Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
01-System and Privacy Data Protection - Introduction.en.srt |
1.37KB |
01-System and Privacy Data Protection - Introduction.mp4 |
40.10MB |
02-Learning objectives.en.srt |
492B |
02-Learning objectives.mp4 |
16.48MB |
03-1.1 Privacy vs. Security.en.srt |
8.96KB |
03-1.1 Privacy vs. Security.mp4 |
155.32MB |
04-1.2 Non-technical Controls.en.srt |
9.11KB |
04-1.2 Non-technical Controls.mp4 |
120.71MB |
05-1.3 Classification, Ownership, Retention, and Data Types.en.srt |
18.59KB |
05-1.3 Classification, Ownership, Retention, and Data Types.mp4 |
233.87MB |
06-1.4 Confidentiality, Legal Requirements, and Data Sovereignty.en.srt |
12.84KB |
06-1.4 Confidentiality, Legal Requirements, and Data Sovereignty.mp4 |
199.40MB |
07-1.5 Data Minimization, Purpose Limitation, and NDA.en.srt |
2.33KB |
07-1.5 Data Minimization, Purpose Limitation, and NDA.mp4 |
30.70MB |
08-1.6 Technical Controls.en.srt |
1.79KB |
08-1.6 Technical Controls.mp4 |
21.06MB |
09-1.7 Encryption.en.srt |
8.00KB |
09-1.7 Encryption.mp4 |
114.80MB |
10-1.8 Data Loss Prevention (DLP).en.srt |
1.70KB |
10-1.8 Data Loss Prevention (DLP).mp4 |
10.32MB |
11-1.9 Data Masking and Deidentification.en.srt |
4.96KB |
11-1.9 Data Masking and Deidentification.mp4 |
69.44MB |
12-1.10 Tokenization.en.srt |
2.03KB |
12-1.10 Tokenization.mp4 |
24.58MB |
13-1.11 Digital Rights Management (DRM) and Watermarking.en.srt |
5.79KB |
13-1.11 Digital Rights Management (DRM) and Watermarking.mp4 |
61.66MB |
14-1.12 Geographic Access Requirements.en.srt |
3.97KB |
14-1.12 Geographic Access Requirements.mp4 |
52.03MB |
15-1.13 Access Controls.en.srt |
1.84KB |
15-1.13 Access Controls.mp4 |
21.14MB |
16-Learning objectives.en.srt |
499B |
16-Learning objectives.mp4 |
18.03MB |
17-2.1 Business Impact and Risk Calculation.en.srt |
1.72KB |
17-2.1 Business Impact and Risk Calculation.mp4 |
23.90MB |
18-2.2 Communication Risk Factors and Risk Prioritization.en.srt |
9.55KB |
18-2.2 Communication Risk Factors and Risk Prioritization.mp4 |
120.55MB |
19-2.3 System Assessments.en.srt |
6.56KB |
19-2.3 System Assessments.mp4 |
68.74MB |
20-2.4 Compensating Controls and Training - Part 1.en.srt |
19.93KB |
20-2.4 Compensating Controls and Training - Part 1.mp4 |
207.90MB |
21-2.5 Compensating Controls and Training - Part 2.en.srt |
13.94KB |
21-2.5 Compensating Controls and Training - Part 2.mp4 |
151.52MB |
22-2.6 Supply Chain Assessment.en.srt |
7.33KB |
22-2.6 Supply Chain Assessment.mp4 |
60.91MB |
23-Learning objectives.en.srt |
517B |
23-Learning objectives.mp4 |
17.95MB |
24-3.1 Frameworks.en.srt |
3.85KB |
24-3.1 Frameworks.mp4 |
46.08MB |
25-3.2 AUP, Password Policies, Data Ownership, and Other Procedures.en.srt |
16.95KB |
25-3.2 AUP, Password Policies, Data Ownership, and Other Procedures.mp4 |
176.54MB |
26-3.3 Control Types.en.srt |
16.92KB |
26-3.3 Control Types.mp4 |
166.71MB |
27-3.4 Audits and Assessments.en.srt |
10.59KB |
27-3.4 Audits and Assessments.mp4 |
70.37MB |
28-Learning objectives.en.srt |
422B |
28-Learning objectives.mp4 |
15.03MB |
29-4.1 Event Logs.en.srt |
6.66KB |
29-4.1 Event Logs.mp4 |
32.18MB |
30-4.2 Syslogs.en.srt |
15.17KB |
30-4.2 Syslogs.mp4 |
131.58MB |
31-4.3 Firewall Logs.en.srt |
14.57KB |
31-4.3 Firewall Logs.mp4 |
193.13MB |
32-4.4 Web Application Firewall (WAF).en.srt |
