Linkedin - Certified Information Security Manager (CISM) Cert Prep - 2 Information Security Risk Management


Linkedin - Certified Information Security Manager (CISM) Cert Prep - 2 Information Security Risk Management
Category:
Date:
07/07/22 at 9:15am GMT+1
Submitter:
Seeders:
7
Leechers:
0
File size:
782 MB in 98 files

Torrent Status:
  This torrent has been verified.

Infohash:
1625160dd873a1df1a9b7b96d3c6116cc52a0651


File list

  • Linkedin - Certified Information Security Manager (CISM) Cert Prep - 2 Information Security Risk Management
  • icon ~Get Your Files Here !/01 - Introduction/01 - Information security risk management.mp4 13.2 MB
    icon ~Get Your Files Here !/01 - Introduction/01 - Information security risk management.srt 1.2 KB
    icon ~Get Your Files Here !/01 - Introduction/02 - What you need to know.mp4 2 MB
    icon ~Get Your Files Here !/01 - Introduction/02 - What you need to know.srt 1.2 KB
    icon ~Get Your Files Here !/01 - Introduction/03 - Study resources.mp4 13.4 MB
    icon ~Get Your Files Here !/01 - Introduction/03 - Study resources.srt 2.5 KB
    icon ~Get Your Files Here !/02 - 1. Risk Assessment/01 - Risk assessment.mp4 13.7 MB
    icon ~Get Your Files Here !/02 - 1. Risk Assessment/01 - Risk assessment.srt 8.6 KB
    icon ~Get Your Files Here !/02 - 1. Risk Assessment/02 - Quantitative risk assessment.mp4 20.1 MB
    icon ~Get Your Files Here !/02 - 1. Risk Assessment/02 - Quantitative risk assessment.srt 10.7 KB
    icon ~Get Your Files Here !/02 - 1. Risk Assessment/03 - Information classification.mp4 12.5 MB
    icon ~Get Your Files Here !/02 - 1. Risk Assessment/03 - Information classification.srt 6.7 KB
    icon ~Get Your Files Here !/03 - 2. Risk Management/01 - Risk treatment options.mp4 17.2 MB
    icon ~Get Your Files Here !/03 - 2. Risk Management/01 - Risk treatment options.srt 7.5 KB
    icon ~Get Your Files Here !/03 - 2. Risk Management/02 - Security control selection and implementation.mp4 20.1 MB
    icon ~Get Your Files Here !/03 - 2. Risk Management/02 - Security control selection and implementation.srt 10.7 KB
    icon ~Get Your Files Here !/03 - 2. Risk Management/03 - Ongoing risk management.mp4 8.8 MB
    icon ~Get Your Files Here !/03 - 2. Risk Management/03 - Ongoing risk management.srt 4.6 KB
    icon ~Get Your Files Here !/03 - 2. Risk Management/04 - Risk management frameworks.mp4 10.9 MB
    icon ~Get Your Files Here !/03 - 2. Risk Management/04 - Risk management frameworks.srt 5.9 KB
    icon ~Get Your Files Here !/03 - 2. Risk Management/05 - Risk visibility and reporting.mp4 21.2 MB
    icon ~Get Your Files Here !/03 - 2. Risk Management/05 - Risk visibility and reporting.srt 8.1 KB
    icon ~Get Your Files Here !/04 - 3. Malware/01 - Comparing viruses, worms, and Trojans.mp4 23.3 MB
    icon ~Get Your Files Here !/04 - 3. Malware/01 - Comparing viruses, worms, and Trojans.srt 9.7 KB
    icon ~Get Your Files Here !/04 - 3. Malware/02 - Malware payloads.mp4 20.5 MB
    icon ~Get Your Files Here !/04 - 3. Malware/02 - Malware payloads.srt 10.4 KB
    icon ~Get Your Files Here !/04 - 3. Malware/03 - Understanding backdoors and logic bombs.mp4 15.6 MB
    icon ~Get Your Files Here !/04 - 3. Malware/03 - Understanding backdoors and logic bombs.srt 8.1 KB
    icon ~Get Your Files Here !/04 - 3. Malware/04 - Botnets.mp4 9.3 MB
    icon ~Get Your Files Here !/04 - 3. Malware/04 - Botnets.srt 6.1 KB
