TorBT - Torrents and Magnet Links Search Engine

[ WebToolTip.com ] CBTNuggets - ISACA CISM - Certified Information Security Manager 2025

File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1. Creating An Information Security Program/1. Organizational Culture.mp4
14 MB
~Get Your Files Here !/1. Creating An Information Security Program/2. Security Governance 1.mp4
19 MB
~Get Your Files Here !/1. Creating An Information Security Program/3. Security Governance 2.mp4
15 MB
~Get Your Files Here !/1. Creating An Information Security Program/4. The Importance of Strategy 1.mp4
17 MB
~Get Your Files Here !/1. Creating An Information Security Program/5. The Importance of Strategy 2.mp4
14 MB
~Get Your Files Here !/1. Creating An Information Security Program/6. Information Security Frameworks.mp4
14 MB
~Get Your Files Here !/1. Creating An Information Security Program/7. Strategic Objectives.mp4
18 MB
~Get Your Files Here !/1. Creating An Information Security Program/8. Business Model for Information Security (BMIS).mp4
13 MB
~Get Your Files Here !/10. Information Security Operations/1. Security Operations Centers (SOCs) 1.mp4
23 MB
~Get Your Files Here !/10. Information Security Operations/2. Security Operations Centers (SOCs) 2.mp4
17 MB
~Get Your Files Here !/10. Information Security Operations/3. Vulnerability and Patch Management.mp4
10 MB
~Get Your Files Here !/10. Information Security Operations/4. Protecting Networks Pt.1.mp4
28 MB
~Get Your Files Here !/10. Information Security Operations/5. Protecting Networks Pt.2.mp4
34 MB
~Get Your Files Here !/10. Information Security Operations/6. Content Filtering Solutions.mp4
21 MB
~Get Your Files Here !/10. Information Security Operations/7. Endpoint Protection and Management.mp4
17 MB
~Get Your Files Here !/11. Managing An Information Security Program/1. Secure Software Development.mp4
14 MB
~Get Your Files Here !/11. Managing An Information Security Program/2. Identity & Access Management (IAM) 1.mp4
29 MB
~Get Your Files Here !/11. Managing An Information Security Program/3. Identity & Access Management (IAM) 2.mp4
12 MB
~Get Your Files Here !/11. Managing An Information Security Program/4. Security Awareness Training and MSSPs.mp4
24 MB
~Get Your Files Here !/11. Managing An Information Security Program/5. Data Backup and Recovery.mp4
32 MB
~Get Your Files Here !/11. Managing An Information Security Program/6. Financial and Capacity Management.mp4
21 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/1. Security Controls.mp4
16 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/2. Categories Of Security Controls.mp4
14 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/3. Security Control Functions.mp4
11 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/4. Testing Security Controls.mp4
17 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/5. Security Control Objectives and Frameworks.mp4
15 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/6. Designing Security Controls.mp4
11 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/7. Key Performance Indicators (KPIs).mp4
17 MB
~Get Your Files Here !/13. The Incident Response Process/1. Phases Of Incident Response.mp4
16 MB
~Get Your Files Here !/13. The Incident Response Process/2. Incident Response Preparation.mp4
19 MB
~Get Your Files Here !/13. The Incident Response Process/3. Incident Response Planning.mp4
19 MB
~Get Your Files Here !/13. The Incident Response Process/4. Detection, Initiation and Evaluation Of Incidents.mp4
17 MB
~Get Your Files Here !/13. The Incident Response Process/5. Containment, Eradication and Recovery.mp4
11 MB
~Get Your Files Here !/13. The Incident Response Process/6. Post Incident Activities.mp4
11 MB
~Get Your Files Here !/13. The Incident Response Process/7. Incident Response Resources.mp4
13 MB
~Get Your Files Here !/14. BCDR Planning and Standards/1. BC and DR Planning (BCDR).mp4
8.6 MB
~Get Your Files Here !/14. BCDR Planning and Standards/2. The BCDR Planning Process.mp4
17 MB
~Get Your Files Here !/14. BCDR Planning and Standards/3. Creating a BC Plan.mp4
13 MB
~Get Your Files Here !/14. BCDR Planning and Standards/4. DR Planning.mp4
26 MB
~Get Your Files Here !/14. BCDR Planning and Standards/5. Resiliency Technologies.mp4
19 MB
~Get Your Files Here !/14. BCDR Planning and Standards/6. BCDR Testing.mp4
8.4 MB
~Get Your Files Here !/14. BCDR Planning and Standards/7. BCDR Resources.mp4
17 MB
~Get Your Files Here !/2. IS Program Resources/1. The P3 Policies, Processes and Procedures.mp4
22 MB
~Get Your Files Here !/2. IS Program Resources/2. Standards, Guidelines and Architecture.mp4
24 MB
~Get Your Files Here !/2. IS Program Resources/3. Controls, Metrics and Assets.mp4
20 MB
~Get Your Files Here !/2. IS Program Resources/4. Risk Ledgers, Vulnerability Assessments and Insurance.mp4
14 MB
~Get Your Files Here !/2. IS Program Resources/5. Critical Data, BIA's and BCDR Planning.mp4
23 MB
~Get Your Files Here !/2. IS Program Resources/6. Incident Logs and Audits.mp4
11 MB
~Get Your Files Here !/2. IS Program Resources/7. Information Security Training, 3rd Party Risk and LCR Requirements.mp4
