TorBT - Torrents and Magnet Links Search Engine

[ TutPig.com ] Linkedin - Certified Information Security Manager (CISM) Cert Prep - 2 Information Security Risk Management

File Name
Size
Get Bonus Downloads Here.url
176 B
~Get Your Files Here !/01 - Introduction/01 - Information security risk management.mp4
13 MB
~Get Your Files Here !/01 - Introduction/01 - Information security risk management.srt
1.2 kB
~Get Your Files Here !/01 - Introduction/02 - What you need to know.mp4
2.0 MB
~Get Your Files Here !/01 - Introduction/02 - What you need to know.srt
1.2 kB
~Get Your Files Here !/01 - Introduction/03 - Study resources.mp4
13 MB
~Get Your Files Here !/01 - Introduction/03 - Study resources.srt
2.5 kB
~Get Your Files Here !/02 - 1. Risk Assessment/01 - Risk assessment.mp4
14 MB
~Get Your Files Here !/02 - 1. Risk Assessment/01 - Risk assessment.srt
8.6 kB
~Get Your Files Here !/02 - 1. Risk Assessment/02 - Quantitative risk assessment.mp4
20 MB
~Get Your Files Here !/02 - 1. Risk Assessment/02 - Quantitative risk assessment.srt
11 kB
~Get Your Files Here !/02 - 1. Risk Assessment/03 - Information classification.mp4
12 MB
~Get Your Files Here !/02 - 1. Risk Assessment/03 - Information classification.srt
6.7 kB
~Get Your Files Here !/03 - 2. Risk Management/01 - Risk treatment options.mp4
17 MB
~Get Your Files Here !/03 - 2. Risk Management/01 - Risk treatment options.srt
7.5 kB
~Get Your Files Here !/03 - 2. Risk Management/02 - Security control selection and implementation.mp4
20 MB
~Get Your Files Here !/03 - 2. Risk Management/02 - Security control selection and implementation.srt
11 kB
~Get Your Files Here !/03 - 2. Risk Management/03 - Ongoing risk management.mp4
8.8 MB
~Get Your Files Here !/03 - 2. Risk Management/03 - Ongoing risk management.srt
4.6 kB
~Get Your Files Here !/03 - 2. Risk Management/04 - Risk management frameworks.mp4
11 MB
~Get Your Files Here !/03 - 2. Risk Management/04 - Risk management frameworks.srt
5.9 kB
~Get Your Files Here !/03 - 2. Risk Management/05 - Risk visibility and reporting.mp4
21 MB
~Get Your Files Here !/03 - 2. Risk Management/05 - Risk visibility and reporting.srt
8.1 kB
~Get Your Files Here !/04 - 3. Malware/01 - Comparing viruses, worms, and Trojans.mp4
23 MB
~Get Your Files Here !/04 - 3. Malware/01 - Comparing viruses, worms, and Trojans.srt
9.7 kB
~Get Your Files Here !/04 - 3. Malware/02 - Malware payloads.mp4
20 MB
~Get Your Files Here !/04 - 3. Malware/02 - Malware payloads.srt
10 kB
~Get Your Files Here !/04 - 3. Malware/03 - Understanding backdoors and logic bombs.mp4
16 MB
~Get Your Files Here !/04 - 3. Malware/03 - Understanding backdoors and logic bombs.srt
8.1 kB
~Get Your Files Here !/04 - 3. Malware/04 - Botnets.mp4
9.3 MB
~Get Your Files Here !/04 - 3. Malware/04 - Botnets.srt
6.1 kB
~Get Your Files Here !/04 - 3. Malware/05 - Advanced persistent threats.mp4
11 MB
~Get Your Files Here !/04 - 3. Malware/05 - Advanced persistent threats.srt
6.1 kB
~Get Your Files Here !/05 - 4. Understanding Attackers/01 - Cybersecurity adversaries.mp4
17 MB
~Get Your Files Here !/05 - 4. Understanding Attackers/01 - Cybersecurity adversaries.srt
8.5 kB
~Get Your Files Here !/05 - 4. Understanding Attackers/02 - Preventing insider threats.mp4
9.8 MB
~Get Your Files Here !/05 - 4. Understanding Attackers/02 - Preventing insider threats.srt
4.7 kB
~Get Your Files Here !/05 - 4. Understanding Attackers/03 - Threat intelligence.mp4
11 MB
~Get Your Files Here !/05 - 4. Understanding Attackers/03 - Threat intelligence.srt
6.4 kB
~Get Your Files Here !/06 - 5. Attack Types/01 - Denial of service attacks.mp4
16 MB
~Get Your Files Here !/06 - 5. Attack Types/01 - Denial of service attacks.srt
