种子简介
种子名称:
[ DevCourseWeb.com ] Udemy - Selection and Implementation of Cybersecurity Risks Controls
文件类型:
视频
文件数目:
32个文件
文件大小:
1.89 GB
收录时间:
2024-12-12 01:53
已经下载:
3次
资源热度:
16
最近下载:
2024-12-22 20:08
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:9ecdc328c2970b539cf63570188bb86fe71ea634&dn=[ DevCourseWeb.com ] Udemy - Selection and Implementation of Cybersecurity Risks Controls
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[ DevCourseWeb.com ] Udemy - Selection and Implementation of Cybersecurity Risks Controls.torrent
~Get Your Files Here !/1. Introduction/1. Introduction.mp425.4MB
~Get Your Files Here !/1. Introduction/10. 9-Key considerations for the identification- selection & implementation of contr.mp497.07MB
~Get Your Files Here !/1. Introduction/11. 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis.mp477.36MB
~Get Your Files Here !/1. Introduction/12. 11-Cost Benefit Analysis associated with controls selection.mp455.64MB
~Get Your Files Here !/1. Introduction/13. 12- Technology integration, operational impact, continuous monitoring, employee.mp450.34MB
~Get Your Files Here !/1. Introduction/14. 13-Regulatory Compliance, Incident Response Planning.mp451.42MB
~Get Your Files Here !/1. Introduction/2. 1b-Course Intro- The Case at hand.mp419.78MB
~Get Your Files Here !/1. Introduction/3. 2-About the course.mp426.82MB
~Get Your Files Here !/1. Introduction/4. 3-Meet your Instructor-Mentor.mp440.11MB
~Get Your Files Here !/1. Introduction/5. 4-Course Roadmap.mp432.14MB
~Get Your Files Here !/1. Introduction/6. 5-Approach to Control Selection_ pt1.mp423.36MB
~Get Your Files Here !/1. Introduction/7. 6-Approach to Control Selection_ pt2.mp489.71MB
~Get Your Files Here !/1. Introduction/8. 7-Applying same approach to real Data Breaches at a high-level.mp446.38MB
~Get Your Files Here !/1. Introduction/9. 8-Introduction to security controls.mp473.83MB
~Get Your Files Here !/2. SECTION-2/1. 14-High-level process of selecting controls to protect ecommerce web server-Pt1.mp451.94MB
~Get Your Files Here !/2. SECTION-2/10. 21-Challenges, & considerations associated with implementing frameworks-pt1.mp442.05MB
~Get Your Files Here !/2. SECTION-2/11. 21-Challenges, & considerations associated with implementing frameworks-pt2.mp479.02MB
~Get Your Files Here !/2. SECTION-2/12. 22-When to use frameworks for the selection and implementation of controls.mp429.15MB
~Get Your Files Here !/2. SECTION-2/13. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT1.mp460MB
~Get Your Files Here !/2. SECTION-2/14. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT2.mp4116.74MB
~Get Your Files Here !/2. SECTION-2/15. 24-Implementation Plan for selected controls.mp483.04MB
~Get Your Files Here !/2. SECTION-2/16. 25- Measuring the effectiveness of implemented controls.mp4111.96MB
~Get Your Files Here !/2. SECTION-2/17. Putting it all together-The Selection and Implementation of Cyber Risks controls.mp4110.37MB
~Get Your Files Here !/2. SECTION-2/18. 27-Course Recap-END.mp427.96MB
~Get Your Files Here !/2. SECTION-2/2. 14-High-level process of selecting controls to protect ecommerce web server-Pt2.mp47.56MB
~Get Your Files Here !/2. SECTION-2/3. 15-Steps involved in assessing the identified cyber risks in web server.mp452.5MB
~Get Your Files Here !/2. SECTION-2/4. 16-Identify assets, identify threats, identify vulnerabilities.mp442.69MB
~Get Your Files Here !/2. SECTION-2/5. 17-Determine likelihood, Impact, Calculate risk.mp469.07MB
~Get Your Files Here !/2. SECTION-2/6. 18- Documenting Cybersecurity Risk Assessment Report-Pt1.mp448.1MB
~Get Your Files Here !/2. SECTION-2/7. 18-Documenting Cybersecurity Risk Assessment Report-Pt2.mp471.97MB
~Get Your Files Here !/2. SECTION-2/8. 19- The role of governance in the effective selection and implementation of cybe.mp4136.3MB
~Get Your Files Here !/2. SECTION-2/9. 20-Why not implement frameworks that already have recommended controls.mp486.1MB