[ DevCourseWeb.com ] Udemy - Selection and Implementation of Cybersecurity Risks Controls
File List
- ~Get Your Files Here !/2. SECTION-2/8. 19- The role of governance in the effective selection and implementation of cybe.mp4 136.3 MB
- ~Get Your Files Here !/2. SECTION-2/14. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT2.mp4 116.7 MB
- ~Get Your Files Here !/2. SECTION-2/16. 25- Measuring the effectiveness of implemented controls.mp4 112.0 MB
- ~Get Your Files Here !/2. SECTION-2/17. Putting it all together-The Selection and Implementation of Cyber Risks controls.mp4 110.4 MB
- ~Get Your Files Here !/1. Introduction/10. 9-Key considerations for the identification- selection & implementation of contr.mp4 97.1 MB
- ~Get Your Files Here !/1. Introduction/7. 6-Approach to Control Selection_ pt2.mp4 89.7 MB
- ~Get Your Files Here !/2. SECTION-2/9. 20-Why not implement frameworks that already have recommended controls.mp4 86.1 MB
- ~Get Your Files Here !/2. SECTION-2/15. 24-Implementation Plan for selected controls.mp4 83.0 MB
- ~Get Your Files Here !/2. SECTION-2/11. 21-Challenges, & considerations associated with implementing frameworks-pt2.mp4 79.0 MB
- ~Get Your Files Here !/1. Introduction/11. 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis.mp4 77.4 MB
- ~Get Your Files Here !/1. Introduction/9. 8-Introduction to security controls.mp4 73.8 MB
- ~Get Your Files Here !/2. SECTION-2/7. 18-Documenting Cybersecurity Risk Assessment Report-Pt2.mp4 72.0 MB
- ~Get Your Files Here !/2. SECTION-2/5. 17-Determine likelihood, Impact, Calculate risk.mp4 69.1 MB
- ~Get Your Files Here !/2. SECTION-2/13. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT1.mp4 60.0 MB
- ~Get Your Files Here !/1. Introduction/12. 11-Cost Benefit Analysis associated with controls selection.mp4 55.6 MB
- ~Get Your Files Here !/2. SECTION-2/3. 15-Steps involved in assessing the identified cyber risks in web server.mp4 52.5 MB
- ~Get Your Files Here !/2. SECTION-2/1. 14-High-level process of selecting controls to protect ecommerce web server-Pt1.mp4 51.9 MB
- ~Get Your Files Here !/1. Introduction/14. 13-Regulatory Compliance, Incident Response Planning.mp4 51.4 MB
- ~Get Your Files Here !/1. Introduction/13. 12- Technology integration, operational impact, continuous monitoring, employee.mp4 50.3 MB
- ~Get Your Files Here !/2. SECTION-2/6. 18- Documenting Cybersecurity Risk Assessment Report-Pt1.mp4 48.1 MB
- ~Get Your Files Here !/1. Introduction/8. 7-Applying same approach to real Data Breaches at a high-level.mp4 46.4 MB
- ~Get Your Files Here !/2. SECTION-2/4. 16-Identify assets, identify threats, identify vulnerabilities.mp4 42.7 MB
- ~Get Your Files Here !/2. SECTION-2/10. 21-Challenges, & considerations associated with implementing frameworks-pt1.mp4 42.0 MB
- ~Get Your Files Here !/1. Introduction/4. 3-Meet your Instructor-Mentor.mp4 40.1 MB
- ~Get Your Files Here !/1. Introduction/5. 4-Course Roadmap.mp4 32.1 MB
- ~Get Your Files Here !/2. SECTION-2/12. 22-When to use frameworks for the selection and implementation of controls.mp4 29.2 MB
- ~Get Your Files Here !/2. SECTION-2/18. 27-Course Recap-END.mp4 28.0 MB
- ~Get Your Files Here !/1. Introduction/3. 2-About the course.mp4 26.8 MB
- ~Get Your Files Here !/1. Introduction/1. Introduction.mp4 25.4 MB
- ~Get Your Files Here !/1. Introduction/6. 5-Approach to Control Selection_ pt1.mp4 23.4 MB
- ~Get Your Files Here !/1. Introduction/2. 1b-Course Intro- The Case at hand.mp4 19.8 MB
- ~Get Your Files Here !/2. SECTION-2/2. 14-High-level process of selecting controls to protect ecommerce web server-Pt2.mp4 7.6 MB
- ~Get Your Files Here !/4. Course Resources/1. Course Resources.html 1.2 KB
- ~Get Your Files Here !/Bonus Resources.txt 386 bytes
- Get Bonus Downloads Here.url 182 bytes
- ~Get Your Files Here !/3. Assignment- To reinforce knowledge gained/1. Research Exercise-CIS Controls.html 175 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.