TorBT - Torrents and Magnet Links Search Engine
[ WebToolTip.com ] Udemy - Mastering NIST and ISO Cybersecurity Governance in 16 Steps
- Date: 2026-03-26
- Size: 2.4 GB
- Files: 58
File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Course Introduction/1 -Intro Video to Course.mp4
41 MB
~Get Your Files Here !/10 - Patch & Vulnerability Management/1 -Patch Methodologies Overview.mp4
69 MB
~Get Your Files Here !/10 - Patch & Vulnerability Management/2 -Automate Patch Monitoring.mp4
63 MB
~Get Your Files Here !/10 - Patch & Vulnerability Management/3 -Track Remediation Logs.mp4
33 MB
~Get Your Files Here !/10 - Patch & Vulnerability Management/4 - Hands-On-Learning Create a Patch Management SOP.html
452 B
~Get Your Files Here !/10 - Patch & Vulnerability Management/4 - Patch Management Definition & Best Practices.html
766 B
~Get Your Files Here !/10 - Patch & Vulnerability Management/4 -Module 3 HOL.pdf
216 kB
~Get Your Files Here !/11 - Incident Response Readiness/1 -Module Introduction.mp4
24 MB
~Get Your Files Here !/11 - Incident Response Readiness/2 -ISONIST IR Playbooks.mp4
79 MB
~Get Your Files Here !/11 - Incident Response Readiness/3 -Define IR Roles & Teams.mp4
38 MB
~Get Your Files Here !/11 - Incident Response Readiness/4 -Simulate IR Drill Planning.mp4
56 MB
~Get Your Files Here !/12 - Performance Monitoring & Auditing/1 -Define KPIs & Tier Metrics.mp4
38 MB
~Get Your Files Here !/12 - Performance Monitoring & Auditing/2 -Develop Dashboards.mp4
51 MB
~Get Your Files Here !/12 - Performance Monitoring & Auditing/3 -Prepare Audit Evidence Logs.mp4
52 MB
~Get Your Files Here !/13 - Governance Automation & Optimization/1 -AI-Powered Monitoring.mp4
77 MB
~Get Your Files Here !/13 - Governance Automation & Optimization/2 -Template Reuse & Control Sync.mp4
83 MB
~Get Your Files Here !/13 - Governance Automation & Optimization/3 -Optimize Control Improvements.mp4
37 MB
~Get Your Files Here !/13 - Governance Automation & Optimization/4 - Hands-On-Learning Automate Governance Monitoring.html
477 B
~Get Your Files Here !/13 - Governance Automation & Optimization/4 - How Generative AI Helps Risk & Compliance.html
799 B
~Get Your Files Here !/13 - Governance Automation & Optimization/4 -Module 4 HOL.pdf
218 kB
~Get Your Files Here !/14 - Course Conclusion/1 -Course Wrap-up Video.mp4
33 MB
~Get Your Files Here !/14 - Course Conclusion/2 - Project Simulate and Respond to a Multi-Layered Breach.html
543 B
~Get Your Files Here !/14 - Course Conclusion/2 -Module 4 HOL.pdf
218 kB
~Get Your Files Here !/2 - Purpose-Driven Governance/1 -Module Introduction.mp4
27 MB
~Get Your Files Here !/2 - Purpose-Driven Governance/2 -Define ISMS Success Criteria.mp4
86 MB
~Get Your Files Here !/2 - Purpose-Driven Governance/3 -Map Strategic Goals to NIST CSF.mp4
85 MB
~Get Your Files Here !/2 - Purpose-Driven Governance/4 -Select Governance Tools and Inputs.mp4
44 MB
~Get Your Files Here !/3 - Scoping and Context Definition/1 -Process Mapping for ISMS Scope.mp4
88 MB
~Get Your Files Here !/3 - Scoping and Context Definition/2 -Policy and Boundary Setting.mp4
61 MB
~Get Your Files Here !/3 - Scoping and Context Definition/3 -Contextualize Governance Risks.mp4
81 MB
~Get Your Files Here !/4 - Leadership Engagement & Role Assignment/1 -Establish Sponsorship Channels.mp4
95 MB
~Get Your Files Here !/4 - Leadership Engagement & Role Assignment/2 -Define Roles and RACI.mp4
63 MB
~Get Your Files Here !/4 - Leadership Engagement & Role Assignment/3 -Leadership Approval Process.mp4
38 MB
~Get Your Files Here !/4 - Leadership Engagement & Role Assignment/4 - Hands-On-Learning Build a Governance RACI Matrix.html
469 B
~Get Your Files Here !/4 - Leadership Engagement & Role Assignment/4 - The Role of Leadership in ISO 27001 Compliance.html
879 B
~Get Your Files Here !/4 - Leadership Engagement & Role Assignment/4 -Module 1 HOL.pdf
215 kB
~Get Your Files Here !/5 - Risk Identification and Prioritization/1 -Module Introduction.mp4
26 MB
~Get Your Files Here !/5 - Risk Identification and Prioritization/2 -Conduct ISONIST Risk Analysis.mp4
107 MB
~Get Your Files Here !/5 - Risk Identification and Prioritization/3 -Define Risk Acceptance Criteria.mp4
67 MB
~Get Your Files Here !/5 - Risk Identification and Prioritization/4 -Prioritize Control Objectives.mp4
36 MB
~Get Your Files Here !/6 - Control Selection and Mapping/1 -Use Control Mapping Tools.mp4
70 MB
~Get Your Files Here !/6 - Control Selection and Mapping/2 -Tailor Controls to Risk Profile.mp4
63 MB
~Get Your Files Here !/6 - Control Selection and Mapping/3 -Document Mapping Justification.mp4
31 MB
~Get Your Files Here !/7 - Cloud and Privacy Integration/1 -Map Cloud Controls.mp4
53 MB
~Get Your Files Here !/7 - Cloud and Privacy Integration/2 -Assess Privacy Gaps.mp4
99 MB
~Get Your Files Here !/7 - Cloud and Privacy Integration/3 -Write Privacy Addendum.mp4
32 MB
~Get Your Files Here !/7 - Cloud and Privacy Integration/4 - Hands-On-Learning Map Privacy Controls Across ISO 27701 and NIST.html
489 B
~Get Your Files Here !/7 - Cloud and Privacy Integration/4 - Introduction to the NIST Privacy Framework.html
821 B
~Get Your Files Here !/7 - Cloud and Privacy Integration/4 -Module 2 HOL.pdf
217 kB
~Get Your Files Here !/8 - Continuity & Recovery Planning/1 -Module Introduction.mp4
25 MB
~Get Your Files Here !/8 - Continuity & Recovery Planning/2 -ISONIST Recovery Principles.mp4
73 MB
~Get Your Files Here !/8 - Continuity & Recovery Planning/3 -Designing Continuity Plans.mp4
99 MB
~Get Your Files Here !/8 - Continuity & Recovery Planning/4 -Simulating Failover Workflows.mp4
38 MB
~Get Your Files Here !/9 - Technical & Awareness Controls/1 -Technical Control Deployment.mp4
80 MB
~Get Your Files Here !/9 - Technical & Awareness Controls/2 -Launch Awareness Training.mp4
70 MB
~Get Your Files Here !/9 - Technical & Awareness Controls/3 -Secure Workflow Assignments.mp4
29 MB
~Get Your Files Here !/Bonus Resources.txt
70 B