Pluralsight - CISSP - Security and Risk Management

File Type Create Time File Size Seeders Leechers Updated
Archive file 2017-08-05 433.99MB 1 0 3 weeks ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
Pluralsight  CISSP  Security  and  Risk  Management  
Related Torrents
  1. [ DevCourseWeb.com ] CISSP-Security and Risk Management by The Knowledge Bits 264.48MB
  2. CISSP, 3 in 1- Beginner's Guide to Learn the Realms of Security and Risk Management from A-Z using 2.61MB
  3. [ DevCourseWeb.com ] Lynda - CISSP Cert Prep - 1 Security and Risk Management (2021).zip 626.45MB
  4. Linkedin.Learning.CISSP.Cert.Prep.1.Security.and.Risk.Management-QUiD 652.54MB
  5. Security and Risk Management.rar 591.96MB
  6. Lesson 1 Security and Risk Management 2.44GB
  7. [ FreeCourseWeb.com ] Udemy - Unleash Risk Measurement and Risk Management Essentials 1.50GB
  8. Nguyen N. Analytics in Finance and Risk Management 2023 8.82MB
  9. [ FreeCourseWeb.com ] Better Stock Trading - Money and Risk Management 13.17MB
  10. [ FreeCryptoLearn.com ] Forex Trading for Beginners - Understanding the basics of forex trading - Strategy building and risk management 299.21KB
Files
  1. 00.Course Overview/0001.Course Overview.mp4 6.44MB
  2. 01.Introduction/0101.Introduction.mp4 8.93MB
  3. 02.Fundamental Security Principles/0204.The CIA Triad.mp4 15.49MB
  4. 02.Fundamental Security Principles/0205.Accountability and Assurance.mp4 8.82MB
  5. 02.Fundamental Security Principles/0202.Security and Risk Management Fundamentals.mp4 8.16MB
  6. 02.Fundamental Security Principles/0207.Delaying, Preventing, or Detecting Attacks.mp4 7.14MB
  7. 02.Fundamental Security Principles/0209.Ethics.mp4 4.68MB
  8. 02.Fundamental Security Principles/0208.Due Care and Due Diligence.mp4 3.45MB
  9. 02.Fundamental Security Principles/0201.Introduction.mp4 3.18MB
  10. 02.Fundamental Security Principles/0203.Balancing Business and Security.mp4 3.16MB
  11. 02.Fundamental Security Principles/0206.Control Types.mp4 2.97MB
  12. 02.Fundamental Security Principles/0210.Conclusion.mp4 1.25MB
  13. 03.Legal and Regulatory/0305.Important Laws.mp4 11.75MB
  14. 03.Legal and Regulatory/0303.Criminal and Civil Law.mp4 3.66MB
  15. 03.Legal and Regulatory/0304.Administrative Law.mp4 3.43MB
  16. 03.Legal and Regulatory/0301.Introduction.mp4 1.61MB
  17. 03.Legal and Regulatory/0302.Legal Systems.mp4 975.66KB
  18. 03.Legal and Regulatory/0306.Summary.mp4 625.65KB
  19. 04.Computer Crime/0406.Payback and Government Hackers.mp4 5.49MB
  20. 04.Computer Crime/0402.Computers Can Be Used for EVIL.mp4 5.44MB
  21. 04.Computer Crime/0405.Spies Are Real.mp4 5.01MB
  22. 04.Computer Crime/0408.Fraud, Spam, and Slander.mp4 4.53MB
  23. 04.Computer Crime/0404.It's All About the Money.mp4 3.99MB
  24. 04.Computer Crime/0403.Some Hack Just Because They Can.mp4 2.91MB
  25. 04.Computer Crime/0407.Theft, Vandalism, and Trespass.mp4 2.77MB
  26. 04.Computer Crime/0409.Conclusion.mp4 2.63MB
  27. 04.Computer Crime/0401.Introduction.mp4 1.29MB
  28. 05.Intellectual Property/0502.Patents.mp4 3.57MB
  29. 05.Intellectual Property/0504.Copyrights.mp4 2.67MB
  30. 05.Intellectual Property/0503.Trademarks and Trade Secrets.mp4 2.28MB
