[ DevCourseWeb.com ] Udemy - Selection and Implementation of Cybersecurity Risks Controls
    
    File List
    
        
            
                
                    - ~Get Your Files Here !/2. SECTION-2/8. 19- The role of governance in the effective selection and implementation of cybe.mp4  136.3 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/14. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT2.mp4  116.7 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/16. 25- Measuring the effectiveness of implemented controls.mp4  112.0 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/17. Putting it all together-The Selection and Implementation of Cyber Risks controls.mp4  110.4 MB
 
                
                    - ~Get Your Files Here !/1. Introduction/10. 9-Key considerations for the identification- selection & implementation of contr.mp4  97.1 MB
 
                
                    - ~Get Your Files Here !/1. Introduction/7. 6-Approach to Control Selection_ pt2.mp4  89.7 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/9. 20-Why not implement frameworks that already have recommended controls.mp4  86.1 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/15. 24-Implementation Plan for selected controls.mp4  83.0 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/11. 21-Challenges, & considerations associated with implementing frameworks-pt2.mp4  79.0 MB
 
                
                    - ~Get Your Files Here !/1. Introduction/11. 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis.mp4  77.4 MB
 
                
                    - ~Get Your Files Here !/1. Introduction/9. 8-Introduction to security controls.mp4  73.8 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/7. 18-Documenting Cybersecurity Risk Assessment Report-Pt2.mp4  72.0 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/5. 17-Determine likelihood, Impact, Calculate risk.mp4  69.1 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/13. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT1.mp4  60.0 MB
 
                
                    - ~Get Your Files Here !/1. Introduction/12. 11-Cost Benefit Analysis associated with controls selection.mp4  55.6 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/3. 15-Steps involved in assessing the identified cyber risks in web server.mp4  52.5 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/1. 14-High-level process of selecting controls to protect ecommerce web server-Pt1.mp4  51.9 MB
 
                
                    - ~Get Your Files Here !/1. Introduction/14. 13-Regulatory Compliance, Incident Response Planning.mp4  51.4 MB
 
                
                    - ~Get Your Files Here !/1. Introduction/13. 12- Technology integration, operational impact, continuous monitoring, employee.mp4  50.3 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/6. 18- Documenting Cybersecurity Risk Assessment Report-Pt1.mp4  48.1 MB
 
                
                    - ~Get Your Files Here !/1. Introduction/8. 7-Applying same approach to real Data Breaches at a high-level.mp4  46.4 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/4. 16-Identify assets, identify threats, identify vulnerabilities.mp4  42.7 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/10. 21-Challenges, & considerations associated with implementing frameworks-pt1.mp4  42.0 MB
 
                
                    - ~Get Your Files Here !/1. Introduction/4. 3-Meet your Instructor-Mentor.mp4  40.1 MB
 
                
                    - ~Get Your Files Here !/1. Introduction/5. 4-Course Roadmap.mp4  32.1 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/12. 22-When to use frameworks for the selection and implementation of controls.mp4  29.2 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/18. 27-Course Recap-END.mp4  28.0 MB
 
                
                    - ~Get Your Files Here !/1. Introduction/3. 2-About the course.mp4  26.8 MB
 
                
                    - ~Get Your Files Here !/1. Introduction/1. Introduction.mp4  25.4 MB
 
                
                    - ~Get Your Files Here !/1. Introduction/6. 5-Approach to Control Selection_ pt1.mp4  23.4 MB
 
                
                    - ~Get Your Files Here !/1. Introduction/2. 1b-Course Intro- The Case at hand.mp4  19.8 MB
 
                
                    - ~Get Your Files Here !/2. SECTION-2/2. 14-High-level process of selecting controls to protect ecommerce web server-Pt2.mp4  7.6 MB
 
                
                    - ~Get Your Files Here !/4. Course Resources/1. Course Resources.html  1.2 KB
 
                
                    - ~Get Your Files Here !/Bonus Resources.txt  386 bytes
 
                
                    - Get Bonus Downloads Here.url  182 bytes
 
                
                    - ~Get Your Files Here !/3. Assignment- To reinforce knowledge gained/1. Research Exercise-CIS Controls.html  175 bytes
 
                
            
        
     
    Download Torrent
    
    Related Resources
    
    Copyright Infringement
    
        If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.