TorBT - Torrents and Magnet Links Search Engine
[ WebToolTip.com ] Udemy - Critical Concepts in Incident Response Frameworks
- Date: 2026-05-03
- Size: 2.3 GB
- Files: 61
File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - What is Incident Management and Why is it Important/1 - Intro Video to Course.mp4
54 MB
~Get Your Files Here !/1 - What is Incident Management and Why is it Important/2 - Introduction to Section.mp4
49 MB
~Get Your Files Here !/1 - What is Incident Management and Why is it Important/3 - Key Terminology and Acronyms.mp4
68 MB
~Get Your Files Here !/1 - What is Incident Management and Why is it Important/4 - IT Service Management.mp4
66 MB
~Get Your Files Here !/1 - What is Incident Management and Why is it Important/5 - Importance of an IT Service Management solution.mp4
62 MB
~Get Your Files Here !/10 - Implementing the Process/1 - Introduction to Section.mp4
34 MB
~Get Your Files Here !/10 - Implementing the Process/2 - Making the Process Available.mp4
50 MB
~Get Your Files Here !/10 - Implementing the Process/3 - Communicating the Process.mp4
51 MB
~Get Your Files Here !/10 - Implementing the Process/4 - Training Staff.mp4
54 MB
~Get Your Files Here !/11 - Testing the Plan/1 - Simulating an Incident.mp4
62 MB
~Get Your Files Here !/11 - Testing the Plan/2 - Advanced Simulations.mp4
54 MB
~Get Your Files Here !/11 - Testing the Plan/3 - Measuring Simulation Success.mp4
71 MB
~Get Your Files Here !/12 - Review, Maintain, and Improve/1 - Continuous Process Improvement.mp4
52 MB
~Get Your Files Here !/12 - Review, Maintain, and Improve/2 - Creating a Review Schedule.mp4
53 MB
~Get Your Files Here !/12 - Review, Maintain, and Improve/3 - System Architecture Involvement.mp4
81 MB
~Get Your Files Here !/12 - Review, Maintain, and Improve/4 - Learn About Quality.html
595 B
~Get Your Files Here !/12 - Review, Maintain, and Improve/5 - Hands-On-Learning Build Out First Draft of a Cyber Incident Response Plan - M4HOL _ Cybersecurity Incident Response _ Frameworks & Implementation.pdf
208 kB
~Get Your Files Here !/12 - Review, Maintain, and Improve/5 - Hands-On-Learning Build Out First Draft of a Cyber Incident Response Plan.html
346 B
~Get Your Files Here !/12 - Review, Maintain, and Improve/6 - Outro-Course Wrap-up Video.mp4
33 MB
~Get Your Files Here !/12 - Review, Maintain, and Improve/7 - Project Implement a Cyber Security Incident Response Plan - Cybersecurity Incident Response _ Frameworks & Implementation _ Course_end_Project.pdf
234 kB
~Get Your Files Here !/12 - Review, Maintain, and Improve/7 - Project Implement a Cyber Security Incident Response Plan.html
488 B
~Get Your Files Here !/2 - Importance of a Mature IT Service Management Solution/1 - What defines a mature IT Service Management (ITSM) solution.mp4
59 MB
~Get Your Files Here !/2 - Importance of a Mature IT Service Management Solution/2 - Importance of Preparation and Planning.mp4
60 MB
~Get Your Files Here !/2 - Importance of a Mature IT Service Management Solution/3 - ITIL Incident Major Incident and Problem Management.mp4
69 MB
~Get Your Files Here !/3 - Justifying the Effort and Cost/1 - Cost Savings from Preventing Cyber Attacks.mp4
66 MB
~Get Your Files Here !/3 - Justifying the Effort and Cost/2 - Non-Monetary Impact On The Business.mp4
60 MB
~Get Your Files Here !/3 - Justifying the Effort and Cost/3 - Understanding ROI for Cybersecurity Investments.mp4
72 MB
~Get Your Files Here !/3 - Justifying the Effort and Cost/4 - What Is IT Service Management (And Its Importance).html
523 B
~Get Your Files Here !/3 - Justifying the Effort and Cost/5 - Hands-On-Learning Mapping Out an Incident Management Process - M1HOL _ Cybersecurity Incident Response _ Frameworks & Implementation.pdf
213 kB
