种子简介
种子名称:
Implementing the NIST Cybersecurity Framework
文件类型:
视频
文件数目:
39个文件
文件大小:
4 GB
收录时间:
2022-6-13 10:33
已经下载:
3次
资源热度:
176
最近下载:
2024-12-24 03:01
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:79cdf2fe13267c9fa3b9118ee98eec8a2ed2e91e&dn=Implementing the NIST Cybersecurity Framework
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Implementing the NIST Cybersecurity Framework.torrent
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/5. Finding the Controls.mp4293.01MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/6. Five Functions.mp4221.05MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/7. Controls and Outcomes.mp4196.31MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/5. Framework Components.mp4188.38MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/3. Value Proposition.mp4172.59MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/1. Welcome.mp4154.04MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/5. Generate Questionnaire.mp4146.38MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/1. Using the Core.mp4142.05MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/2. Intel (Microchip Manufacturing).mp4136.85MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/5. Implementing Phase Two of the CR-MAP/4. Business Value Analysis.mp4133.32MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/4. DOE (Energy Industry).mp4132.61MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/7. Conduct Interviews.mp4129.85MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/7. Conclusion/1. BONUS - Conclusion.mp4120.53MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/3. Cimpress (Promotional Products).mp4118.18MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/6. Saudi Aramco (Oil Industry).mp4113.42MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/4. Intended Audience.mp4106.98MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/5. Western Australia (Local Government).mp4106.92MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/6. Choose Target Scores.mp495.8MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/6. Implementing Phase Three of the CR-MAP/3. Quarterly Reviews.mp495.13MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/1. Phase One.mp489.44MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/5. Implementing Phase Two of the CR-MAP/1. Phase Two.mp485.98MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/6. Implementing Phase Three of the CR-MAP/2. Monthly Check-ins.mp485.5MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/2. Using the Implementation Profile.mp480.49MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/5. Implementing Phase Two of the CR-MAP/6. Internal Marketing.mp477.58MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/7. University of Kansas Medical Center.mp476.64MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/6. Implementing Phase Three of the CR-MAP/4. Annual Cybersecurity Summit.mp476.62MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/6. Implementing Phase Three of the CR-MAP/1. Phase Three.mp469.65MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/5. Implementing Phase Two of the CR-MAP/7. External Marketing.mp467.51MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/5. Implementing Phase Two of the CR-MAP/3. Total Cost of Ownership.mp467.32MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/5. Implementing Phase Two of the CR-MAP/2. Close Your Gaps.mp467.25MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/4. Select Interviewees.mp462.69MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/8. Compile and Average Scores.mp460.75MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/5. Implementing Phase Two of the CR-MAP/5. Dashboard and Roadmap.mp454.84MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/4. Using Components.mp452MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/1. Real World Case Studies.mp450.67MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/3. Using the Tiers.mp449.1MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/3. Get Buy-In.mp448.37MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/2. Widen Your Scope.mp436.73MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/9. Identify Top 5 Cyber Risks.mp431.91MB