[ TutPig.com ] Linkedin - Certified Information Security Manager (CISM) Cert Prep - 2 Information Security Risk Management

File Type Create Time File Size Seeders Leechers Updated
Movie 2022-07-05 781.99MB 10 3 2 weeks ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
TutPig  com  Linkedin  Certified  Information  Security  Manager  CISM  Cert  Prep  Information  Security  Risk  Management  
Related Torrents
  1. [ CourseWikia.com ] AWS Certified Cloud Practitioner (CLF-C02) Cert Prep - 2 Security and Compliance 112.31MB
  2. Doshi H. - Certified Information Security Manager Exam Prep Guide - Second Edition - 2022.epub 4.52MB
  3. [ DevCourseWeb.com ] Linkedin - Cisco CCNP ENCOR (350-401) Cert Prep - 1 Architecture, Virtualization, and Infrastructure 2.89GB
  4. [ DevCourseWeb.com ] Linkedin - CompTIA Security + (SY0-701) Cert Prep - 1 General Security Concepts 309.25MB
  5. [ FreeCourseWeb.com ] AWS Certified Cloud Practitioner (CLF-C02) Cert Prep - 3 Cloud Technology and Services 215.70MB
  6. [ FreeCourseWeb.com ] Linkedin - AWS Advanced Security Management - Patterns and Practices 188.59MB
  7. [ DevCourseWeb.com ] Azure Network Engineer Associate (AZ-700) Cert Prep - 3 Design and Implement Application Delivery Services 527.77MB
  8. [ CourseWikia.com ] Linkedin - CompTIA Security + (SY0-701) Cert Prep - 3 Security Architecture 501.99MB
  9. [ FreeCourseWeb.com ] Linkedin - Cert Prep - CompTIA Cloud Essentials + (CLO-002) 145.40MB
  10. [ DevCourseWeb.com ] Linkedin - Azure AI Engineer Associate (AI-102) Cert Prep - Implement Natural Language Processing Solutions 1.63GB
Files
  1. Get Bonus Downloads Here.url 176B
  2. ~Get Your Files Here !/01 - Introduction/01 - Information security risk management.mp4 13.21MB
  3. ~Get Your Files Here !/01 - Introduction/01 - Information security risk management.srt 1.20KB
  4. ~Get Your Files Here !/01 - Introduction/02 - What you need to know.mp4 1.99MB
  5. ~Get Your Files Here !/01 - Introduction/02 - What you need to know.srt 1.20KB
  6. ~Get Your Files Here !/01 - Introduction/03 - Study resources.mp4 13.42MB
  7. ~Get Your Files Here !/01 - Introduction/03 - Study resources.srt 2.52KB
  8. ~Get Your Files Here !/02 - 1. Risk Assessment/01 - Risk assessment.mp4 13.71MB
  9. ~Get Your Files Here !/02 - 1. Risk Assessment/01 - Risk assessment.srt 8.57KB
  10. ~Get Your Files Here !/02 - 1. Risk Assessment/02 - Quantitative risk assessment.mp4 20.06MB
  11. ~Get Your Files Here !/02 - 1. Risk Assessment/02 - Quantitative risk assessment.srt 10.67KB
  12. ~Get Your Files Here !/02 - 1. Risk Assessment/03 - Information classification.mp4 12.48MB
  13. ~Get Your Files Here !/02 - 1. Risk Assessment/03 - Information classification.srt 6.71KB
  14. ~Get Your Files Here !/03 - 2. Risk Management/01 - Risk treatment options.mp4 17.17MB
  15. ~Get Your Files Here !/03 - 2. Risk Management/01 - Risk treatment options.srt 7.51KB
  16. ~Get Your Files Here !/03 - 2. Risk Management/02 - Security control selection and implementation.mp4 20.06MB
  17. ~Get Your Files Here !/03 - 2. Risk Management/02 - Security control selection and implementation.srt 10.67KB
  18. ~Get Your Files Here !/03 - 2. Risk Management/03 - Ongoing risk management.mp4 8.80MB
  19. ~Get Your Files Here !/03 - 2. Risk Management/03 - Ongoing risk management.srt 4.60KB
