PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links:







Partners
warezload

movieblogarea download
katzdownload

CRISC Certified in Risk and Information Systems Control23

Category: Courses / Others
Author: AD-TEAM
Date added: 14.09.2023 :06:14
Views: 8
Comments: 0










Description material

CRISC Certified in Risk and Information Systems Control23


CRISC Certified in Risk and Information Systems Control23
Language: English | Size:5.94 GB
Genre:eLearning


Files Included :

1 - The Security Objective and CIA Triad.mp4 (30.14 MB)
MP4
10 - RACI Matrix.mp4 (16.01 MB)
MP4
11 - Policies.mp4 (24.29 MB)
MP4
12 - Standards.mp4 (62.55 MB)
MP4
13 - Procedures and Guidelines.mp4 (22.65 MB)
MP4
14 - Types of Risk Resdiual and Inherent Risk.mp4 (47.77 MB)
MP4
15 - Risk Management Frameworks.mp4 (15.96 MB)
MP4
16 - Legal and Regulatory Requirements.mp4 (57.42 MB)
MP4
17 - Security Frameworks and Standards.mp4 (39.28 MB)
MP4
18 - Data Lifecycle.mp4 (27.44 MB)
MP4
19 - Data Classification Level.mp4 (37.71 MB)
MP4
2 - What is the Security Program.mp4 (11.03 MB)
MP4
20 - Intellectual Property.mp4 (34.7 MB)
MP4
3 - Security vs Privacy and Essential Security Terms.mp4 (68.64 MB)
MP4
4 - What is Risk Management.mp4 (93.97 MB)
MP4
5 - Information Security and GRC.mp4 (56.18 MB)
MP4
6 - What is Governance.mp4 (31.41 MB)
MP4
7 - Information Security Governane.mp4 (10.18 MB)
MP4
8 - Organizational Structure.mp4 (7.51 MB)
MP4
9 - Governance Roles and Responsibilities.mp4 (84.2 MB)
MP4
21 - The Complete Risk Management Process.mp4 (36.34 MB)
MP4
22 - Risk Identification.mp4 (64.81 MB)
MP4
23 - Data Privacy Requirements.mp4 (63.67 MB)
MP4
24 - Privacy Regulations Roles.mp4 (12.03 MB)
MP4
25 - Security Vulnerabilities Overview.mp4 (123.31 MB)
MP4
26 - Security Threats.mp4 (60.18 MB)
MP4
27 - Security Attacks 1.mp4 (94.43 MB)
MP4
28 - Security Attacks 2.mp4 (230.24 MB)
MP4
29 - Web Application Attacks.mp4 (169.08 MB)
MP4
30 - Cyber Kill Chain.mp4 (25.02 MB)
MP4
31 - Threat Model Overview.mp4 (61.77 MB)
MP4
32 - STRIDE and DREAD Threat Model.mp4 (171.29 MB)
MP4
33 - PASTA Threat Model.mp4 (34.19 MB)
MP4
34 - Use Case and Abuse Case.mp4 (18.91 MB)
MP4
35 - Risk Analysis and Evaluation.mp4 (180.96 MB)
MP4
36 - Specialised Techniques in Risk Evaluation and Identification.mp4 (28.69 MB)
MP4
37 - Vulnerability Assessment and Risk Identification.mp4 (19.21 MB)
MP4
38 - Security Testing and Penetration testing techniques.mp4 (20 MB)
MP4
39 - Business Impact Assessment.mp4 (18.04 MB)
MP4
40 - Risk Response.mp4 (28.77 MB)
MP4
41 - Security Controls Overview.mp4 (36.86 MB)
MP4
42 - The Organisational Security Architecture.mp4 (318.88 MB)
MP4
43 - Types of Security Controls.mp4 (142.64 MB)
MP4
44 - Control Objective and Control Testing.mp4 (26.73 MB)
MP4
45 - Defens in Depth or layered defenses.mp4 (34.99 MB)