~Get Your Files Here !/3 - Justifying the Effort and Cost/5 - Hands-On-Learning Mapping Out an Incident Management Process.html
300 B
~Get Your Files Here !/4 - SANS Framework 6-Step Process/1 - Introduction to Section.mp4
36 MB
~Get Your Files Here !/4 - SANS Framework 6-Step Process/2 - SANS Institute-s Incident Response (IR) framework.mp4
46 MB
~Get Your Files Here !/4 - SANS Framework 6-Step Process/3 - Preparation and Identification.mp4
47 MB
~Get Your Files Here !/4 - SANS Framework 6-Step Process/4 - Containment and Eradication.mp4
47 MB
~Get Your Files Here !/4 - SANS Framework 6-Step Process/5 - Recovery and Lessons Learned.mp4
65 MB
~Get Your Files Here !/4 - SANS Framework 6-Step Process/6 - Third-PartySupply Chain Incident Management.mp4
59 MB
~Get Your Files Here !/5 - NIST SP 800-61r3 Incident Response Recommendations and Considerations for Cyber/1 - What is NIST SP 800-61.mp4
61 MB
~Get Your Files Here !/5 - NIST SP 800-61r3 Incident Response Recommendations and Considerations for Cyber/2 - Preparation.mp4
57 MB
~Get Your Files Here !/5 - NIST SP 800-61r3 Incident Response Recommendations and Considerations for Cyber/3 - Incident Response.mp4
40 MB
~Get Your Files Here !/5 - NIST SP 800-61r3 Incident Response Recommendations and Considerations for Cyber/4 - Lessons Learned.mp4
56 MB
~Get Your Files Here !/6 - Documentation Management Frameworks/1 - Document Management Standards ISO 76865.mp4
51 MB
~Get Your Files Here !/6 - Documentation Management Frameworks/2 - Creation Storage and tracking of document.mp4
54 MB
~Get Your Files Here !/6 - Documentation Management Frameworks/3 - Monitoring and Maintenance processes and procedure.mp4
54 MB
~Get Your Files Here !/6 - Documentation Management Frameworks/4 - Document management - Minimum requirements for the storage of documents.html
664 B
~Get Your Files Here !/6 - Documentation Management Frameworks/5 - Hands-On-Learning Determine the Best Templates and Management Products to Use - M2HOL _ Cybersecurity Incident Response _ Frameworks & Implementation.pdf
214 kB
~Get Your Files Here !/6 - Documentation Management Frameworks/5 - Hands-On-Learning Determine the Best Templates and Management Products to Use.html
323 B
~Get Your Files Here !/7 - Defining a Major Incident/1 - Introduction to Section.mp4
32 MB
~Get Your Files Here !/7 - Defining a Major Incident/2 - CIRP Templates.mp4
48 MB
~Get Your Files Here !/7 - Defining a Major Incident/3 - Gathering the Right People for the Team.mp4
41 MB
~Get Your Files Here !/7 - Defining a Major Incident/4 - Defining the Trigger for a Major Incident Process.mp4
47 MB
~Get Your Files Here !/8 - Building a Cyber Incident Response Plan (CIRP)/1 - Planning for Identification Phase.mp4
47 MB
~Get Your Files Here !/8 - Building a Cyber Incident Response Plan (CIRP)/2 - Planning for Response.mp4
40 MB
~Get Your Files Here !/8 - Building a Cyber Incident Response Plan (CIRP)/3 - Planning for Lessons Learned.mp4
46 MB
~Get Your Files Here !/9 - Post Implementation Review Process/1 - Cost Savings from Preventing Cyber Attacks.mp4
39 MB
~Get Your Files Here !/9 - Post Implementation Review Process/2 - Non-Monetary Impact on the Business.mp4
50 MB
~Get Your Files Here !/9 - Post Implementation Review Process/3 - Understanding ROI for Cybersecurity Investments.mp4
52 MB
~Get Your Files Here !/9 - Post Implementation Review Process/4 - Post Implementation Review (PIR) Guide.html
667 B
~Get Your Files Here !/9 - Post Implementation Review Process/5 - Hands-On-Learning Mapping Out an Incident Management Process - M3HOL _ Cybersecurity Incident Response _ Frameworks & Implementation.pdf
206 kB
~Get Your Files Here !/9 - Post Implementation Review Process/5 - Hands-On-Learning Mapping Out an Incident Management Process.html
324 B
~Get Your Files Here !/Bonus Resources.txt
70 B