  20. ~Get Your Files Here !/03 - 2. Risk Management/04 - Risk management frameworks.mp4 10.93MB
  21. ~Get Your Files Here !/03 - 2. Risk Management/04 - Risk management frameworks.srt 5.91KB
  22. ~Get Your Files Here !/03 - 2. Risk Management/05 - Risk visibility and reporting.mp4 21.23MB
  23. ~Get Your Files Here !/03 - 2. Risk Management/05 - Risk visibility and reporting.srt 8.08KB
  24. ~Get Your Files Here !/04 - 3. Malware/01 - Comparing viruses, worms, and Trojans.mp4 23.30MB
  25. ~Get Your Files Here !/04 - 3. Malware/01 - Comparing viruses, worms, and Trojans.srt 9.68KB
  26. ~Get Your Files Here !/04 - 3. Malware/02 - Malware payloads.mp4 20.49MB
  27. ~Get Your Files Here !/04 - 3. Malware/02 - Malware payloads.srt 10.35KB
  28. ~Get Your Files Here !/04 - 3. Malware/03 - Understanding backdoors and logic bombs.mp4 15.59MB
  29. ~Get Your Files Here !/04 - 3. Malware/03 - Understanding backdoors and logic bombs.srt 8.14KB
  30. ~Get Your Files Here !/04 - 3. Malware/04 - Botnets.mp4 9.28MB
  31. ~Get Your Files Here !/04 - 3. Malware/04 - Botnets.srt 6.05KB
  32. ~Get Your Files Here !/04 - 3. Malware/05 - Advanced persistent threats.mp4 10.58MB
  33. ~Get Your Files Here !/04 - 3. Malware/05 - Advanced persistent threats.srt 6.12KB
  34. ~Get Your Files Here !/05 - 4. Understanding Attackers/01 - Cybersecurity adversaries.mp4 16.92MB
  35. ~Get Your Files Here !/05 - 4. Understanding Attackers/01 - Cybersecurity adversaries.srt 8.48KB
  36. ~Get Your Files Here !/05 - 4. Understanding Attackers/02 - Preventing insider threats.mp4 9.82MB
  37. ~Get Your Files Here !/05 - 4. Understanding Attackers/02 - Preventing insider threats.srt 4.75KB
  38. ~Get Your Files Here !/05 - 4. Understanding Attackers/03 - Threat intelligence.mp4 11.11MB
  39. ~Get Your Files Here !/05 - 4. Understanding Attackers/03 - Threat intelligence.srt 6.44KB
  40. ~Get Your Files Here !/06 - 5. Attack Types/01 - Denial of service attacks.mp4 15.65MB
  41. ~Get Your Files Here !/06 - 5. Attack Types/01 - Denial of service attacks.srt 7.74KB
  42. ~Get Your Files Here !/06 - 5. Attack Types/02 - Eavesdropping attacks.mp4 13.55MB
  43. ~Get Your Files Here !/06 - 5. Attack Types/02 - Eavesdropping attacks.srt 7.92KB
  44. ~Get Your Files Here !/06 - 5. Attack Types/03 - DNS attacks.mp4 12.59MB
  45. ~Get Your Files Here !/06 - 5. Attack Types/03 - DNS attacks.srt 6.27KB
  46. ~Get Your Files Here !/06 - 5. Attack Types/04 - Layer 2 attacks.mp4 7.10MB
  47. ~Get Your Files Here !/06 - 5. Attack Types/04 - Layer 2 attacks.srt 3.83KB
  48. ~Get Your Files Here !/06 - 5. Attack Types/05 - Network address spoofing.mp4 12.03MB
  49. ~Get Your Files Here !/06 - 5. Attack Types/05 - Network address spoofing.srt 6.90KB
  50. ~Get Your Files Here !/06 - 5. Attack Types/06 - Password attacks.mp4 32.82MB
  51. ~Get Your Files Here !/06 - 5. Attack Types/06 - Password attacks.srt 14.53KB
  52. ~Get Your Files Here !/06 - 5. Attack Types/07 - Password spraying and credential stuffing.mp4 6.12MB
  53. ~Get Your Files Here !/06 - 5. Attack Types/07 - Password spraying and credential stuffing.srt 3.21KB
  54. ~Get Your Files Here !/06 - 5. Attack Types/08 - Watering hole attacks.mp4 12.00MB
  55. ~Get Your Files Here !/06 - 5. Attack Types/08 - Watering hole attacks.srt 5.74KB