MP4
46 - Owner and Custodian.mp4 (44.99 MB)
MP4
47 - Risk Reporting and Monitoring.mp4 (63.79 MB)
MP4
48 - Key Performance Indicators.mp4 (15.65 MB)
MP4
49 - Key Risk Indicator.mp4 (43.11 MB)
MP4
50 - Incident Response Overview.mp4 (145.2 MB)
MP4
51 - Security Operation Center.mp4 (35.51 MB)
MP4
52 - SIEM Solution Overview.mp4 (43.1 MB)
MP4
53 - Endpoint Detection and Response and Network detection and response.mp4 (37.49 MB)
MP4
54 - SOAR and XDR.mp4 (60.9 MB)
MP4
55 - Vulnerability Assessment tools.mp4 (37.05 MB)
MP4
56 - Endpoint Protection Practices.mp4 (54.09 MB)
MP4
57 - Network Security Devices.mp4 (174.16 MB)
MP4
58 - VPN Wireless IoT Security.mp4 (52.7 MB)
MP4
59 - Disaster Recovery Plan.mp4 (22.8 MB)
MP4
60 - Business Continuity Plan.mp4 (20.7 MB)
MP4
61 - Data Backup.mp4 (41.13 MB)
MP4
62 - Data Backup Types.mp4 (70.57 MB)
MP4
63 - Change Management Process.mp4 (22.92 MB)
MP4
64 - Types of Change requests.mp4 (34.25 MB)
MP4
65 - Social Engineering Attacks.mp4 (169.92 MB)
MP4
66 - Security Awareness Program as a Control.mp4 (45.07 MB)
MP4
67 - Application architecture and Network architecture.mp4 (308.16 MB)
MP4
68 - Enterprise Architecture.mp4 (15.97 MB)
MP4
69 - Computing Device Components.mp4 (115.14 MB)
MP4
70 - Computing device forms and types of OS and Platforms.mp4 (340.93 MB)
MP4
71 - Network Foundations.mp4 (46.14 MB)
MP4
72 - Network Topologies.mp4 (41.6 MB)
MP4
73 - Domain Name System.mp4 (10.44 MB)
MP4
74 - OSI Model and TCPIP Model.mp4 (15.48 MB)
MP4
75 - OSI Model Overview.mp4 (48.51 MB)
MP4
76 - Network Security Controls.mp4 (174.19 MB)
MP4
77 - Network Security Review.mp4 (67.75 MB)
MP4
78 - Virtualization.mp4 (16.36 MB)
MP4
79 - Software Defined Networks.mp4 (51.02 MB)
MP4
80 - Containers and Functions.mp4 (46.2 MB)
MP4
81 - Cloud Computing.mp4 (77.14 MB)
MP4
82 - Software Development Overview.mp4 (32.32 MB)
MP4
83 - Software Development Methodologies.mp4 (86.52 MB)
MP4
84 - Software types and license types.mp4 (39.19 MB)
MP4
85 - Intellectual Property.mp4 (35.23 MB)
MP4
86 - Secure Coding.mp4 (67.45 MB)
MP4
87 - AAA Concept.mp4 (30.57 MB)
MP4
88 - Access Control and Authorization.mp4 (52.29 MB)
MP4
89 - What is Physical Security.mp4 (33.98 MB)
MP4
90 - Physical Security Controls 1.mp4 (22.69 MB)
MP4
91 - Physical Security Controls 2.mp4 (20.18 MB)
MP4
92 - Cryptography Overview.mp4 (32.86 MB)
MP4
93 - Symmetric Encryption.mp4 (45.4 MB)
MP4
94 - Asymmetric Encryption.mp4 (85.04 MB)
MP4
95 - Digital Signature.mp4 (17.23 MB)
MP4
96 - Hashing.mp4 (62.48 MB)
MP4
97 - Cryptography Applications.mp4 (12.69 MB)
MP4






Join to our telegram Group
Information
Users of Guests are not allowed to comment this publication.
Choose Site Language
Keep downtopc Online Please

PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links: