Torrent Info
Title [ CourseHulu.com ] LiveLessons - System and Privacy Data Protection
Category
Size 5.98GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
01-System and Privacy Data Protection - Introduction.en.srt 1.37KB
01-System and Privacy Data Protection - Introduction.mp4 40.10MB
02-Learning objectives.en.srt 492B
02-Learning objectives.mp4 16.48MB
03-1.1 Privacy vs. Security.en.srt 8.96KB
03-1.1 Privacy vs. Security.mp4 155.32MB
04-1.2 Non-technical Controls.en.srt 9.11KB
04-1.2 Non-technical Controls.mp4 120.71MB
05-1.3 Classification, Ownership, Retention, and Data Types.en.srt 18.59KB
05-1.3 Classification, Ownership, Retention, and Data Types.mp4 233.87MB
06-1.4 Confidentiality, Legal Requirements, and Data Sovereignty.en.srt 12.84KB
06-1.4 Confidentiality, Legal Requirements, and Data Sovereignty.mp4 199.40MB
07-1.5 Data Minimization, Purpose Limitation, and NDA.en.srt 2.33KB
07-1.5 Data Minimization, Purpose Limitation, and NDA.mp4 30.70MB
08-1.6 Technical Controls.en.srt 1.79KB
08-1.6 Technical Controls.mp4 21.06MB
09-1.7 Encryption.en.srt 8.00KB
09-1.7 Encryption.mp4 114.80MB
10-1.8 Data Loss Prevention (DLP).en.srt 1.70KB
10-1.8 Data Loss Prevention (DLP).mp4 10.32MB
11-1.9 Data Masking and Deidentification.en.srt 4.96KB
11-1.9 Data Masking and Deidentification.mp4 69.44MB
12-1.10 Tokenization.en.srt 2.03KB
12-1.10 Tokenization.mp4 24.58MB
13-1.11 Digital Rights Management (DRM) and Watermarking.en.srt 5.79KB
13-1.11 Digital Rights Management (DRM) and Watermarking.mp4 61.66MB
14-1.12 Geographic Access Requirements.en.srt 3.97KB
14-1.12 Geographic Access Requirements.mp4 52.03MB
15-1.13 Access Controls.en.srt 1.84KB
15-1.13 Access Controls.mp4 21.14MB
16-Learning objectives.en.srt 499B
16-Learning objectives.mp4 18.03MB
17-2.1 Business Impact and Risk Calculation.en.srt 1.72KB
17-2.1 Business Impact and Risk Calculation.mp4 23.90MB
18-2.2 Communication Risk Factors and Risk Prioritization.en.srt 9.55KB
18-2.2 Communication Risk Factors and Risk Prioritization.mp4 120.55MB
19-2.3 System Assessments.en.srt 6.56KB
19-2.3 System Assessments.mp4 68.74MB
20-2.4 Compensating Controls and Training - Part 1.en.srt 19.93KB
20-2.4 Compensating Controls and Training - Part 1.mp4 207.90MB
21-2.5 Compensating Controls and Training - Part 2.en.srt 13.94KB
21-2.5 Compensating Controls and Training - Part 2.mp4 151.52MB
22-2.6 Supply Chain Assessment.en.srt 7.33KB
22-2.6 Supply Chain Assessment.mp4 60.91MB
23-Learning objectives.en.srt 517B
23-Learning objectives.mp4 17.95MB
24-3.1 Frameworks.en.srt 3.85KB
24-3.1 Frameworks.mp4 46.08MB
25-3.2 AUP, Password Policies, Data Ownership, and Other Procedures.en.srt 16.95KB
25-3.2 AUP, Password Policies, Data Ownership, and Other Procedures.mp4 176.54MB
26-3.3 Control Types.en.srt 16.92KB
26-3.3 Control Types.mp4 166.71MB
27-3.4 Audits and Assessments.en.srt 10.59KB
27-3.4 Audits and Assessments.mp4 70.37MB
28-Learning objectives.en.srt 422B
28-Learning objectives.mp4 15.03MB
29-4.1 Event Logs.en.srt 6.66KB
29-4.1 Event Logs.mp4 32.18MB
30-4.2 Syslogs.en.srt 15.17KB
30-4.2 Syslogs.mp4 131.58MB
31-4.3 Firewall Logs.en.srt 14.57KB
31-4.3 Firewall Logs.mp4 193.13MB
32-4.4 Web Application Firewall (WAF).en.srt 11.17KB