20 MB
~Get Your Files Here !/3. Creating A Successful IS Program/1. Creating A Business Case 1.mp4
23 MB
~Get Your Files Here !/3. Creating A Successful IS Program/2. Creating A Business Case 2.mp4
8.7 MB
~Get Your Files Here !/3. Creating A Successful IS Program/3. Communications and Reporting.mp4
22 MB
~Get Your Files Here !/3. Creating A Successful IS Program/4. How To Communicate Technical Information.mp4
16 MB
~Get Your Files Here !/3. Creating A Successful IS Program/5. Commitment From Management.mp4
35 MB
~Get Your Files Here !/3. Creating A Successful IS Program/6. End User Information Security Training.mp4
23 MB
~Get Your Files Here !/3. Creating A Successful IS Program/7. Causes Of Failure To Avoid.mp4
23 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/1. Organization Level Roles.mp4
29 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/2. Roles Pertaining To Our Data.mp4
9.6 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/3. The World of Metrics.mp4
11 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/4. Metrics Scenario 1.mp4
18 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/5. Metrics Scenario 2.mp4
17 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/6. Have We Achieved Success.mp4
11 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/7. DAD Triad.mp4
5.0 MB
~Get Your Files Here !/5. Introduction To Risk Management/1. The Role of Risk Managent.mp4
18 MB
~Get Your Files Here !/5. Introduction To Risk Management/2. Risk Management Frameworks.mp4
25 MB
~Get Your Files Here !/5. Introduction To Risk Management/3. Risk Management Strategy 1.mp4
21 MB
~Get Your Files Here !/5. Introduction To Risk Management/4. Risk Management Strategy 2.mp4
15 MB
~Get Your Files Here !/5. Introduction To Risk Management/5. Analyzing Risk 1.mp4
28 MB
~Get Your Files Here !/5. Introduction To Risk Management/6. Analyzing Risk 2.mp4
14 MB
~Get Your Files Here !/5. Introduction To Risk Management/7. Risk Analysis Techniques.mp4
16 MB
~Get Your Files Here !/5. Introduction To Risk Management/8. Dealing With Risk.mp4
30 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/1. Risk Management Activities.mp4
20 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/2. NIST SP 800-39 Managing Information Security Risk.mp4
30 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/3. NIST SP 800-30 Guide For Conducting Risk Assessments.mp4
23 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/4. ISOIEC 27005 Guidance On Managing IS Risk.mp4
21 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/5. Factor Analysis of Information Risk (FAIR).mp4
19 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/6. Risk Management Walk-Through.mp4
17 MB
~Get Your Files Here !/7. Managing Assets and Threats/1. Hardware, Software and Information Assets.mp4
27 MB
~Get Your Files Here !/7. Managing Assets and Threats/2. Cloud and Virtual Assets.mp4
26 MB
~Get Your Files Here !/7. Managing Assets and Threats/3. Asset Information and Classification 1.mp4
18 MB
~Get Your Files Here !/7. Managing Assets and Threats/4. Asset Information and Classification 2.mp4
12 MB
~Get Your Files Here !/7. Managing Assets and Threats/5. Identifying Threats To Assets 1.mp4
19 MB
~Get Your Files Here !/7. Managing Assets and Threats/6. Identifying Threats To Assets 2.mp4
16 MB
~Get Your Files Here !/7. Managing Assets and Threats/7. Identifying Asset Vulnerabilities.mp4
19 MB
~Get Your Files Here !/7. Managing Assets and Threats/8. Bonus Nugget Nessus Vulnerability Scanner.mp4
34 MB
~Get Your Files Here !/8. Information Security Risk Management/1. Risk Management Objectives Pt.1.mp4
25 MB
~Get Your Files Here !/8. Information Security Risk Management/2. Risk Management Objectives Pt.2.mp4
26 MB
~Get Your Files Here !/8. Information Security Risk Management/3. Third Party Risk Management Pt.1.mp4
30 MB
~Get Your Files Here !/8. Information Security Risk Management/4. Third Party Risk Management Pt.2.mp4
20 MB
~Get Your Files Here !/8. Information Security Risk Management/5. The Risk Register.mp4
12 MB
~Get Your Files Here !/8. Information Security Risk Management/6. Integrating Risk Management Into Other Processes.mp4
20 MB
~Get Your Files Here !/8. Information Security Risk Management/7. Risk Monitoring and Reporting.mp4
22 MB
~Get Your Files Here !/9. Creating An Information Security Program/1. Building Blocks Of An Information Security Program.mp4
16 MB
~Get Your Files Here !/9. Creating An Information Security Program/2. Information Security Program Details.mp4
16 MB
~Get Your Files Here !/9. Creating An Information Security Program/3. Information Security Architecture.mp4
21 MB
~Get Your Files Here !/9. Creating An Information Security Program/4. Security Program Management 1.mp4
22 MB
~Get Your Files Here !/9. Creating An Information Security Program/5. Security Program Management 2.mp4
16 MB
~Get Your Files Here !/9. Creating An Information Security Program/6. Security Policies.mp4
11 MB
~Get Your Files Here !/9. Creating An Information Security Program/7. Working With Resources.mp4
22 MB
~Get Your Files Here !/Bonus Resources.txt
70 B