CRISC Certified in Risk and Information Systems Control23
Language: English | Size:5.94 GB
Genre:eLearning
Files Included :
1 - The Security Objective and CIA Triad.mp4 (30.14 MB)
MP4
10 - RACI Matrix.mp4 (16.01 MB)
MP4
11 - Policies.mp4 (24.29 MB)
MP4
12 - Standards.mp4 (62.55 MB)
MP4
13 - Procedures and Guidelines.mp4 (22.65 MB)
MP4
14 - Types of Risk Resdiual and Inherent Risk.mp4 (47.77 MB)
MP4
15 - Risk Management Frameworks.mp4 (15.96 MB)
MP4
16 - Legal and Regulatory Requirements.mp4 (57.42 MB)
MP4
17 - Security Frameworks and Standards.mp4 (39.28 MB)
MP4
18 - Data Lifecycle.mp4 (27.44 MB)
MP4
19 - Data Classification Level.mp4 (37.71 MB)
MP4
2 - What is the Security Program.mp4 (11.03 MB)
MP4
20 - Intellectual Property.mp4 (34.7 MB)
MP4
3 - Security vs Privacy and Essential Security Terms.mp4 (68.64 MB)
MP4
4 - What is Risk Management.mp4 (93.97 MB)
MP4
5 - Information Security and GRC.mp4 (56.18 MB)
MP4
6 - What is Governance.mp4 (31.41 MB)
MP4
7 - Information Security Governane.mp4 (10.18 MB)
MP4
8 - Organizational Structure.mp4 (7.51 MB)
MP4
9 - Governance Roles and Responsibilities.mp4 (84.2 MB)
MP4
21 - The Complete Risk Management Process.mp4 (36.34 MB)
MP4
22 - Risk Identification.mp4 (64.81 MB)
MP4
23 - Data Privacy Requirements.mp4 (63.67 MB)
MP4
24 - Privacy Regulations Roles.mp4 (12.03 MB)
MP4
25 - Security Vulnerabilities Overview.mp4 (123.31 MB)
MP4
26 - Security Threats.mp4 (60.18 MB)
MP4
27 - Security Attacks 1.mp4 (94.43 MB)
MP4
28 - Security Attacks 2.mp4 (230.24 MB)
MP4
29 - Web Application Attacks.mp4 (169.08 MB)
MP4
30 - Cyber Kill Chain.mp4 (25.02 MB)
MP4
31 - Threat Model Overview.mp4 (61.77 MB)
MP4
32 - STRIDE and DREAD Threat Model.mp4 (171.29 MB)
MP4
33 - PASTA Threat Model.mp4 (34.19 MB)
MP4
34 - Use Case and Abuse Case.mp4 (18.91 MB)
MP4
35 - Risk Analysis and Evaluation.mp4 (180.96 MB)
MP4
36 - Specialised Techniques in Risk Evaluation and Identification.mp4 (28.69 MB)
MP4
37 - Vulnerability Assessment and Risk Identification.mp4 (19.21 MB)
MP4
38 - Security Testing and Penetration testing techniques.mp4 (20 MB)
MP4
39 - Business Impact Assessment.mp4 (18.04 MB)
MP4
40 - Risk Response.mp4 (28.77 MB)
MP4
41 - Security Controls Overview.mp4 (36.86 MB)
MP4
42 - The Organisational Security Architecture.mp4 (318.88 MB)
MP4
43 - Types of Security Controls.mp4 (142.64 MB)
MP4
44 - Control Objective and Control Testing.mp4 (26.73 MB)
MP4
45 - Defens in Depth or layered defenses.mp4 (34.99 MB)
MP4
46 - Owner and Custodian.mp4 (44.99 MB)
MP4
47 - Risk Reporting and Monitoring.mp4 (63.79 MB)
MP4
48 - Key Performance Indicators.mp4 (15.65 MB)
MP4
49 - Key Risk Indicator.mp4 (43.11 MB)
MP4
50 - Incident Response Overview.mp4 (145.2 MB)
MP4
51 - Security Operation Center.mp4 (35.51 MB)
MP4
52 - SIEM Solution Overview.mp4 (43.1 MB)
MP4
53 - Endpoint Detection and Response and Network detection and response.mp4 (37.49 MB)
MP4
54 - SOAR and XDR.mp4 (60.9 MB)
MP4
55 - Vulnerability Assessment tools.mp4 (37.05 MB)
MP4
56 - Endpoint Protection Practices.mp4 (54.09 MB)
MP4
57 - Network Security Devices.mp4 (174.16 MB)
MP4
58 - VPN Wireless IoT Security.mp4 (52.7 MB)
MP4
59 - Disaster Recovery Plan.mp4 (22.8 MB)
MP4
60 - Business Continuity Plan.mp4 (20.7 MB)
MP4
61 - Data Backup.mp4 (41.13 MB)
MP4
62 - Data Backup Types.mp4 (70.57 MB)
MP4
63 - Change Management Process.mp4 (22.92 MB)
MP4
64 - Types of Change requests.mp4 (34.25 MB)
MP4
65 - Social Engineering Attacks.mp4 (169.92 MB)
MP4
66 - Security Awareness Program as a Control.mp4 (45.07 MB)
MP4
67 - Application architecture and Network architecture.mp4 (308.16 MB)
MP4
68 - Enterprise Architecture.mp4 (15.97 MB)
MP4
69 - Computing Device Components.mp4 (115.14 MB)
MP4
70 - Computing device forms and types of OS and Platforms.mp4 (340.93 MB)
MP4
71 - Network Foundations.mp4 (46.14 MB)
MP4
72 - Network Topologies.mp4 (41.6 MB)
MP4
73 - Domain Name System.mp4 (10.44 MB)
MP4
74 - OSI Model and TCPIP Model.mp4 (15.48 MB)
MP4
75 - OSI Model Overview.mp4 (48.51 MB)
MP4
76 - Network Security Controls.mp4 (174.19 MB)
MP4
77 - Network Security Review.mp4 (67.75 MB)
MP4
78 - Virtualization.mp4 (16.36 MB)
MP4
79 - Software Defined Networks.mp4 (51.02 MB)
MP4
80 - Containers and Functions.mp4 (46.2 MB)
MP4
81 - Cloud Computing.mp4 (77.14 MB)
MP4
82 - Software Development Overview.mp4 (32.32 MB)
MP4
83 - Software Development Methodologies.mp4 (86.52 MB)
MP4
84 - Software types and license types.mp4 (39.19 MB)
MP4
85 - Intellectual Property.mp4 (35.23 MB)
MP4
86 - Secure Coding.mp4 (67.45 MB)
MP4
87 - AAA Concept.mp4 (30.57 MB)
MP4
88 - Access Control and Authorization.mp4 (52.29 MB)
MP4
89 - What is Physical Security.mp4 (33.98 MB)
MP4
90 - Physical Security Controls 1.mp4 (22.69 MB)
MP4
91 - Physical Security Controls 2.mp4 (20.18 MB)
MP4
92 - Cryptography Overview.mp4 (32.86 MB)
MP4
93 - Symmetric Encryption.mp4 (45.4 MB)
MP4
94 - Asymmetric Encryption.mp4 (85.04 MB)
MP4
95 - Digital Signature.mp4 (17.23 MB)
MP4
96 - Hashing.mp4 (62.48 MB)
MP4
97 - Cryptography Applications.mp4 (12.69 MB)
MP4