[ CourseMega.com ] Linkedin - SSCP Cert Prep - 3 Risk Identification, Monitoring, and Analysis (2021)
File List
- ~Get Your Files Here !/2 Risk Management/05 Quantitative risk assessment.mp4 54.7 MB
- ~Get Your Files Here !/7 Security Monitoring/31 Monitoring log files.mp4 48.7 MB
- ~Get Your Files Here !/5 Vulnerability Scanning/22 Scan configuration.mp4 46.9 MB
- ~Get Your Files Here !/4 Understanding Vulnerability Types/16 Vulnerability impacts.mp4 46.2 MB
- ~Get Your Files Here !/5 Vulnerability Scanning/20 What is vulnerability management.mp4 43.6 MB
- ~Get Your Files Here !/2 Risk Management/04 Risk assessment.mp4 40.0 MB
- ~Get Your Files Here !/5 Vulnerability Scanning/25 Analyzing scan reports.mp4 39.8 MB
- ~Get Your Files Here !/2 Risk Management/09 Risk visibility and reporting.mp4 38.8 MB
- ~Get Your Files Here !/5 Vulnerability Scanning/21 Identifying scan targets.mp4 38.6 MB
- ~Get Your Files Here !/5 Vulnerability Scanning/23 Scan perspective.mp4 38.5 MB
- ~Get Your Files Here !/2 Risk Management/06 Risk management.mp4 37.7 MB
- ~Get Your Files Here !/4 Understanding Vulnerability Types/17 Supply chain vulnerabilities.mp4 37.6 MB
- ~Get Your Files Here !/6 Legal and Regulatory Concerns/29 Data privacy.mp4 36.9 MB
- ~Get Your Files Here !/7 Security Monitoring/33 Continuous security monitoring.mp4 36.4 MB
- ~Get Your Files Here !/7 Security Monitoring/32 Security information and event management.mp4 36.1 MB
- ~Get Your Files Here !/2 Risk Management/08 Risk management frameworks.mp4 33.8 MB
- ~Get Your Files Here !/3 Threat Modeling/14 Automating threat intelligence.mp4 33.3 MB
- ~Get Your Files Here !/3 Threat Modeling/15 Threat hunting.mp4 33.1 MB
- ~Get Your Files Here !/4 Understanding Vulnerability Types/18 Configuration vulnerabilities.mp4 32.8 MB
- ~Get Your Files Here !/3 Threat Modeling/11 Managing threat indicators.mp4 31.7 MB
- ~Get Your Files Here !/5 Vulnerability Scanning/24 CVSS (Common Vulnerability Scoring System).mp4 30.7 MB
- ~Get Your Files Here !/3 Threat Modeling/10 Threat intelligence.mp4 28.9 MB
- ~Get Your Files Here !/7 Security Monitoring/34 Visualization and reporting.mp4 25.7 MB
- ~Get Your Files Here !/6 Legal and Regulatory Concerns/28 Legal definitions.mp4 24.6 MB
- ~Get Your Files Here !/3 Threat Modeling/12 Intelligence sharing.mp4 22.0 MB
- ~Get Your Files Here !/7 Security Monitoring/36 Legal and ethical issues in monitoring.mp4 21.6 MB
- ~Get Your Files Here !/2 Risk Management/07 Ongoing risk management.mp4 21.5 MB
- ~Get Your Files Here !/7 Security Monitoring/35 Compliance monitoring.mp4 21.3 MB
- ~Get Your Files Here !/3 Threat Modeling/13 Identifying threats.mp4 20.9 MB
- ~Get Your Files Here !/5 Vulnerability Scanning/26 Correlating scan results.mp4 20.5 MB
- ~Get Your Files Here !/6 Legal and Regulatory Concerns/30 Data breaches.mp4 20.3 MB
- ~Get Your Files Here !/4 Understanding Vulnerability Types/19 Architectural vulnerabilities.mp4 19.3 MB
- ~Get Your Files Here !/6 Legal and Regulatory Concerns/27 Legal and compliance risks.mp4 18.3 MB
- ~Get Your Files Here !/1 Introduction/01 Managing risks.mp4 17.8 MB
- ~Get Your Files Here !/1 Introduction/03 Study resources.mp4 15.2 MB
- ~Get Your Files Here !/8 Conclusion/37 Continuing your studies.mp4 6.1 MB
- ~Get Your Files Here !/1 Introduction/02 What you need to know.mp4 5.3 MB
- ~Get Your Files Here !/2 Risk Management/05 Quantitative risk assessment.en.srt 10.2 KB
