Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
0001.Course Overview.mp4 |
6.44Мб |
0101.Introduction.mp4 |
8.93Мб |
0201.Introduction.mp4 |
3.18Мб |
0202.Security and Risk Management Fundamentals.mp4 |
8.16Мб |
0203.Balancing Business and Security.mp4 |
3.16Мб |
0204.The CIA Triad.mp4 |
15.49Мб |
0205.Accountability and Assurance.mp4 |
8.82Мб |
0206.Control Types.mp4 |
2.97Мб |
0207.Delaying, Preventing, or Detecting Attacks.mp4 |
7.14Мб |
0208.Due Care and Due Diligence.mp4 |
3.45Мб |
0209.Ethics.mp4 |
4.68Мб |
0210.Conclusion.mp4 |
1.25Мб |
0301.Introduction.mp4 |
1.61Мб |
0302.Legal Systems.mp4 |
975.66Кб |
0303.Criminal and Civil Law.mp4 |
3.66Мб |
0304.Administrative Law.mp4 |
3.43Мб |
0305.Important Laws.mp4 |
11.75Мб |
0306.Summary.mp4 |
625.65Кб |
0401.Introduction.mp4 |
1.29Мб |
0402.Computers Can Be Used for EVIL.mp4 |
5.44Мб |
0403.Some Hack Just Because They Can.mp4 |
2.91Мб |
0404.It's All About the Money.mp4 |
3.99Мб |
0405.Spies Are Real.mp4 |
5.01Мб |
0406.Payback and Government Hackers.mp4 |
5.49Мб |
0407.Theft, Vandalism, and Trespass.mp4 |
2.77Мб |
0408.Fraud, Spam, and Slander.mp4 |
4.53Мб |
0409.Conclusion.mp4 |
2.63Мб |
0501.Introduction.mp4 |
1.11Мб |
0502.Patents.mp4 |
3.57Мб |
0503.Trademarks and Trade Secrets.mp4 |
2.28Мб |
0504.Copyrights.mp4 |
2.67Мб |
0505.Summary.mp4 |
632.19Кб |
0601.Introduction.mp4 |
1.71Мб |
0602.Privacy Matters.mp4 |
8.09Мб |
0603.Privacy Law Examples.mp4 |
14.59Мб |
0604.Conclusion.mp4 |
1.63Мб |
0701.Introduction.mp4 |
1.11Мб |
0702.Reasons for Licensing.mp4 |
3.17Мб |
0703.License Types.mp4 |
495.75Кб |
0704.Open Versus Closed Source Licensing.mp4 |
4.01Мб |
0705.Commercial Versus Non-commercial Licensing.mp4 |
4.72Мб |
0706.End User License Agreements.mp4 |
1.05Мб |
0707.Free Software.mp4 |
4.58Мб |
0708.Demo and Trial Licenses.mp4 |
1.73Мб |
0709.Shareware.mp4 |
1.77Мб |
0710.Academic Software Licensing.mp4 |
1.25Мб |
0711.Summary.mp4 |
1.17Мб |
0801.Introduction.mp4 |
1.38Мб |
0802.Trans-border Data Flow.mp4 |
8.17Мб |
0803.Import and Export Controls.mp4 |
4.75Мб |
0804.Summary.mp4 |
1.79Мб |
0901.Introduction.mp4 |
1.69Мб |
0902.Develop a Culture of Security Awareness.mp4 |
8.63Мб |
0903.Types of Security Awareness.mp4 |
5.05Мб |
0904.Expected Impact of Training.mp4 |
3.95Мб |
0905.Awareness Validation.mp4 |
8.07Мб |
0906.Summary.mp4 |
1.31Мб |
1001.Introduction.mp4 |
1.83Мб |
1002.Governance.mp4 |
1.00Мб |
1003.Roles and Responsibilities.mp4 |
11.33Мб |
