TorBT - Torrents and Magnet Links Search Engine
[ DevCourseWeb.com ] AKYLADE Cyber Risk Management Practitioner RMP-001 (A - CRMP) Cert Prep
- Date: 2026-03-31
- Size: 547 MB
- Files: 52
File Name
Size
Get Bonus Downloads Here.url
182 B
~Get Your Files Here !/01 - Introduction/01 - Introduction.mp4
32 MB
~Get Your Files Here !/01 - Introduction/01 - Introduction.srt
14 kB
~Get Your Files Here !/02 - 1. Leading Risk Management/01 - Creation, development, and leadership of cross-functional teams.mp4
22 MB
~Get Your Files Here !/02 - 1. Leading Risk Management/01 - Creation, development, and leadership of cross-functional teams.srt
14 kB
~Get Your Files Here !/02 - 1. Leading Risk Management/02 - Governance structures.mp4
8.3 MB
~Get Your Files Here !/02 - 1. Leading Risk Management/02 - Governance structures.srt
6.8 kB
~Get Your Files Here !/02 - 1. Leading Risk Management/03 - Regulations, standards, and guidelines.mp4
17 MB
~Get Your Files Here !/02 - 1. Leading Risk Management/03 - Regulations, standards, and guidelines.srt
12 kB
~Get Your Files Here !/02 - 1. Leading Risk Management/04 - Communicate, collaborate, and engage stakeholders.mp4
6.7 MB
~Get Your Files Here !/02 - 1. Leading Risk Management/04 - Communicate, collaborate, and engage stakeholders.srt
5.8 kB
~Get Your Files Here !/02 - 1. Leading Risk Management/05 - Cybersecurity training and exercises.mp4
6.0 MB
~Get Your Files Here !/02 - 1. Leading Risk Management/05 - Cybersecurity training and exercises.srt
5.1 kB
~Get Your Files Here !/02 - 1. Leading Risk Management/06 - Policies, guidelines, processes, and procedures.mp4
13 MB
~Get Your Files Here !/02 - 1. Leading Risk Management/06 - Policies, guidelines, processes, and procedures.srt
8.9 kB
~Get Your Files Here !/03 - 2. Risk Identification and Analysis/01 - Strategies to identify threats and vulnerabilities.mp4
50 MB
~Get Your Files Here !/03 - 2. Risk Identification and Analysis/01 - Strategies to identify threats and vulnerabilities.srt
34 kB
~Get Your Files Here !/03 - 2. Risk Identification and Analysis/02 - Assess and analyze common threats and vulnerabilities.mp4
51 MB
~Get Your Files Here !/03 - 2. Risk Identification and Analysis/02 - Assess and analyze common threats and vulnerabilities.srt
38 kB
~Get Your Files Here !/03 - 2. Risk Identification and Analysis/03 - Continuous risk assessment process.mp4
18 MB
~Get Your Files Here !/03 - 2. Risk Identification and Analysis/03 - Continuous risk assessment process.srt
12 kB
~Get Your Files Here !/03 - 2. Risk Identification and Analysis/04 - Analyze and prioritize security risks.mp4
19 MB
~Get Your Files Here !/03 - 2. Risk Identification and Analysis/04 - Analyze and prioritize security risks.srt
16 kB
~Get Your Files Here !/03 - 2. Risk Identification and Analysis/05 - Assess new and existing systems.mp4
12 MB
~Get Your Files Here !/03 - 2. Risk Identification and Analysis/05 - Assess new and existing systems.srt
9.2 kB
~Get Your Files Here !/03 - 2. Risk Identification and Analysis/06 - Create a risk register.mp4
18 MB
~Get Your Files Here !/03 - 2. Risk Identification and Analysis/06 - Create a risk register.srt
15 kB
~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/01 - Risk acceptance response.mp4
21 MB
~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/01 - Risk acceptance response.srt
15 kB
~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/02 - Risk avoidance strategy.mp4
9.2 MB
~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/02 - Risk avoidance strategy.srt
6.9 kB
~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/03 - Risk transference response.mp4
17 MB
~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/03 - Risk transference response.srt
15 kB
~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/04 - Risk mitigation measures and controls.mp4
36 MB
~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/04 - Risk mitigation measures and controls.srt
26 kB
~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/05 - Cost effectiveness of proposed measure or security control.mp4
16 MB
~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/05 - Cost effectiveness of proposed measure or security control.srt
11 kB
~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/06 - Routine risk, security, or compliance audit.mp4
18 MB
~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/06 - Routine risk, security, or compliance audit.srt
11 kB
~Get Your Files Here !/05 - 4. Compliance and Authorization/01 - Gap assessment.mp4
20 MB
~Get Your Files Here !/05 - 4. Compliance and Authorization/01 - Gap assessment.srt
12 kB
~Get Your Files Here !/05 - 4. Compliance and Authorization/02 - Compliance considerations.mp4
11 MB
~Get Your Files Here !/05 - 4. Compliance and Authorization/02 - Compliance considerations.srt
9.2 kB
~Get Your Files Here !/05 - 4. Compliance and Authorization/03 - Internal and external auditing procedures.mp4
8.2 MB
~Get Your Files Here !/05 - 4. Compliance and Authorization/03 - Internal and external auditing procedures.srt
8.2 kB
~Get Your Files Here !/05 - 4. Compliance and Authorization/04 - Authorization of systems and processes.mp4
19 MB
~Get Your Files Here !/05 - 4. Compliance and Authorization/04 - Authorization of systems and processes.srt
15 kB
~Get Your Files Here !/06 - 5. Risk Management Framework/01 - Risk management.mp4
84 MB
~Get Your Files Here !/06 - 5. Risk Management Framework/01 - Risk management.srt
49 kB
~Get Your Files Here !/07 - Conclusion/01 - Course review.mp4
13 MB
~Get Your Files Here !/07 - Conclusion/01 - Course review.srt
7.8 kB
~Get Your Files Here !/Bonus Resources.txt
70 B