  31. 05.Intellectual Property/0501.Introduction.mp4 1.11MB
  32. 05.Intellectual Property/0505.Summary.mp4 632.19KB
  33. 06.Privacy/0603.Privacy Law Examples.mp4 14.59MB
  34. 06.Privacy/0602.Privacy Matters.mp4 8.09MB
  35. 06.Privacy/0601.Introduction.mp4 1.71MB
  36. 06.Privacy/0604.Conclusion.mp4 1.63MB
  37. 07.Licensing/0705.Commercial Versus Non-commercial Licensing.mp4 4.72MB
  38. 07.Licensing/0707.Free Software.mp4 4.58MB
  39. 07.Licensing/0704.Open Versus Closed Source Licensing.mp4 4.01MB
  40. 07.Licensing/0702.Reasons for Licensing.mp4 3.17MB
  41. 07.Licensing/0709.Shareware.mp4 1.77MB
  42. 07.Licensing/0708.Demo and Trial Licenses.mp4 1.73MB
  43. 07.Licensing/0710.Academic Software Licensing.mp4 1.25MB
  44. 07.Licensing/0711.Summary.mp4 1.17MB
  45. 07.Licensing/0701.Introduction.mp4 1.11MB
  46. 07.Licensing/0706.End User License Agreements.mp4 1.05MB
  47. 07.Licensing/0703.License Types.mp4 495.75KB
  48. 08.Trans-border Data Flow/0802.Trans-border Data Flow.mp4 8.17MB
  49. 08.Trans-border Data Flow/0803.Import and Export Controls.mp4 4.75MB
  50. 08.Trans-border Data Flow/0804.Summary.mp4 1.79MB
  51. 08.Trans-border Data Flow/0801.Introduction.mp4 1.38MB
  52. 09.Security Awareness/0902.Develop a Culture of Security Awareness.mp4 8.63MB
  53. 09.Security Awareness/0905.Awareness Validation.mp4 8.07MB
  54. 09.Security Awareness/0903.Types of Security Awareness.mp4 5.05MB
  55. 09.Security Awareness/0904.Expected Impact of Training.mp4 3.95MB
  56. 09.Security Awareness/0901.Introduction.mp4 1.69MB
  57. 09.Security Awareness/0906.Summary.mp4 1.31MB
  58. 10.Aligning Security to the Organization/1003.Roles and Responsibilities.mp4 11.33MB
  59. 10.Aligning Security to the Organization/1005.Security Goals.mp4 5.86MB
  60. 10.Aligning Security to the Organization/1004.Organizational Objectives.mp4 2.81MB
  61. 10.Aligning Security to the Organization/1006.Security Mission.mp4 2.36MB
  62. 10.Aligning Security to the Organization/1001.Introduction.mp4 1.83MB
  63. 10.Aligning Security to the Organization/1007.Conclusion.mp4 1.30MB
  64. 10.Aligning Security to the Organization/1002.Governance.mp4 1.00MB
  65. 11.Creating Policies, Procedures, Guidelines, and Baselines/1102.Security Frameworks Introduction.mp4 7.59MB
  66. 11.Creating Policies, Procedures, Guidelines, and Baselines/1103.Effective Policies and Procedures.mp4 7.51MB
  67. 11.Creating Policies, Procedures, Guidelines, and Baselines/1104.Policy Sections.mp4 5.34MB
  68. 11.Creating Policies, Procedures, Guidelines, and Baselines/1105.Procedures.mp4 4.86MB
  69. 11.Creating Policies, Procedures, Guidelines, and Baselines/1107.Baselines.mp4 3.82MB
  70. 11.Creating Policies, Procedures, Guidelines, and Baselines/1108.Summary.mp4 2.35MB
  71. 11.Creating Policies, Procedures, Guidelines, and Baselines/1101.Introduction.mp4 1.92MB
  72. 11.Creating Policies, Procedures, Guidelines, and Baselines/1106.Guidelines.mp4 1.89MB
  73. 12.Continuity Planning and Disaster Recovery/1208.Disaster Recovery Controls.mp4 3.55MB
  74. 12.Continuity Planning and Disaster Recovery/1204.Disaster Recovery Planning vs. Business Continuity Planning.mp4 2.82MB
  75. 12.Continuity Planning and Disaster Recovery/1205.Testing Your Plans.mp4 2.51MB
