Torrent Info
Title [ TutPig.com ] Linkedin - Certified Information Security Manager (CISM) Cert Prep - 2 Information Security Risk Management
Category
Size 781.99MB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
01 - Business continuity planning.mp4 8.03MB
01 - Business continuity planning.srt 6.20KB
01 - Comparing viruses, worms, and Trojans.mp4 23.30MB
01 - Comparing viruses, worms, and Trojans.srt 9.68KB
01 - Continuing your studies.mp4 6.71MB
01 - Continuing your studies.srt 1.15KB
01 - Cybersecurity adversaries.mp4 16.92MB
01 - Cybersecurity adversaries.srt 8.48KB
01 - Denial of service attacks.mp4 15.65MB
01 - Denial of service attacks.srt 7.74KB
01 - Disaster recovery planning.mp4 14.07MB
01 - Disaster recovery planning.srt 8.32KB
01 - Information security risk management.mp4 13.21MB
01 - Information security risk management.srt 1.20KB
01 - Legal and compliance risks.mp4 7.41MB
01 - Legal and compliance risks.srt 3.79KB
01 - Managing vendor relationships.mp4 12.40MB
01 - Managing vendor relationships.srt 7.43KB
01 - Risk assessment.mp4 13.71MB
01 - Risk assessment.srt 8.57KB
01 - Risk treatment options.mp4 17.17MB
01 - Risk treatment options.srt 7.51KB
01 - Security awareness training.mp4 19.83MB
01 - Security awareness training.srt 9.65KB
01 - Social engineering.mp4 16.91MB
01 - Social engineering.srt 10.19KB
01 - What is vulnerability management.mp4 16.64MB
01 - What is vulnerability management.srt 9.77KB
02 - Backups.mp4 11.13MB
02 - Backups.srt 7.78KB
02 - Business continuity controls.mp4 11.09MB
02 - Business continuity controls.srt 6.96KB
02 - Compliance training.mp4 13.28MB
02 - Compliance training.srt 5.47KB
02 - Eavesdropping attacks.mp4 13.55MB
02 - Eavesdropping attacks.srt 7.92KB
02 - Identify scan targets.mp4 13.74MB
02 - Identify scan targets.srt 8.56KB
02 - Impersonation attacks.mp4 15.11MB
02 - Impersonation attacks.srt 9.98KB
02 - Malware payloads.mp4 20.49MB
02 - Malware payloads.srt 10.35KB
02 - Preventing insider threats.mp4 9.82MB
02 - Preventing insider threats.srt 4.75KB
02 - Privacy compliance.mp4 8.84MB
02 - Privacy compliance.srt 6.12KB
02 - Quantitative risk assessment.mp4 20.06MB
02 - Quantitative risk assessment.srt 10.67KB
02 - Security control selection and implementation.mp4 20.06MB
02 - Security control selection and implementation.srt 10.67KB
02 - Vendor agreements.mp4 15.62MB
02 - Vendor agreements.srt 7.82KB
02 - What you need to know.mp4 1.99MB
02 - What you need to know.srt 1.20KB
03 - Data breaches.mp4 6.96MB
03 - Data breaches.srt 4.20KB
03 - DNS attacks.mp4 12.59MB
03 - DNS attacks.srt 6.27KB
03 - High availability and fault tolerance.mp4 14.59MB
03 - High availability and fault tolerance.srt 10.67KB
03 - Information classification.mp4 12.48MB
03 - Information classification.srt 6.71KB
03 - Ongoing risk management.mp4 8.80MB
03 - Ongoing risk management.srt 4.60KB
03 - Physical social engineering.mp4 11.07MB
03 - Physical social engineering.srt 4.64KB
03 - Restoring backups.mp4 7.25MB
03 - Restoring backups.srt 4.34KB
03 - Scan configuration.mp4 15.49MB
03 - Scan configuration.srt 10.91KB
03 - Study resources.mp4 13.42MB
03 - Study resources.srt 2.52KB
03 - Threat intelligence.mp4 11.11MB
03 - Threat intelligence.srt 6.44KB
03 - Understanding backdoors and logic bombs.mp4 15.59MB
03 - Understanding backdoors and logic bombs.srt 8.14KB
03 - User habits.mp4 9.51MB
03 - User habits.srt 6.63KB
03 - Vendor information management.mp4 6.13MB
03 - Vendor information management.srt 3.25KB
04 - Audits and assessments.mp4 18.81MB
04 - Audits and assessments.srt 10.43KB
04 - Botnets.mp4 9.28MB
04 - Botnets.srt 6.05KB
04 - Disaster recovery sites.mp4 12.52MB
04 - Disaster recovery sites.srt 6.41KB
04 - Intellectual property.mp4 17.15MB
04 - Intellectual property.srt 7.24KB
04 - Layer 2 attacks.mp4 7.10MB
04 - Layer 2 attacks.srt 3.83KB
04 - Measuring compliance and security posture.mp4 7.73MB
04 - Measuring compliance and security posture.srt 3.48KB
04 - Risk management frameworks.mp4 10.93MB
04 - Risk management frameworks.srt 5.91KB
04 - Scan perspective.mp4 12.75MB
04 - Scan perspective.srt 8.54KB
05 - Advanced persistent threats.mp4 10.58MB
05 - Advanced persistent threats.srt 6.12KB
05 - Awareness program reviews.mp4 3.19MB
05 - Awareness program reviews.srt 2.23KB
05 - Cloud audits.mp4 13.23MB
05 - Cloud audits.srt 7.01KB
05 - Network address spoofing.mp4 12.03MB
05 - Network address spoofing.srt 6.90KB
05 - Risk visibility and reporting.mp4 21.23MB
05 - Risk visibility and reporting.srt 8.08KB
05 - Security Content Automation Protocol (SCAP).mp4 6.99MB
05 - Security Content Automation Protocol (SCAP).srt 4.32KB
05 - Testing BCDR plans.mp4 10.96MB
05 - Testing BCDR plans.srt 6.15KB
06 - Common Vulnerability Scoring System (CVSS).mp4 10.33MB
06 - Common Vulnerability Scoring System (CVSS).srt 6.18KB
06 - Password attacks.mp4 32.82MB
06 - Password attacks.srt 14.53KB
07 - Analyzing scan reports.mp4 16.16MB
07 - Analyzing scan reports.srt 8.99KB
07 - Password spraying and credential stuffing.mp4 6.12MB
07 - Password spraying and credential stuffing.srt 3.21KB
08 - Correlating scan results.mp4 7.95MB
08 - Correlating scan results.srt 4.44KB
08 - Watering hole attacks.mp4 12.00MB
08 - Watering hole attacks.srt 5.74KB
Bonus Resources.txt 386B
Get Bonus Downloads Here.url 176B
Distribution statistics by country
Saudi Arabia (SA) 3
Czechia (CZ) 1
Norway (NO) 1
Hungary (HU) 1
United States (US) 1
Hashemite Kingdom of Jordan (JO) 1
Total 8
IP List List of IP addresses which were distributed this torrent