    icon ~Get Your Files Here !/04 - 3. Malware/05 - Advanced persistent threats.mp4 10.6 MB
    icon ~Get Your Files Here !/04 - 3. Malware/05 - Advanced persistent threats.srt 6.1 KB
    icon ~Get Your Files Here !/05 - 4. Understanding Attackers/01 - Cybersecurity adversaries.mp4 16.9 MB
    icon ~Get Your Files Here !/05 - 4. Understanding Attackers/01 - Cybersecurity adversaries.srt 8.5 KB
    icon ~Get Your Files Here !/05 - 4. Understanding Attackers/02 - Preventing insider threats.mp4 9.8 MB
    icon ~Get Your Files Here !/05 - 4. Understanding Attackers/02 - Preventing insider threats.srt 4.7 KB
    icon ~Get Your Files Here !/05 - 4. Understanding Attackers/03 - Threat intelligence.mp4 11.1 MB
    icon ~Get Your Files Here !/05 - 4. Understanding Attackers/03 - Threat intelligence.srt 6.4 KB
    icon ~Get Your Files Here !/06 - 5. Attack Types/01 - Denial of service attacks.mp4 15.6 MB
    icon ~Get Your Files Here !/06 - 5. Attack Types/01 - Denial of service attacks.srt 7.7 KB
    icon ~Get Your Files Here !/06 - 5. Attack Types/02 - Eavesdropping attacks.mp4 13.6 MB
    icon ~Get Your Files Here !/06 - 5. Attack Types/02 - Eavesdropping attacks.srt 7.9 KB
    icon ~Get Your Files Here !/06 - 5. Attack Types/03 - DNS attacks.mp4 12.6 MB
    icon ~Get Your Files Here !/06 - 5. Attack Types/03 - DNS attacks.srt 6.3 KB
    icon ~Get Your Files Here !/06 - 5. Attack Types/04 - Layer 2 attacks.mp4 7.1 MB
    icon ~Get Your Files Here !/06 - 5. Attack Types/04 - Layer 2 attacks.srt 3.8 KB
    icon ~Get Your Files Here !/06 - 5. Attack Types/05 - Network address spoofing.mp4 12 MB
    icon ~Get Your Files Here !/06 - 5. Attack Types/05 - Network address spoofing.srt 6.9 KB
    icon ~Get Your Files Here !/06 - 5. Attack Types/06 - Password attacks.mp4 32.8 MB
    icon ~Get Your Files Here !/06 - 5. Attack Types/06 - Password attacks.srt 14.5 KB
    icon ~Get Your Files Here !/06 - 5. Attack Types/07 - Password spraying and credential stuffing.mp4 6.1 MB
    icon ~Get Your Files Here !/06 - 5. Attack Types/07 - Password spraying and credential stuffing.srt 3.2 KB
    icon ~Get Your Files Here !/06 - 5. Attack Types/08 - Watering hole attacks.mp4 12 MB
    icon ~Get Your Files Here !/06 - 5. Attack Types/08 - Watering hole attacks.srt 5.7 KB
    icon ~Get Your Files Here !/07 - 6. Social Engineering Attacks/01 - Social engineering.mp4 16.9 MB
    icon ~Get Your Files Here !/07 - 6. Social Engineering Attacks/01 - Social engineering.srt 10.2 KB
    icon ~Get Your Files Here !/07 - 6. Social Engineering Attacks/02 - Impersonation attacks.mp4 15.1 MB
    icon ~Get Your Files Here !/07 - 6. Social Engineering Attacks/02 - Impersonation attacks.srt 10 KB
    icon ~Get Your Files Here !/07 - 6. Social Engineering Attacks/03 - Physical social engineering.mp4 11.1 MB
    icon ~Get Your Files Here !/07 - 6. Social Engineering Attacks/03 - Physical social engineering.srt 4.6 KB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/01 - What is vulnerability management.mp4 16.6 MB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/01 - What is vulnerability management.srt 9.8 KB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/02 - Identify scan targets.mp4 13.7 MB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/02 - Identify scan targets.srt 8.6 KB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/03 - Scan configuration.mp4 15.5 MB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/03 - Scan configuration.srt 10.9 KB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/04 - Scan perspective.mp4 12.8 MB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/04 - Scan perspective.srt 8.5 KB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/05 - Security Content Automation Protocol (SCAP).mp4 7 MB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/05 - Security Content Automation Protocol (SCAP).srt 4.3 KB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/06 - Common Vulnerability Scoring System (CVSS).mp4 10.3 MB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/06 - Common Vulnerability Scoring System (CVSS).srt 6.2 KB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/07 - Analyzing scan reports.mp4 16.2 MB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/07 - Analyzing scan reports.srt 9 KB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/08 - Correlating scan results.mp4 8 MB
    icon ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/08 - Correlating scan results.srt 4.4 KB
    icon ~Get Your Files Here !/09 - 8. Awareness and Training/01 - Security awareness training.mp4 19.8 MB
    icon ~Get Your Files Here !/09 - 8. Awareness and Training/01 - Security awareness training.srt 9.6 KB
    icon ~Get Your Files Here !/09 - 8. Awareness and Training/02 - Compliance training.mp4 13.3 MB
    icon ~Get Your Files Here !/09 - 8. Awareness and Training/02 - Compliance training.srt 5.5 KB
    icon ~Get Your Files Here !/09 - 8. Awareness and Training/03 - User habits.mp4 9.5 MB
    icon ~Get Your Files Here !/09 - 8. Awareness and Training/03 - User habits.srt 6.6 KB
    icon ~Get Your Files Here !/09 - 8. Awareness and Training/04 - Measuring compliance and security posture.mp4 7.7 MB
    icon ~Get Your Files Here !/09 - 8. Awareness and Training/04 - Measuring compliance and security posture.srt 3.5 KB
    icon ~Get Your Files Here !/09 - 8. Awareness and Training/05 - Awareness program reviews.mp4 3.2 MB
    icon ~Get Your Files Here !/09 - 8. Awareness and Training/05 - Awareness program reviews.srt 2.2 KB
    icon ~Get Your Files Here !/10 - 9. Business Continuity/01 - Business continuity planning.mp4 8 MB
    icon ~Get Your Files Here !/10 - 9. Business Continuity/01 - Business continuity planning.srt 6.2 KB
    icon ~Get Your Files Here !/10 - 9. Business Continuity/02 - Business continuity controls.mp4 11.1 MB
    icon ~Get Your Files Here !/10 - 9. Business Continuity/02 - Business continuity controls.srt 7 KB
    icon ~Get Your Files Here !/10 - 9. Business Continuity/03 - High availability and fault tolerance.mp4 14.6 MB
    icon ~Get Your Files Here !/10 - 9. Business Continuity/03 - High availability and fault tolerance.srt 10.7 KB
    icon ~Get Your Files Here !/11 - 10. Disaster Recovery/01 - Disaster recovery planning.mp4 14.1 MB
    icon ~Get Your Files Here !/11 - 10. Disaster Recovery/01 - Disaster recovery planning.srt 8.3 KB
    icon ~Get Your Files Here !/11 - 10. Disaster Recovery/02 - Backups.mp4 11.1 MB
    icon ~Get Your Files Here !/11 - 10. Disaster Recovery/02 - Backups.srt 7.8 KB
    icon ~Get Your Files Here !/11 - 10. Disaster Recovery/03 - Restoring backups.mp4 7.3 MB
    icon ~Get Your Files Here !/11 - 10. Disaster Recovery/03 - Restoring backups.srt 4.3 KB

Similar Torrents