Security Strategies 4.0 Part 1 - Your Case (548).mp48.77MB
  • lectures/week5/Designing and Executing Information Security Strategies 4.1 Part 2 - Week 4 Review (1054).mp415.43MB
  • lectures/week5/Designing and Executing Information Security Strategies 4.2 Part 3 - Liability Scenarios Part 1 of 3 (1221).mp417.79MB
  • lectures/week5/Designing and Executing Information Security Strategies 4.3 Part 4 - Liability Scenarios Part 2 of 3 (1110).mp415.99MB
  • lectures/week5/Designing and Executing Information Security Strategies 4.4 Part 5 - Liability Scenarios Part 3 of 3 (1413).mp420.95MB
  • lectures/week5/Designing and Executing Information Security Strategies 4.5 Part 6 - Glitter.com (1042).mp415.44MB
  • lectures/week6/Designing and Executing Information Security Strategies 5.0 Part 1 - Water and Rats (721).mp410.37MB
  • lectures/week6/Designing and Executing Information Security Strategies 5.1 Part 2 - Go Native (407).mp45.73MB
  • lectures/week6/Designing and Executing Information Security Strategies 5.2 Part 3 - The CISO Part 1 of 2 (930).mp413.44MB
  • lectures/week6/Designing and Executing Information Security Strategies 5.3 Part 4 - The CISO Part 2 of 2 (915).mp413.12MB
  • lectures/week6/Designing and Executing Information Security Strategies 5.4 Part 5 - How Not To (1505).mp421.96MB
  • lectures/week6/Designing and Executing Information Security Strategies 5.5 Part 6 - Understanding Differences - Working with Them (1444).mp420.9MB
  • lectures/week7/Designing and Executing Information Security Strategies 6.0 Part 1 - The Cloud Risks (437).mp46.44MB
  • lectures/week7/Designing and Executing Information Security Strategies 6.1 Part 2 - System Characterization Inputs (1101).mp415.45MB
  • lectures/week7/Designing and Executing Information Security Strategies 6.2 Part 3 - System Characterization Outputs (853).mp412.52MB
  • lectures/week7/Designing and Executing Information Security Strategies 6.3 Part 4 - Sensitivity Levels (640).mp49.6MB
  • lectures/week7/Designing and Executing Information Security Strategies 6.4 Part 5 - Threat Identification (801).mp411.42MB
  • lectures/week7/Designing and Executing Information Security Strategies 6.5 Part 6 - Vulnerability Identification (637).mp49.71MB
  • lectures/week7/Designing and Executing Information Security Strategies 6.6 Part 7 - Control Analysis (1117).mp415.68MB
  • lectures/week7/Designing and Executing Information Security Strategies 6.7 Part 8 - Compare the Cloud (647).mp49.69MB
  • lectures/week8/Designing and Executing Information Security Strategies 7.0 Part 1 - Budget Decisions (1019).mp414.64MB
  • lectures/week8/Designing and Executing Information Security Strategies 7.1 Part 2 - Heartland Example (1123).mp416.28MB
  • lectures/week8/Designing and Executing Information Security Strategies 7.2 Part 3 - Accounting vs. Economics (825).mp412.18MB
  • lectures/week8/Designing and Executing Information Security Strategies 7.3 Part 4 - Financial Justification (1215).mp417.98MB
  • lectures/week8/Designing and Executing Information Security Strategies 7.4 Part 5 - Finance and Real Numbers (1311).mp419.09MB
  • lectures/week8/Designing and Executing Information Security Strategies 7.5 Part 6 - TJ Maxx (607).mp48.69MB
  • lectures/week9/Designing and Executing Information Security Strategies 8.0 Part 1 - Privacy and Security Introduction (851).mp412.58MB
  • lectures/week9/Designing and Executing Information Security Strategies 8.1 Part 2 - Private Information (1022).mp414.71MB
  • lectures/week9/Designing and Executing Information Security Strategies 8.2 Part 3 - History of Privacy (858).mp412.75MB
  • lectures/week9/Designing and Executing Information Security Strategies 8.3 Part 4 - Scientific Methods Data (809).mp411.67MB
  • lectures/week9/Designing and Executing Information Security Strategies 8.4 Part 5 - Examples (1043).mp415.44MB
  • lectures/week9/Designing and Executing Information Security Strategies 8.5 Part 6 - Privacy Value and Concerns (1421).mp420.8MB