- ~Get Your Files Here !/5 Vulnerability Scanning/22 Scan configuration.en.srt 10.0 KB
- ~Get Your Files Here !/7 Security Monitoring/31 Monitoring log files.en.srt 9.9 KB
- ~Get Your Files Here !/5 Vulnerability Scanning/20 What is vulnerability management.en.srt 9.0 KB
- ~Get Your Files Here !/4 Understanding Vulnerability Types/16 Vulnerability impacts.en.srt 8.9 KB
- ~Get Your Files Here !/5 Vulnerability Scanning/25 Analyzing scan reports.en.srt 8.7 KB
- ~Get Your Files Here !/5 Vulnerability Scanning/23 Scan perspective.en.srt 8.4 KB
- ~Get Your Files Here !/5 Vulnerability Scanning/21 Identifying scan targets.en.srt 8.2 KB
- ~Get Your Files Here !/2 Risk Management/04 Risk assessment.en.srt 8.1 KB
- ~Get Your Files Here !/7 Security Monitoring/32 Security information and event management.en.srt 8.0 KB
- ~Get Your Files Here !/4 Understanding Vulnerability Types/17 Supply chain vulnerabilities.en.srt 7.9 KB
- ~Get Your Files Here !/2 Risk Management/09 Risk visibility and reporting.en.srt 7.7 KB
- ~Get Your Files Here !/2 Risk Management/06 Risk management.en.srt 7.6 KB
- ~Get Your Files Here !/6 Legal and Regulatory Concerns/29 Data privacy.en.srt 7.4 KB
- ~Get Your Files Here !/7 Security Monitoring/33 Continuous security monitoring.en.srt 7.2 KB
- ~Get Your Files Here !/3 Threat Modeling/14 Automating threat intelligence.en.srt 6.6 KB
- ~Get Your Files Here !/2 Risk Management/08 Risk management frameworks.en.srt 6.6 KB
- ~Get Your Files Here !/3 Threat Modeling/15 Threat hunting.en.srt 6.5 KB
- ~Get Your Files Here !/4 Understanding Vulnerability Types/18 Configuration vulnerabilities.en.srt 6.4 KB
- ~Get Your Files Here !/3 Threat Modeling/11 Managing threat indicators.en.srt 6.0 KB
- ~Get Your Files Here !/5 Vulnerability Scanning/24 CVSS (Common Vulnerability Scoring System).en.srt 5.9 KB
- ~Get Your Files Here !/3 Threat Modeling/10 Threat intelligence.en.srt 5.7 KB
- ~Get Your Files Here !/7 Security Monitoring/34 Visualization and reporting.en.srt 5.4 KB
- ~Get Your Files Here !/6 Legal and Regulatory Concerns/28 Legal definitions.en.srt 4.8 KB
- ~Get Your Files Here !/7 Security Monitoring/35 Compliance monitoring.en.srt 4.4 KB
- ~Get Your Files Here !/7 Security Monitoring/36 Legal and ethical issues in monitoring.en.srt 4.3 KB
- ~Get Your Files Here !/2 Risk Management/07 Ongoing risk management.en.srt 4.3 KB
- ~Get Your Files Here !/5 Vulnerability Scanning/26 Correlating scan results.en.srt 4.1 KB
- ~Get Your Files Here !/3 Threat Modeling/12 Intelligence sharing.en.srt 4.1 KB
- ~Get Your Files Here !/6 Legal and Regulatory Concerns/30 Data breaches.en.srt 4.0 KB
- ~Get Your Files Here !/3 Threat Modeling/13 Identifying threats.en.srt 3.8 KB
- ~Get Your Files Here !/4 Understanding Vulnerability Types/19 Architectural vulnerabilities.en.srt 3.8 KB
- ~Get Your Files Here !/6 Legal and Regulatory Concerns/27 Legal and compliance risks.en.srt 3.6 KB
- ~Get Your Files Here !/1 Introduction/03 Study resources.en.srt 2.9 KB
- ~Get Your Files Here !/1 Introduction/01 Managing risks.en.srt 2.3 KB
- ~Get Your Files Here !/1 Introduction/02 What you need to know.en.srt 1.2 KB
- ~Get Your Files Here !/8 Conclusion/37 Continuing your studies.en.srt 1.2 KB
- ~Get Your Files Here !/Bonus Resources.txt 357 bytes
- Get Bonus Downloads Here.url 180 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.