  76. 12.Continuity Planning and Disaster Recovery/1201.Introduction.mp4 1.86MB
  77. 12.Continuity Planning and Disaster Recovery/1203.Conducting a Business Impact Analysis.mp4 1.76MB
  78. 12.Continuity Planning and Disaster Recovery/1202.Business Continuity Process.mp4 1.73MB
  79. 12.Continuity Planning and Disaster Recovery/1207.Recovering from Disaster.mp4 1.40MB
  80. 12.Continuity Planning and Disaster Recovery/1206.Disaster Events.mp4 958.23KB
  81. 12.Continuity Planning and Disaster Recovery/1209.Conclusion.mp4 631.93KB
  82. 13.Threat Modeling/1307.Threat Identification using STRIDE.mp4 4.90MB
  83. 13.Threat Modeling/1303.Threat Modeling Focus.mp4 4.62MB
  84. 13.Threat Modeling/1302.Threat Modeling Overview.mp4 3.69MB
  85. 13.Threat Modeling/1304.Threat Model - Scoping.mp4 3.31MB
  86. 13.Threat Modeling/1301.Introduction.mp4 1.92MB
  87. 13.Threat Modeling/1305.Reviewing the Architecture.mp4 1.87MB
  88. 13.Threat Modeling/1308.Defining and Documenting Countermeasures.mp4 1.77MB
  89. 13.Threat Modeling/1310.Summary.mp4 1.65MB
  90. 13.Threat Modeling/1306.Decomposing.mp4 1.55MB
  91. 13.Threat Modeling/1309.Prioritization with DREAD.mp4 1.05MB
  92. 14.Risk Assessment Concepts/1408.Real World Threats and Vulnerabilities.mp4 3.35MB
  93. 14.Risk Assessment Concepts/1411.Risk Acceptance and Assignment.mp4 3.24MB
  94. 14.Risk Assessment Concepts/1403.Threat Source.mp4 2.79MB
  95. 14.Risk Assessment Concepts/1406.Risk Assessments.mp4 2.77MB
  96. 14.Risk Assessment Concepts/1402.Threats.mp4 2.64MB
  97. 14.Risk Assessment Concepts/1407.Risk Assessment Methodologies.mp4 2.58MB
  98. 14.Risk Assessment Concepts/1401.Introduction.mp4 2.04MB
  99. 14.Risk Assessment Concepts/1404.Vulnerabilities.mp4 2.02MB
  100. 14.Risk Assessment Concepts/1412.Common Calculations.mp4 1.52MB
  101. 14.Risk Assessment Concepts/1413.Conclusion.mp4 1.06MB
  102. 14.Risk Assessment Concepts/1410.Analysis Approach.mp4 1.01MB
  103. 14.Risk Assessment Concepts/1409.Assessment Approach.mp4 870.48KB
  104. 14.Risk Assessment Concepts/1405.Risk.mp4 754.30KB
  105. 15.Countermeasure Selection Process/1508.Example Countermeasures.mp4 5.75MB
  106. 15.Countermeasure Selection Process/1506.Assessing Control Strength.mp4 3.30MB
  107. 15.Countermeasure Selection Process/1505.Control Considerations.mp4 2.90MB
  108. 15.Countermeasure Selection Process/1504.Control Types.mp4 2.43MB
  109. 15.Countermeasure Selection Process/1502.What Is a Countermeasure.mp4 2.04MB
  110. 15.Countermeasure Selection Process/1503.Control Variations.mp4 1.99MB
  111. 15.Countermeasure Selection Process/1501.Introduction.mp4 1.96MB
  112. 15.Countermeasure Selection Process/1509.Conclusion.mp4 1.20MB
  113. 15.Countermeasure Selection Process/1507.Countermeasure Assurance.mp4 1.15MB
  114. 16.Frameworks/1604.NIST Risk Management Framework RMF.mp4 8.64MB
  115. 16.Frameworks/1605.FAIR.mp4 4.12MB
  116. 16.Frameworks/1606.OCTAVE Allegro.mp4 3.06MB
  117. 16.Frameworks/1601.Introduction.mp4 2.57MB
  118. 16.Frameworks/1603.Leveraging Frameworks.mp4 1.95MB
  119. 16.Frameworks/1602.Risk Management Framework.mp4 1.16MB
  120. 16.Frameworks/1607.Summary.mp4 897.41KB
  121. Files/cissp-security-risk-management.zip 21.20MB