Udemy - Mastering Cybersecurity and Supply Chain Risk Management

Photo unavailable
Category:
Date:
10/16/23 at 11:21pm GMT+1
Submitter:
Seeders:
4
Leechers:
1
File size:
3.3 GB in 40 files

Torrent Status:
  This torrent has been verified.

Infohash:
e655413b315b91849aaf460e107d70bceaf3cb1a


File list

  • Udemy - Mastering Cybersecurity and Supply Chain Risk Management
  • icon ~Get Your Files Here !/1. Introduction to NIST Framework/1. The NIST Framework.mp4 44.8 MB
    icon ~Get Your Files Here !/1. Introduction to NIST Framework/2. NIST Framework Background.mp4 56.3 MB
    icon ~Get Your Files Here !/1. Introduction to NIST Framework/3. NIST Framework Core.mp4 124 MB
    icon ~Get Your Files Here !/1. Introduction to NIST Framework/4. Recent NIST Developments.mp4 61.9 MB
    icon ~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/1. Cybersecurity Risk Planning.mp4 73.7 MB
    icon ~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/10. Identifying Internal and External Threats.mp4 48.3 MB
    icon ~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/11. Focus on Highlighted Risk.mp4 66.2 MB
    icon ~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/12. Plans for Dealing with the Highest Risk.mp4 65.9 MB
    icon ~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/2. What is a Cybersecurity Risk.mp4 73.8 MB
    icon ~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/3. Asset Management.mp4 69.2 MB
    icon ~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/4. Keeping Hardware Inventory Updated.mp4 98 MB
    icon ~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/5. Keeping Software Platform Inventory.mp4 69.6 MB
    icon ~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/6. Prioritizing Devices, Software and Apps.mp4 60.1 MB
    icon ~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/7. Personnel Security Requirements.mp4 93.6 MB
    icon ~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/8. Governance.mp4 69 MB
    icon ~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/9. Risk Assessment and Management.mp4 68.7 MB
    icon ~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/1. User and Network Infrastructure.mp4 129.8 MB
    icon ~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/10. Patch Management.mp4 93.1 MB
    icon ~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/11. Maintenance.mp4 61.4 MB
    icon ~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/12. Protective Technology.mp4 84.4 MB
    icon ~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/2. Authentication and Access Control.mp4 95.7 MB
    icon ~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/3. Control List and Remote Access.mp4 73.6 MB
    icon ~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/4. Network Security Controls.mp4 165.7 MB
    icon ~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/5. Association and Authentication.mp4 87.5 MB
    icon ~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/6. Awareness and Training.mp4 45.9 MB
    icon ~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/7. Data Security.mp4 96.7 MB
    icon ~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/8. Hardware Integrity.mp4 100.8 MB
    icon ~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/9. Information Protection.mp4 109.8 MB
    icon ~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/1. Developing a Continuity of Operations Plan.mp4 98.4 MB
    icon ~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/2. Incident Response.mp4 97.3 MB
    icon ~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/3. Executable Response Plan.mp4 110.7 MB
    icon ~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/4. Importance of Communications.mp4 52.3 MB
    icon ~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/5. Incident Analysis.mp4 143 MB
    icon ~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/6. Mitigation.mp4 96.3 MB
    icon ~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/7. Recover.mp4 195.8 MB
    icon ~Get Your Files Here !/5. Effective Supply Chain Risk Management/1. Supply Chain Risk Management.mp4 86.5 MB
    icon ~Get Your Files Here !/5. Effective Supply Chain Risk Management/2. Supply Chain Management Practices.mp4 58 MB
    icon ~Get Your Files Here !/5. Effective Supply Chain Risk Management/3. Incorporating the Supply Chain Category.mp4 78.3 MB
    icon ~Get Your Files Here !/5. Effective Supply Chain Risk Management/4. Develop, Assess and Test Supply Chain Risks.mp4 117.7 MB
    icon ~Get Your Files Here !/Bonus Resources.txt 386 B

Similar Torrents