TorBT - Torrents and Magnet Links Search Engine

[ WebToolTip.com ] Udemy - Cybersecurity Compliance for Non-Tech Employees

File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Introduction to Cybersecurity Compliance/1. Introduction.mp4
35 MB
~Get Your Files Here !/1 - Introduction to Cybersecurity Compliance/2. What Is Cybersecurity Compliance.mp4
42 MB
~Get Your Files Here !/1 - Introduction to Cybersecurity Compliance/3. Key Regulations and Standards.mp4
80 MB
~Get Your Files Here !/1 - Introduction to Cybersecurity Compliance/4. Roles of Non Tech Employees in Cybersecurity.mp4
106 MB
~Get Your Files Here !/2 - Key UK Laws and Regulations in Cybersecurity/10. Computer Misuse Act 1990.mp4
58 MB
~Get Your Files Here !/2 - Key UK Laws and Regulations in Cybersecurity/5. Introduction.mp4
37 MB
~Get Your Files Here !/2 - Key UK Laws and Regulations in Cybersecurity/6. General Data Protection Regulation (GDPR).mp4
48 MB
~Get Your Files Here !/2 - Key UK Laws and Regulations in Cybersecurity/7. Data Protection Act 2018.mp4
55 MB
~Get Your Files Here !/2 - Key UK Laws and Regulations in Cybersecurity/8. Network and Information Systems Regulations (NIS).mp4
56 MB
~Get Your Files Here !/2 - Key UK Laws and Regulations in Cybersecurity/9. The Investigatory Powers Act 2016.mp4
53 MB
~Get Your Files Here !/3 - Risk Management and Cybersecurity Threats/11. Introduction.mp4
30 MB
~Get Your Files Here !/3 - Risk Management and Cybersecurity Threats/12. Identifying Cybersecurity Risks in a Non Tech Environment.mp4
64 MB
~Get Your Files Here !/3 - Risk Management and Cybersecurity Threats/13. Risk Assessment and Management.mp4
65 MB
~Get Your Files Here !/3 - Risk Management and Cybersecurity Threats/14. Emerging Cybersecurity Threats.mp4
110 MB
~Get Your Files Here !/4 - Essential Cybersecurity Practices for Non Tech Employees/15. Introduction.mp4
39 MB
~Get Your Files Here !/4 - Essential Cybersecurity Practices for Non Tech Employees/16. Strong Passwords and Multi Factor Authentication.mp4
59 MB
~Get Your Files Here !/4 - Essential Cybersecurity Practices for Non Tech Employees/17. Recognising Phishing and Social Engineering Attacks.mp4
78 MB
~Get Your Files Here !/4 - Essential Cybersecurity Practices for Non Tech Employees/18. Cyber Hygiene Software Updates and Patch Management.mp4
56 MB
~Get Your Files Here !/4 - Essential Cybersecurity Practices for Non Tech Employees/19. Secure Use of Personal Devices and Remote Work Security.mp4
56 MB
~Get Your Files Here !/4 - Essential Cybersecurity Practices for Non Tech Employees/20. Cybersecurity Behaviours Building Awareness.mp4
53 MB
~Get Your Files Here !/5 - Incident Management and Reporting/21. Introduction.mp4
35 MB
~Get Your Files Here !/5 - Incident Management and Reporting/22. What Constitutes a Cybersecurity Incident.mp4
59 MB
~Get Your Files Here !/5 - Incident Management and Reporting/23. Steps to Take During a Cybersecurity Incident.mp4
67 MB
~Get Your Files Here !/5 - Incident Management and Reporting/24. Incident Response Plans Employee Role and Responsibilities.mp4
39 MB
~Get Your Files Here !/5 - Incident Management and Reporting/25. Case Study Insider Threats and Reporting.mp4
73 MB
~Get Your Files Here !/6 - Compliance Audits and Legal Documentation/26. Introduction.mp4
30 MB
~Get Your Files Here !/6 - Compliance Audits and Legal Documentation/27. Understanding Cybersecurity Audits.mp4
76 MB
~Get Your Files Here !/6 - Compliance Audits and Legal Documentation/28. Incident Documentation and Legal Requirements.mp4
76 MB
~Get Your Files Here !/6 - Compliance Audits and Legal Documentation/29. Monitoring and Reporting Compliance.mp4
43 MB
~Get Your Files Here !/6 - Compliance Audits and Legal Documentation/30. Case Study Insider Threats and Reporting.mp4
55 MB
~Get Your Files Here !/Bonus Resources.txt
70 B