  56. ~Get Your Files Here !/07 - 6. Social Engineering Attacks/01 - Social engineering.mp4 16.91MB
  57. ~Get Your Files Here !/07 - 6. Social Engineering Attacks/01 - Social engineering.srt 10.19KB
  58. ~Get Your Files Here !/07 - 6. Social Engineering Attacks/02 - Impersonation attacks.mp4 15.11MB
  59. ~Get Your Files Here !/07 - 6. Social Engineering Attacks/02 - Impersonation attacks.srt 9.98KB
  60. ~Get Your Files Here !/07 - 6. Social Engineering Attacks/03 - Physical social engineering.mp4 11.07MB
  61. ~Get Your Files Here !/07 - 6. Social Engineering Attacks/03 - Physical social engineering.srt 4.64KB
  62. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/01 - What is vulnerability management.mp4 16.64MB
  63. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/01 - What is vulnerability management.srt 9.77KB
  64. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/02 - Identify scan targets.mp4 13.74MB
  65. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/02 - Identify scan targets.srt 8.56KB
  66. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/03 - Scan configuration.mp4 15.49MB
  67. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/03 - Scan configuration.srt 10.91KB
  68. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/04 - Scan perspective.mp4 12.75MB
  69. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/04 - Scan perspective.srt 8.54KB
  70. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/05 - Security Content Automation Protocol (SCAP).mp4 6.99MB
  71. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/05 - Security Content Automation Protocol (SCAP).srt 4.32KB
  72. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/06 - Common Vulnerability Scoring System (CVSS).mp4 10.33MB
  73. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/06 - Common Vulnerability Scoring System (CVSS).srt 6.18KB
  74. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/07 - Analyzing scan reports.mp4 16.16MB
  75. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/07 - Analyzing scan reports.srt 8.99KB
  76. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/08 - Correlating scan results.mp4 7.95MB
  77. ~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/08 - Correlating scan results.srt 4.44KB
  78. ~Get Your Files Here !/09 - 8. Awareness and Training/01 - Security awareness training.mp4 19.83MB
  79. ~Get Your Files Here !/09 - 8. Awareness and Training/01 - Security awareness training.srt 9.65KB
  80. ~Get Your Files Here !/09 - 8. Awareness and Training/02 - Compliance training.mp4 13.28MB
  81. ~Get Your Files Here !/09 - 8. Awareness and Training/02 - Compliance training.srt 5.47KB
  82. ~Get Your Files Here !/09 - 8. Awareness and Training/03 - User habits.mp4 9.51MB
  83. ~Get Your Files Here !/09 - 8. Awareness and Training/03 - User habits.srt 6.63KB
  84. ~Get Your Files Here !/09 - 8. Awareness and Training/04 - Measuring compliance and security posture.mp4 7.73MB
  85. ~Get Your Files Here !/09 - 8. Awareness and Training/04 - Measuring compliance and security posture.srt 3.48KB
  86. ~Get Your Files Here !/09 - 8. Awareness and Training/05 - Awareness program reviews.mp4 3.19MB
  87. ~Get Your Files Here !/09 - 8. Awareness and Training/05 - Awareness program reviews.srt 2.23KB
  88. ~Get Your Files Here !/10 - 9. Business Continuity/01 - Business continuity planning.mp4 8.03MB
