589689.xyz

[ ] Udemy - How To Develop An Information Security Program

  • 收录时间:2021-12-13 09:57:51
  • 文件大小:2GB
  • 下载次数:1
  • 最近下载:2021-12-13 09:57:51
  • 磁力链接:

文件列表

  1. ~Get Your Files Here !/2. Information Security Policies/3. Documenting The PROTECT Security Control Policy Statements.mp4 322MB
  2. ~Get Your Files Here !/1. Introduction/1. Introduction.mp4 312MB
  3. ~Get Your Files Here !/2. Information Security Policies/2. Documenting The IDENTIFY Security Controls Policy Statements.mp4 258MB
  4. ~Get Your Files Here !/3. Information Security Procedures/2. Defining Your IT Security Configuration Standards & Guidelines.mp4 182MB
  5. ~Get Your Files Here !/3. Information Security Procedures/1. Documenting Your Information Security Standard Operating Procedures.mp4 152MB
  6. ~Get Your Files Here !/4. Conclusion/1. Going Beyond Information Security Policies & Procedures.mp4 151MB
  7. ~Get Your Files Here !/4. Conclusion/2. It's Time For Action - Wrapping Things Up.mp4 88MB
  8. ~Get Your Files Here !/1. Introduction/4. Identifying Your Operational Security Policies.mp4 88MB
  9. ~Get Your Files Here !/2. Information Security Policies/4. Documenting The DETECT Security Controls Policy Statements.mp4 75MB
  10. ~Get Your Files Here !/1. Introduction/3. Defining Responsibility Over Software and Applications.mp4 51MB
  11. ~Get Your Files Here !/2. Information Security Policies/5. Documenting The RESPOND Security Controls Policy Statements.mp4 50MB
  12. ~Get Your Files Here !/1. Introduction/2. Identifying Roles by Security Controls.mp4 45MB
  13. ~Get Your Files Here !/2. Information Security Policies/6. Documenting The RECOVER Security Controls Policy Statements.mp4 16MB
  14. ~Get Your Files Here !/2. Information Security Policies/1. Introduction To Your Information Security Polices.mp4 9MB
  15. ~Get Your Files Here !/3. Information Security Procedures/1.1 CSR Information Security Standard Operating Procedures.doc 2MB
  16. ~Get Your Files Here !/1. Introduction/3.1 Application_XRef Template.xlsx 635KB
  17. ~Get Your Files Here !/2. Information Security Policies/1.1 CSR Information Security Policy - NIST CSF.doc 246KB
  18. ~Get Your Files Here !/1. Introduction/4.1 CSR Acceptable Use Policy.docx 195KB
  19. ~Get Your Files Here !/1. Introduction/4.3 CSR Teleworking Policy.docx 194KB
  20. ~Get Your Files Here !/1. Introduction/4.2 CSR Sanctions Policy.docx 192KB
  21. ~Get Your Files Here !/2. Information Security Policies/3. Documenting The PROTECT Security Control Policy Statements.srt 65KB
  22. ~Get Your Files Here !/1. Introduction/1. Introduction.srt 64KB
  23. ~Get Your Files Here !/3. Information Security Procedures/2.1 Secure Configuration Standard v1.0.xlsx 61KB
  24. ~Get Your Files Here !/2. Information Security Policies/2. Documenting The IDENTIFY Security Controls Policy Statements.srt 50KB
  25. ~Get Your Files Here !/1. Introduction/2.1 Roles by Control Matrix.xlsx 29KB
  26. ~Get Your Files Here !/3. Information Security Procedures/2. Defining Your IT Security Configuration Standards & Guidelines.srt 27KB
  27. ~Get Your Files Here !/3. Information Security Procedures/1. Documenting Your Information Security Standard Operating Procedures.srt 21KB
  28. ~Get Your Files Here !/2. Information Security Policies/4. Documenting The DETECT Security Controls Policy Statements.srt 15KB
  29. ~Get Your Files Here !/2. Information Security Policies/6. Documenting The RECOVER Security Controls Policy Statements.srt 13KB
  30. ~Get Your Files Here !/1. Introduction/3. Defining Responsibility Over Software and Applications.srt 12KB
  31. ~Get Your Files Here !/2. Information Security Policies/5. Documenting The RESPOND Security Controls Policy Statements.srt 11KB
  32. ~Get Your Files Here !/4. Conclusion/1. Going Beyond Information Security Policies & Procedures.srt 10KB
  33. ~Get Your Files Here !/1. Introduction/2. Identifying Roles by Security Controls.srt 6KB
  34. ~Get Your Files Here !/4. Conclusion/2. It's Time For Action - Wrapping Things Up.srt 6KB
  35. ~Get Your Files Here !/2. Information Security Policies/1. Introduction To Your Information Security Polices.srt 5KB
  36. ~Get Your Files Here !/1. Introduction/4. Identifying Your Operational Security Policies.srt 5KB
  37. ~Get Your Files Here !/Bonus Resources.txt 357B
  38. Get Bonus Downloads Here.url 183B