TorBT - Torrents and Magnet Links Search Engine

[ WebToolTip.com ] Corporate Security Policies by Infosec

File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/01 - Introduction to corporate security policies.mp4
30 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/01 - Introduction to corporate security policies.srt
18 kB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/02 - What are security policies, and why do we need them.mp4
25 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/02 - What are security policies, and why do we need them.srt
22 kB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/03 - Rules introduced Let’s talk about what they are in general.mp4
25 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/03 - Rules introduced Let’s talk about what they are in general.srt
21 kB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/04 - Internal rules Organization policies, procedures, and more.mp4
23 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/04 - Internal rules Organization policies, procedures, and more.srt
18 kB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/05 - Rethinking the rules pyramid as a platform.mp4
28 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/05 - Rethinking the rules pyramid as a platform.srt
22 kB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/06 - Three platforms plus a fourth to build your policies.mp4
19 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/06 - Three platforms plus a fourth to build your policies.srt
15 kB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/07 - Planning policies and internal rules conceptually.mp4
20 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/07 - Planning policies and internal rules conceptually.srt
16 kB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/08 - Building internal rules conceptually.mp4
32 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/08 - Building internal rules conceptually.srt
24 kB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/09 - Effective governance documents look like this.mp4
32 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/09 - Effective governance documents look like this.srt
25 kB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/10 - The people who write, read, and approve security policies.mp4
31 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/10 - The people who write, read, and approve security policies.srt
28 kB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/11 - Policy knowledge and skills introduced.mp4
14 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/11 - Policy knowledge and skills introduced.srt
12 kB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/12 - Summary.mp4
12 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/12 - Summary.srt
9.5 kB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/01 - Introduction to business needs for policies.mp4
22 MB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/01 - Introduction to business needs for policies.srt
14 kB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/02 - The business mission is always first.mp4
38 MB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/02 - The business mission is always first.srt
27 kB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/03 - Knowing your organization's mission, business, and culture.mp4
28 MB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/03 - Knowing your organization's mission, business, and culture.srt
21 kB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/04 - Ethics, business, security, and policies.mp4
60 MB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/04 - Ethics, business, security, and policies.srt
40 kB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/05 - Good internal rules help the business achieve its mission.mp4
12 MB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/05 - Good internal rules help the business achieve its mission.srt
9.0 kB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/06 - Synchronizing business needs and priorities.mp4
33 MB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/06 - Synchronizing business needs and priorities.srt
26 kB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/07 - Summary.mp4
25 MB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/07 - Summary.srt
12 kB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/01 - Introduction to external laws and rules.mp4
20 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/01 - Introduction to external laws and rules.srt
12 kB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/02 - Legal implications of policies and procedures.mp4
24 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/02 - Legal implications of policies and procedures.srt
17 kB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/03 - Introduction to law and regulation.mp4
51 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/03 - Introduction to law and regulation.srt
40 kB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/04 - Introducing laws as external rules to inform policies.mp4
27 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/04 - Introducing laws as external rules to inform policies.srt
19 kB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/05 - Cybersecurity laws and regulations, part 1.mp4
41 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/05 - Cybersecurity laws and regulations, part 1.srt
32 kB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/06 - Cybersecurity laws and regulations, part 2.mp4
32 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/06 - Cybersecurity laws and regulations, part 2.srt
23 kB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/07 - When and how to seek legal review.mp4
42 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/07 - When and how to seek legal review.srt
31 kB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/08 - Summary.mp4
22 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/08 - Summary.srt
12 kB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/01 - External guidance to assist with security policies overview.mp4
17 MB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/01 - External guidance to assist with security policies overview.srt
14 kB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/02 - Government regulatory guidance.mp4
32 MB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/02 - Government regulatory guidance.srt
23 kB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/03 - Finding good sample infosec policies from the internet.mp4