  89. ~Get Your Files Here !/10 - 9. Business Continuity/01 - Business continuity planning.srt 6.20KB
  90. ~Get Your Files Here !/10 - 9. Business Continuity/02 - Business continuity controls.mp4 11.09MB
  91. ~Get Your Files Here !/10 - 9. Business Continuity/02 - Business continuity controls.srt 6.96KB
  92. ~Get Your Files Here !/10 - 9. Business Continuity/03 - High availability and fault tolerance.mp4 14.59MB
  93. ~Get Your Files Here !/10 - 9. Business Continuity/03 - High availability and fault tolerance.srt 10.67KB
  94. ~Get Your Files Here !/11 - 10. Disaster Recovery/01 - Disaster recovery planning.mp4 14.07MB
  95. ~Get Your Files Here !/11 - 10. Disaster Recovery/01 - Disaster recovery planning.srt 8.32KB
  96. ~Get Your Files Here !/11 - 10. Disaster Recovery/02 - Backups.mp4 11.13MB
  97. ~Get Your Files Here !/11 - 10. Disaster Recovery/02 - Backups.srt 7.78KB
  98. ~Get Your Files Here !/11 - 10. Disaster Recovery/03 - Restoring backups.mp4 7.25MB
  99. ~Get Your Files Here !/11 - 10. Disaster Recovery/03 - Restoring backups.srt 4.34KB
  100. ~Get Your Files Here !/11 - 10. Disaster Recovery/04 - Disaster recovery sites.mp4 12.52MB
  101. ~Get Your Files Here !/11 - 10. Disaster Recovery/04 - Disaster recovery sites.srt 6.41KB
  102. ~Get Your Files Here !/11 - 10. Disaster Recovery/05 - Testing BCDR plans.mp4 10.96MB
  103. ~Get Your Files Here !/11 - 10. Disaster Recovery/05 - Testing BCDR plans.srt 6.15KB
  104. ~Get Your Files Here !/12 - 11. Supply Chain Risk/01 - Managing vendor relationships.mp4 12.40MB
  105. ~Get Your Files Here !/12 - 11. Supply Chain Risk/01 - Managing vendor relationships.srt 7.43KB
  106. ~Get Your Files Here !/12 - 11. Supply Chain Risk/02 - Vendor agreements.mp4 15.62MB
  107. ~Get Your Files Here !/12 - 11. Supply Chain Risk/02 - Vendor agreements.srt 7.82KB
  108. ~Get Your Files Here !/12 - 11. Supply Chain Risk/03 - Vendor information management.mp4 6.13MB
  109. ~Get Your Files Here !/12 - 11. Supply Chain Risk/03 - Vendor information management.srt 3.25KB
  110. ~Get Your Files Here !/12 - 11. Supply Chain Risk/04 - Audits and assessments.mp4 18.81MB
  111. ~Get Your Files Here !/12 - 11. Supply Chain Risk/04 - Audits and assessments.srt 10.43KB
  112. ~Get Your Files Here !/12 - 11. Supply Chain Risk/05 - Cloud audits.mp4 13.23MB
  113. ~Get Your Files Here !/12 - 11. Supply Chain Risk/05 - Cloud audits.srt 7.01KB
  114. ~Get Your Files Here !/13 - 12. Compliance/01 - Legal and compliance risks.mp4 7.41MB
  115. ~Get Your Files Here !/13 - 12. Compliance/01 - Legal and compliance risks.srt 3.79KB
  116. ~Get Your Files Here !/13 - 12. Compliance/02 - Privacy compliance.mp4 8.84MB
  117. ~Get Your Files Here !/13 - 12. Compliance/02 - Privacy compliance.srt 6.12KB
  118. ~Get Your Files Here !/13 - 12. Compliance/03 - Data breaches.mp4 6.96MB
  119. ~Get Your Files Here !/13 - 12. Compliance/03 - Data breaches.srt 4.20KB
  120. ~Get Your Files Here !/13 - 12. Compliance/04 - Intellectual property.mp4 17.15MB
  121. ~Get Your Files Here !/13 - 12. Compliance/04 - Intellectual property.srt 7.24KB
  122. ~Get Your Files Here !/14 - Conclusion/01 - Continuing your studies.mp4 6.71MB
  123. ~Get Your Files Here !/14 - Conclusion/01 - Continuing your studies.srt 1.15KB
  124. ~Get Your Files Here !/Bonus Resources.txt 386B