7.7 kB
~Get Your Files Here !/06 - 5. Attack Types/02 - Eavesdropping attacks.mp4
14 MB
~Get Your Files Here !/06 - 5. Attack Types/02 - Eavesdropping attacks.srt
7.9 kB
~Get Your Files Here !/06 - 5. Attack Types/03 - DNS attacks.mp4
13 MB
~Get Your Files Here !/06 - 5. Attack Types/03 - DNS attacks.srt
6.3 kB
~Get Your Files Here !/06 - 5. Attack Types/04 - Layer 2 attacks.mp4
7.1 MB
~Get Your Files Here !/06 - 5. Attack Types/04 - Layer 2 attacks.srt
3.8 kB
~Get Your Files Here !/06 - 5. Attack Types/05 - Network address spoofing.mp4
12 MB
~Get Your Files Here !/06 - 5. Attack Types/05 - Network address spoofing.srt
6.9 kB
~Get Your Files Here !/06 - 5. Attack Types/06 - Password attacks.mp4
33 MB
~Get Your Files Here !/06 - 5. Attack Types/06 - Password attacks.srt
14 kB
~Get Your Files Here !/06 - 5. Attack Types/07 - Password spraying and credential stuffing.mp4
6.1 MB
~Get Your Files Here !/06 - 5. Attack Types/07 - Password spraying and credential stuffing.srt
3.2 kB
~Get Your Files Here !/06 - 5. Attack Types/08 - Watering hole attacks.mp4
12 MB
~Get Your Files Here !/06 - 5. Attack Types/08 - Watering hole attacks.srt
5.7 kB
~Get Your Files Here !/07 - 6. Social Engineering Attacks/01 - Social engineering.mp4
17 MB
~Get Your Files Here !/07 - 6. Social Engineering Attacks/01 - Social engineering.srt
10 kB
~Get Your Files Here !/07 - 6. Social Engineering Attacks/02 - Impersonation attacks.mp4
15 MB
~Get Your Files Here !/07 - 6. Social Engineering Attacks/02 - Impersonation attacks.srt
10 kB
~Get Your Files Here !/07 - 6. Social Engineering Attacks/03 - Physical social engineering.mp4
11 MB
~Get Your Files Here !/07 - 6. Social Engineering Attacks/03 - Physical social engineering.srt
4.6 kB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/01 - What is vulnerability management.mp4
17 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/01 - What is vulnerability management.srt
9.8 kB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/02 - Identify scan targets.mp4
14 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/02 - Identify scan targets.srt
8.6 kB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/03 - Scan configuration.mp4
16 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/03 - Scan configuration.srt
11 kB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/04 - Scan perspective.mp4
13 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/04 - Scan perspective.srt
8.5 kB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/05 - Security Content Automation Protocol (SCAP).mp4
7.0 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/05 - Security Content Automation Protocol (SCAP).srt
4.3 kB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/06 - Common Vulnerability Scoring System (CVSS).mp4
10 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/06 - Common Vulnerability Scoring System (CVSS).srt
6.2 kB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/07 - Analyzing scan reports.mp4
16 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/07 - Analyzing scan reports.srt
9.0 kB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/08 - Correlating scan results.mp4
8.0 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/08 - Correlating scan results.srt
4.4 kB
~Get Your Files Here !/09 - 8. Awareness and Training/01 - Security awareness training.mp4
20 MB
~Get Your Files Here !/09 - 8. Awareness and Training/01 - Security awareness training.srt
9.6 kB
~Get Your Files Here !/09 - 8. Awareness and Training/02 - Compliance training.mp4
13 MB
~Get Your Files Here !/09 - 8. Awareness and Training/02 - Compliance training.srt
5.5 kB
~Get Your Files Here !/09 - 8. Awareness and Training/03 - User habits.mp4
9.5 MB
~Get Your Files Here !/09 - 8. Awareness and Training/03 - User habits.srt
6.6 kB
~Get Your Files Here !/09 - 8. Awareness and Training/04 - Measuring compliance and security posture.mp4
7.7 MB
~Get Your Files Here !/09 - 8. Awareness and Training/04 - Measuring compliance and security posture.srt
3.5 kB
~Get Your Files Here !/09 - 8. Awareness and Training/05 - Awareness program reviews.mp4
3.2 MB
~Get Your Files Here !/09 - 8. Awareness and Training/05 - Awareness program reviews.srt
2.2 kB
~Get Your Files Here !/10 - 9. Business Continuity/01 - Business continuity planning.mp4
8.0 MB
~Get Your Files Here !/10 - 9. Business Continuity/01 - Business continuity planning.srt
6.2 kB
~Get Your Files Here !/10 - 9. Business Continuity/02 - Business continuity controls.mp4
11 MB
~Get Your Files Here !/10 - 9. Business Continuity/02 - Business continuity controls.srt
7.0 kB
~Get Your Files Here !/10 - 9. Business Continuity/03 - High availability and fault tolerance.mp4
15 MB
~Get Your Files Here !/10 - 9. Business Continuity/03 - High availability and fault tolerance.srt
11 kB
~Get Your Files Here !/11 - 10. Disaster Recovery/01 - Disaster recovery planning.mp4
14 MB
~Get Your Files Here !/11 - 10. Disaster Recovery/01 - Disaster recovery planning.srt
8.3 kB
~Get Your Files Here !/11 - 10. Disaster Recovery/02 - Backups.mp4
11 MB
~Get Your Files Here !/11 - 10. Disaster Recovery/02 - Backups.srt
7.8 kB
~Get Your Files Here !/11 - 10. Disaster Recovery/03 - Restoring backups.mp4
7.3 MB
~Get Your Files Here !/11 - 10. Disaster Recovery/03 - Restoring backups.srt
4.3 kB
~Get Your Files Here !/11 - 10. Disaster Recovery/04 - Disaster recovery sites.mp4
12 MB
~Get Your Files Here !/11 - 10. Disaster Recovery/04 - Disaster recovery sites.srt
6.4 kB
~Get Your Files Here !/11 - 10. Disaster Recovery/05 - Testing BCDR plans.mp4
11 MB
~Get Your Files Here !/11 - 10. Disaster Recovery/05 - Testing BCDR plans.srt
6.2 kB
~Get Your Files Here !/12 - 11. Supply Chain Risk/01 - Managing vendor relationships.mp4
12 MB
~Get Your Files Here !/12 - 11. Supply Chain Risk/01 - Managing vendor relationships.srt
7.4 kB
~Get Your Files Here !/12 - 11. Supply Chain Risk/02 - Vendor agreements.mp4
16 MB
~Get Your Files Here !/12 - 11. Supply Chain Risk/02 - Vendor agreements.srt
7.8 kB
~Get Your Files Here !/12 - 11. Supply Chain Risk/03 - Vendor information management.mp4
6.1 MB
~Get Your Files Here !/12 - 11. Supply Chain Risk/03 - Vendor information management.srt
3.3 kB
~Get Your Files Here !/12 - 11. Supply Chain Risk/04 - Audits and assessments.mp4
19 MB
~Get Your Files Here !/12 - 11. Supply Chain Risk/04 - Audits and assessments.srt
10 kB
~Get Your Files Here !/12 - 11. Supply Chain Risk/05 - Cloud audits.mp4
13 MB
~Get Your Files Here !/12 - 11. Supply Chain Risk/05 - Cloud audits.srt
7.0 kB
~Get Your Files Here !/13 - 12. Compliance/01 - Legal and compliance risks.mp4
7.4 MB
~Get Your Files Here !/13 - 12. Compliance/01 - Legal and compliance risks.srt
3.8 kB
~Get Your Files Here !/13 - 12. Compliance/02 - Privacy compliance.mp4
8.8 MB
~Get Your Files Here !/13 - 12. Compliance/02 - Privacy compliance.srt
6.1 kB
~Get Your Files Here !/13 - 12. Compliance/03 - Data breaches.mp4
7.0 MB
~Get Your Files Here !/13 - 12. Compliance/03 - Data breaches.srt
4.2 kB
~Get Your Files Here !/13 - 12. Compliance/04 - Intellectual property.mp4
17 MB
~Get Your Files Here !/13 - 12. Compliance/04 - Intellectual property.srt
7.2 kB
~Get Your Files Here !/14 - Conclusion/01 - Continuing your studies.mp4
6.7 MB
~Get Your Files Here !/14 - Conclusion/01 - Continuing your studies.srt
1.2 kB
~Get Your Files Here !/Bonus Resources.txt
386 B