[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program
File List
- ~Get Your Files Here !/2. Information Security Policies/3. Documenting The PROTECT Security Control Policy Statements.mp4 322.0 MB
- ~Get Your Files Here !/1. Introduction/1. Introduction.mp4 312.0 MB
- ~Get Your Files Here !/2. Information Security Policies/2. Documenting The IDENTIFY Security Controls Policy Statements.mp4 258.1 MB
- ~Get Your Files Here !/3. Information Security Procedures/2. Defining Your IT Security Configuration Standards & Guidelines.mp4 182.5 MB
- ~Get Your Files Here !/3. Information Security Procedures/1. Documenting Your Information Security Standard Operating Procedures.mp4 152.5 MB
- ~Get Your Files Here !/4. Conclusion/1. Going Beyond Information Security Policies & Procedures.mp4 151.0 MB
- ~Get Your Files Here !/4. Conclusion/2. It's Time For Action - Wrapping Things Up.mp4 88.3 MB
- ~Get Your Files Here !/1. Introduction/4. Identifying Your Operational Security Policies.mp4 88.2 MB
- ~Get Your Files Here !/2. Information Security Policies/4. Documenting The DETECT Security Controls Policy Statements.mp4 74.8 MB
- ~Get Your Files Here !/1. Introduction/3. Defining Responsibility Over Software and Applications.mp4 51.2 MB
- ~Get Your Files Here !/2. Information Security Policies/5. Documenting The RESPOND Security Controls Policy Statements.mp4 50.3 MB
- ~Get Your Files Here !/1. Introduction/2. Identifying Roles by Security Controls.mp4 44.6 MB
- ~Get Your Files Here !/2. Information Security Policies/6. Documenting The RECOVER Security Controls Policy Statements.mp4 15.6 MB
- ~Get Your Files Here !/2. Information Security Policies/1. Introduction To Your Information Security Polices.mp4 8.7 MB
- ~Get Your Files Here !/3. Information Security Procedures/1.1 CSR Information Security Standard Operating Procedures.doc 1.7 MB
- ~Get Your Files Here !/1. Introduction/3.1 Application_XRef Template.xlsx 634.7 KB
- ~Get Your Files Here !/2. Information Security Policies/1.1 CSR Information Security Policy - NIST CSF.doc 246.5 KB
- ~Get Your Files Here !/1. Introduction/4.1 CSR Acceptable Use Policy.docx 194.6 KB
- ~Get Your Files Here !/1. Introduction/4.3 CSR Teleworking Policy.docx 194.1 KB
- ~Get Your Files Here !/1. Introduction/4.2 CSR Sanctions Policy.docx 192.2 KB
- ~Get Your Files Here !/2. Information Security Policies/3. Documenting The PROTECT Security Control Policy Statements.srt 65.4 KB
- ~Get Your Files Here !/1. Introduction/1. Introduction.srt 64.1 KB
- ~Get Your Files Here !/3. Information Security Procedures/2.1 Secure Configuration Standard v1.0.xlsx 60.6 KB
- ~Get Your Files Here !/2. Information Security Policies/2. Documenting The IDENTIFY Security Controls Policy Statements.srt 49.5 KB
- ~Get Your Files Here !/1. Introduction/2.1 Roles by Control Matrix.xlsx 29.2 KB
- ~Get Your Files Here !/3. Information Security Procedures/2. Defining Your IT Security Configuration Standards & Guidelines.srt 27.3 KB
- ~Get Your Files Here !/3. Information Security Procedures/1. Documenting Your Information Security Standard Operating Procedures.srt 20.6 KB
- ~Get Your Files Here !/2. Information Security Policies/4. Documenting The DETECT Security Controls Policy Statements.srt 15.1 KB
- ~Get Your Files Here !/2. Information Security Policies/6. Documenting The RECOVER Security Controls Policy Statements.srt 13.3 KB
- ~Get Your Files Here !/1. Introduction/3. Defining Responsibility Over Software and Applications.srt 12.4 KB
- ~Get Your Files Here !/2. Information Security Policies/5. Documenting The RESPOND Security Controls Policy Statements.srt 10.9 KB
- ~Get Your Files Here !/4. Conclusion/1. Going Beyond Information Security Policies & Procedures.srt 10.2 KB
- ~Get Your Files Here !/1. Introduction/2. Identifying Roles by Security Controls.srt 6.1 KB
- ~Get Your Files Here !/4. Conclusion/2. It's Time For Action - Wrapping Things Up.srt 5.8 KB
- ~Get Your Files Here !/2. Information Security Policies/1. Introduction To Your Information Security Polices.srt 5.1 KB
- ~Get Your Files Here !/1. Introduction/4. Identifying Your Operational Security Policies.srt 5.1 KB
- ~Get Your Files Here !/Bonus Resources.txt 357 bytes
- Get Bonus Downloads Here.url 183 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.