TorBT - Torrents and Magnet Links Search Engine

Enterprise Security Policies, Practices, and Procedures

File Name
Size
01. Course Overview/01. Course Overview.mp4
4.1 MB
02. Security Data Analytics What's Going On/01. Series Introductionoverview.mp4
11 MB
02. Security Data Analytics What's Going On/02. Module Overview.mp4
1.4 MB
02. Security Data Analytics What's Going On/03. Teaching an Old Dog New Tricks.mp4
15 MB
02. Security Data Analytics What's Going On/04. Trend Analysis.mp4
8.7 MB
02. Security Data Analytics What's Going On/05. Data Aggregation and Correlation.mp4
4.7 MB
02. Security Data Analytics What's Going On/06. Historical Analysis.mp4
17 MB
02. Security Data Analytics What's Going On/07. Summary.mp4
1.8 MB
03. Defense in Depth This Is Where It Begins/01 Introduction and Overview.mp4
1.3 MB
03. Defense in Depth This Is Where It Begins/02. What Is Defense in Depth.mp4
17 MB
03. Defense in Depth This Is Where It Begins/04. Level 2 Processes.mp4
3.5 MB
03. Defense in Depth This Is Where It Begins/05. Level 3 Technologies.mp4
3.4 MB
03. Defense in Depth This Is Where It Begins/06. Level 4 The Network.mp4
4.0 MB
03. Defense in Depth This Is Where It Begins/07. Summary.mp4
2.4 MB
04. Defense in Depth What Tools Can You Use/01. Introduction and Overview.mp4
2.1 MB
04. Defense in Depth What Tools Can You Use/02. Let's Break It Down!.mp4
9.9 MB
04. Defense in Depth What Tools Can You Use/03. IPSHIPS.mp4
13 MB
04. Defense in Depth What Tools Can You Use/04. Firewalls Softwarehardware.mp4
4.1 MB
04. Defense in Depth What Tools Can You Use/05. Anti-virusanti-malware.mp4
1.9 MB
04. Defense in Depth What Tools Can You Use/06. EMET.mp4
12 MB
04. Defense in Depth What Tools Can You Use/07. Web Proxies & WAFs.mp4
7.6 MB
04. Defense in Depth What Tools Can You Use/08. A New Hope.mp4
13 MB
04. Defense in Depth What Tools Can You Use/09. Summary.mp4
2.4 MB
05. Defense in Depth Drill, Test, Rinse, Repeat/01. Introduction and Overview.mp4
1.1 MB
05. Defense in Depth Drill, Test, Rinse, Repeat/02. Why Penetration Tests.mp4
6.6 MB
05. Defense in Depth Drill, Test, Rinse, Repeat/03. Rules Are Rules.mp4
10 MB
05. Defense in Depth Drill, Test, Rinse, Repeat/04. Reverse Engineering.mp4
4.1 MB
05. Defense in Depth Drill, Test, Rinse, Repeat/05. Teams Involved.mp4
4.7 MB
05. Defense in Depth Drill, Test, Rinse, Repeat/06. Risk Evaluation.mp4
7.4 MB
05. Defense in Depth Drill, Test, Rinse, Repeat/07. Summary.mp4
2.0 MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/01. Introduction and Overview.mp4
1.1 MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/02. Frameworks.mp4
6.8 MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/03. Policies.mp4
12 MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/04. Controls.mp4
6.6 MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/05. Procedures.mp4
7.1 MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/06. Quality Controls & Verification.mp4
5.9 MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/07. Module & Course Summary.mp4
1.4 MB
enterprise-security-policies-practices-procedures.zip
8.2 MB
Torrent Downloaded From Katcr.co - Kickasstorrents.txt
52 B