22 MB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/03 - Finding good sample infosec policies from the internet.srt
17 kB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/04 - Cybersecurity frameworks.mp4
54 MB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/04 - Cybersecurity frameworks.srt
39 kB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/05 - Books, articles, and other resources.mp4
17 MB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/05 - Books, articles, and other resources.srt
14 kB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/06 - Tools to assist with creating and managing policies.mp4
36 MB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/06 - Tools to assist with creating and managing policies.srt
28 kB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/07 - Summary.mp4
20 MB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/07 - Summary.srt
13 kB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/01 - Introduction to planning the policy project.mp4
26 MB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/01 - Introduction to planning the policy project.srt
22 kB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/02 - Planning for when you don't have time to plan.mp4
21 MB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/02 - Planning for when you don't have time to plan.srt
17 kB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/03 - Planning, scoping, and selling (evangelizing) the project.mp4
32 MB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/03 - Planning, scoping, and selling (evangelizing) the project.srt
29 kB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/04 - Where are we now, and where do we want to go.mp4
33 MB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/04 - Where are we now, and where do we want to go.srt
28 kB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/05 - Who should be on your team, and who else should be involved.mp4
15 MB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/05 - Who should be on your team, and who else should be involved.srt
12 kB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/06 - Summary.mp4
12 MB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/06 - Summary.srt
6.9 kB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/01 - Overview of project management and execution.mp4
20 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/01 - Overview of project management and execution.srt
12 kB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/02 - Project management basics.mp4
40 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/02 - Project management basics.srt
33 kB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/03 - Overview of all steps and phases.mp4
37 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/03 - Overview of all steps and phases.srt
32 kB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/04 - Review your project's scope and avoid scope creep.mp4
32 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/04 - Review your project's scope and avoid scope creep.srt
27 kB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/05 - Starting the project Project kickoff.mp4
13 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/05 - Starting the project Project kickoff.srt
10 kB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/06 - Review relevant existing internal rules.mp4
8.1 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/06 - Review relevant existing internal rules.srt
6.9 kB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/07 - People skills for managing and communicating in your project.mp4
27 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/07 - People skills for managing and communicating in your project.srt
24 kB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/08 - Resolving differences of opinion.mp4
36 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/08 - Resolving differences of opinion.srt
30 kB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/09 - Reading, writing, technical writing, and editing.mp4
54 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/09 - Reading, writing, technical writing, and editing.srt
38 kB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/10 - Tracking changes within documents and version control.mp4
51 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/10 - Tracking changes within documents and version control.srt
35 kB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/11 - Security and technical decisions.mp4
12 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/11 - Security and technical decisions.srt
9.6 kB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/12 - Gaining approval and finalizing the documents.mp4
28 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/12 - Gaining approval and finalizing the documents.srt
22 kB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/13 - Publication, training, and implementing phases.mp4
24 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/13 - Publication, training, and implementing phases.srt
20 kB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/14 - Summary.mp4
5.9 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/14 - Summary.srt
3.9 kB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/01 - Post-project.mp4
19 MB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/01 - Post-project.srt
12 kB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/02 - Document usage and the maintenance phase.mp4
20 MB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/02 - Document usage and the maintenance phase.srt
16 kB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/03 - When to start a new document project.mp4
25 MB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/03 - When to start a new document project.srt
21 kB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/04 - Summary.mp4
8.7 MB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/04 - Summary.srt
6.4 kB
~Get Your Files Here !/Bonus Resources.txt
70 B
~Get Your Files Here !/Ex_Files_Corporate_Security_Policies/Exercise Files/Course 1 Handout Policies.pdf
3.9 MB
~Get Your Files Here !/Ex_Files_Corporate_Security_Policies/Exercise Files/Course 2 Knowledge Check.pdf
166 kB
~Get Your Files Here !/Ex_Files_Corporate_Security_Policies/Exercise Files/Course 3 Knowledge Check.pdf
186 kB
~Get Your Files Here !/Ex_Files_Corporate_Security_Policies/Exercise Files/Course 4 Knowledge Check.pdf
170 kB
~Get Your Files Here !/Ex_Files_Corporate_Security_Policies/Exercise Files/Course 5 Knowledge Check.pdf
199 kB