32-4.4 Web Application Firewall (WAF).mp4 172.57MB
33-4.5 Proxy.en.srt 22.57KB
33-4.5 Proxy.mp4 315.31MB
34-4.6 Intrusion Detection and Prevention (IDS_IPS).en.srt 15.20KB
34-4.6 Intrusion Detection and Prevention (IDS_IPS).mp4 203.89MB
35-4.7 Impact Analysis.en.srt 23.61KB
35-4.7 Impact Analysis.mp4 461.11MB
36-4.8 Organizations Impact vs. Localized Impact.en.srt 2.93KB
36-4.8 Organizations Impact vs. Localized Impact.mp4 24.27MB
37-4.9 Immediate vs. Total.en.srt 2.67KB
37-4.9 Immediate vs. Total.mp4 16.84MB
38-Learning objectives.en.srt 451B
38-Learning objectives.mp4 15.65MB
39-5.1 Security Information and Event Management (SIEM) - Part 1.en.srt 11.92KB
39-5.1 Security Information and Event Management (SIEM) - Part 1.mp4 133.31MB
40-5.2 Security Information and Event Management (SIEM) - Part 2.en.srt 20.55KB
40-5.2 Security Information and Event Management (SIEM) - Part 2.mp4 266.13MB
41-5.3 Rule Writing.en.srt 6.27KB
41-5.3 Rule Writing.mp4 99.46MB
42-5.4 Known-bad Internet Protocol (IP).en.srt 5.73KB
42-5.4 Known-bad Internet Protocol (IP).mp4 73.53MB
43-Learning objectives.en.srt 607B
43-Learning objectives.mp4 18.51MB
44-6.1 Malicious Payload.en.srt 22.92KB
44-6.1 Malicious Payload.mp4 222.59MB
45-6.2 Domain Keys Identified Mail (DKIM).en.srt 13.24KB
45-6.2 Domain Keys Identified Mail (DKIM).mp4 158.66MB
46-6.3 Domain-based Message.en.srt 14.76KB
46-6.3 Domain-based Message.mp4 94.21MB
47-6.4 Embedded Links.en.srt 5.86KB
47-6.4 Embedded Links.mp4 54.07MB
48-6.5 Impersonation.en.srt 1.81KB
48-6.5 Impersonation.mp4 20.15MB
49-6.6 Header.en.srt 3.39KB
49-6.6 Header.mp4 77.13MB
50-Learning objectives.en.srt 606B
50-Learning objectives.mp4 19.48MB
51-7.1 Workflow Orchestration.en.srt 14.18KB
51-7.1 Workflow Orchestration.mp4 172.57MB
52-7.2 Security Orchestration.en.srt 4.25KB
52-7.2 Security Orchestration.mp4 51.52MB
53-7.3 Security Orchestration, Automation, and Response (SOAR).en.srt 6.42KB
53-7.3 Security Orchestration, Automation, and Response (SOAR).mp4 80.97MB
54-7.4 Scripting.en.srt 5.23KB
54-7.4 Scripting.mp4 25.02MB
55-7.5 Application Programming Interface (API) Integration.en.srt 6.39KB
55-7.5 Application Programming Interface (API) Integration.mp4 65.42MB
56-7.6 Automated Malware Signature Creation.en.srt 2.89KB
56-7.6 Automated Malware Signature Creation.mp4 29.35MB
57-7.7 Data Encrichment.en.srt 5.74KB
57-7.7 Data Encrichment.mp4 59.69MB
58-7.8 Threat Feed Combination.en.srt 3.60KB
58-7.8 Threat Feed Combination.mp4 38.09MB
59-7.9 Machine Learning.en.srt 21.93KB
59-7.9 Machine Learning.mp4 327.16MB
60-7.10 Security Content Automation Protocol (SCAP).en.srt 2.91KB
60-7.10 Security Content Automation Protocol (SCAP).mp4 43.70MB
61-7.11 Continuous Integration.en.srt 4.10KB
61-7.11 Continuous Integration.mp4 55.54MB
62-7.12 Continuous Deployment and Delivery.en.srt 2.18KB
62-7.12 Continuous Deployment and Delivery.mp4 28.58MB
63-System and Privacy Data Protection - Summary.en.srt 1.00KB
63-System and Privacy Data Protection - Summary.mp4 28.06MB
Bonus Resources.txt 386B
Get Bonus Downloads Here.url 180B
Distribution statistics by country
Total 0
IP List List of IP addresses which were distributed this torrent