11.17KB |
32-4.4 Web Application Firewall (WAF).mp4 |
172.57MB |
33-4.5 Proxy.en.srt |
22.57KB |
33-4.5 Proxy.mp4 |
315.31MB |
34-4.6 Intrusion Detection and Prevention (IDS_IPS).en.srt |
15.20KB |
34-4.6 Intrusion Detection and Prevention (IDS_IPS).mp4 |
203.89MB |
35-4.7 Impact Analysis.en.srt |
23.61KB |
35-4.7 Impact Analysis.mp4 |
461.11MB |
36-4.8 Organizations Impact vs. Localized Impact.en.srt |
2.93KB |
36-4.8 Organizations Impact vs. Localized Impact.mp4 |
24.27MB |
37-4.9 Immediate vs. Total.en.srt |
2.67KB |
37-4.9 Immediate vs. Total.mp4 |
16.84MB |
38-Learning objectives.en.srt |
451B |
38-Learning objectives.mp4 |
15.65MB |
39-5.1 Security Information and Event Management (SIEM) - Part 1.en.srt |
11.92KB |
39-5.1 Security Information and Event Management (SIEM) - Part 1.mp4 |
133.31MB |
40-5.2 Security Information and Event Management (SIEM) - Part 2.en.srt |
20.55KB |
40-5.2 Security Information and Event Management (SIEM) - Part 2.mp4 |
266.13MB |
41-5.3 Rule Writing.en.srt |
6.27KB |
41-5.3 Rule Writing.mp4 |
99.46MB |
42-5.4 Known-bad Internet Protocol (IP).en.srt |
5.73KB |
42-5.4 Known-bad Internet Protocol (IP).mp4 |
73.53MB |
43-Learning objectives.en.srt |
607B |
43-Learning objectives.mp4 |
18.51MB |
44-6.1 Malicious Payload.en.srt |
22.92KB |
44-6.1 Malicious Payload.mp4 |
222.59MB |
45-6.2 Domain Keys Identified Mail (DKIM).en.srt |
13.24KB |
45-6.2 Domain Keys Identified Mail (DKIM).mp4 |
158.66MB |
46-6.3 Domain-based Message.en.srt |
14.76KB |
46-6.3 Domain-based Message.mp4 |
94.21MB |
47-6.4 Embedded Links.en.srt |
5.86KB |
47-6.4 Embedded Links.mp4 |
54.07MB |
48-6.5 Impersonation.en.srt |
1.81KB |
48-6.5 Impersonation.mp4 |
20.15MB |
49-6.6 Header.en.srt |
3.39KB |
49-6.6 Header.mp4 |
77.13MB |
50-Learning objectives.en.srt |
606B |
50-Learning objectives.mp4 |
19.48MB |
51-7.1 Workflow Orchestration.en.srt |
14.18KB |
51-7.1 Workflow Orchestration.mp4 |
172.57MB |
52-7.2 Security Orchestration.en.srt |
4.25KB |
52-7.2 Security Orchestration.mp4 |
51.52MB |
53-7.3 Security Orchestration, Automation, and Response (SOAR).en.srt |
6.42KB |
53-7.3 Security Orchestration, Automation, and Response (SOAR).mp4 |
80.97MB |
54-7.4 Scripting.en.srt |
5.23KB |
54-7.4 Scripting.mp4 |
25.02MB |
55-7.5 Application Programming Interface (API) Integration.en.srt |
6.39KB |
55-7.5 Application Programming Interface (API) Integration.mp4 |
65.42MB |
56-7.6 Automated Malware Signature Creation.en.srt |
2.89KB |
56-7.6 Automated Malware Signature Creation.mp4 |
29.35MB |
57-7.7 Data Encrichment.en.srt |
5.74KB |
57-7.7 Data Encrichment.mp4 |
59.69MB |
58-7.8 Threat Feed Combination.en.srt |
3.60KB |
58-7.8 Threat Feed Combination.mp4 |
38.09MB |
59-7.9 Machine Learning.en.srt |
21.93KB |
59-7.9 Machine Learning.mp4 |
327.16MB |
60-7.10 Security Content Automation Protocol (SCAP).en.srt |
2.91KB |
60-7.10 Security Content Automation Protocol (SCAP).mp4 |
43.70MB |
61-7.11 Continuous Integration.en.srt |
4.10KB |
61-7.11 Continuous Integration.mp4 |
55.54MB |
62-7.12 Continuous Deployment and Delivery.en.srt |
2.18KB |
62-7.12 Continuous Deployment and Delivery.mp4 |
28.58MB |
63-System and Privacy Data Protection - Summary.en.srt |
1.00KB |
63-System and Privacy Data Protection - Summary.mp4 |
28.06MB |
Bonus Resources.txt |
386B |
Get Bonus Downloads Here.url |
180B |