1004.Organizational Objectives.mp4 |
2.81Мб |
1005.Security Goals.mp4 |
5.86Мб |
1006.Security Mission.mp4 |
2.36Мб |
1007.Conclusion.mp4 |
1.30Мб |
1101.Introduction.mp4 |
1.92Мб |
1102.Security Frameworks Introduction.mp4 |
7.59Мб |
1103.Effective Policies and Procedures.mp4 |
7.51Мб |
1104.Policy Sections.mp4 |
5.34Мб |
1105.Procedures.mp4 |
4.86Мб |
1106.Guidelines.mp4 |
1.89Мб |
1107.Baselines.mp4 |
3.82Мб |
1108.Summary.mp4 |
2.35Мб |
1201.Introduction.mp4 |
1.86Мб |
1202.Business Continuity Process.mp4 |
1.73Мб |
1203.Conducting a Business Impact Analysis.mp4 |
1.76Мб |
1204.Disaster Recovery Planning vs. Business Continuity Planning.mp4 |
2.82Мб |
1205.Testing Your Plans.mp4 |
2.51Мб |
1206.Disaster Events.mp4 |
958.23Кб |
1207.Recovering from Disaster.mp4 |
1.40Мб |
1208.Disaster Recovery Controls.mp4 |
3.55Мб |
1209.Conclusion.mp4 |
631.93Кб |
1301.Introduction.mp4 |
1.92Мб |
1302.Threat Modeling Overview.mp4 |
3.69Мб |
1303.Threat Modeling Focus.mp4 |
4.62Мб |
1304.Threat Model - Scoping.mp4 |
3.31Мб |
1305.Reviewing the Architecture.mp4 |
1.87Мб |
1306.Decomposing.mp4 |
1.55Мб |
1307.Threat Identification using STRIDE.mp4 |
4.90Мб |
1308.Defining and Documenting Countermeasures.mp4 |
1.77Мб |
1309.Prioritization with DREAD.mp4 |
1.05Мб |
1310.Summary.mp4 |
1.65Мб |
1401.Introduction.mp4 |
2.04Мб |
1402.Threats.mp4 |
2.64Мб |
1403.Threat Source.mp4 |
2.79Мб |
1404.Vulnerabilities.mp4 |
2.02Мб |
1405.Risk.mp4 |
754.30Кб |
1406.Risk Assessments.mp4 |
2.77Мб |
1407.Risk Assessment Methodologies.mp4 |
2.58Мб |
1408.Real World Threats and Vulnerabilities.mp4 |
3.35Мб |
1409.Assessment Approach.mp4 |
870.48Кб |
1410.Analysis Approach.mp4 |
1.01Мб |
1411.Risk Acceptance and Assignment.mp4 |
3.24Мб |
1412.Common Calculations.mp4 |
1.52Мб |
1413.Conclusion.mp4 |
1.06Мб |
1501.Introduction.mp4 |
1.96Мб |
1502.What Is a Countermeasure.mp4 |
2.04Мб |
1503.Control Variations.mp4 |
1.99Мб |
1504.Control Types.mp4 |
2.43Мб |
1505.Control Considerations.mp4 |
2.90Мб |
1506.Assessing Control Strength.mp4 |
3.30Мб |
1507.Countermeasure Assurance.mp4 |
1.15Мб |
1508.Example Countermeasures.mp4 |
5.75Мб |
1509.Conclusion.mp4 |
1.20Мб |
1601.Introduction.mp4 |
2.57Мб |
1602.Risk Management Framework.mp4 |
1.16Мб |
1603.Leveraging Frameworks.mp4 |
1.95Мб |
1604.NIST Risk Management Framework RMF.mp4 |
8.64Мб |
1605.FAIR.mp4 |
4.12Мб |
1606.OCTAVE Allegro.mp4 |
3.06Мб |
1607.Summary.mp4 |
897.41Кб |
cissp-security-risk-management.zip |
21.20Мб |