~Get Your Files Here !/6. Protecting Assets - Data Security Controls/14. Protecting Assets Understanding Configuration Management - 2.mp4 64MB
~Get Your Files Here !/2. Understanding Information Life Cycle/1. Introduction.mp4 61MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/13. Protecting Assets Understanding Configuration Management - 1.mp4 59MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/12. Protecting Assets Learning System Configuration.mp4 58MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/18. Protecting Assets Tools to Securely Delete Content.mp4 53MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/19. Section Outro.mp4 52MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/10. Protecting Assets Learn About ASD.mp4 50MB
~Get Your Files Here !/2. Understanding Information Life Cycle/2. Information Life Cycle The Valuable Information Assets - 1.mp4 49MB
~Get Your Files Here !/2. Understanding Information Life Cycle/3. Information Life Cycle The Valuable Information Assets - 2.mp4 48MB
~Get Your Files Here !/3. Learning Layers of Responsibility/5. Section Outro.mp4 44MB
~Get Your Files Here !/4. Learn About Information Classification/9. Learning Information Classification Define Appropriate Protections.mp4 43MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/17. Protecting Assets Learn and Understand Data Remanence - 2.mp4 42MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/7. Protecting Assets Subtypes - 3.mp4 42MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/8. Protecting Assets Using Accepted Standards - 1.mp4 41MB
~Get Your Files Here !/3. Learning Layers of Responsibility/1. Introduction.mp4 38MB
~Get Your Files Here !/4. Learn About Information Classification/10. Learning Information Classification Apply Classification Labels.mp4 38MB
~Get Your Files Here !/4. Learn About Information Classification/1. Introduction.mp4 36MB
~Get Your Files Here !/2. Understanding Information Life Cycle/4. Information Life Cycle What Allows Access.mp4 36MB
~Get Your Files Here !/3. Learning Layers of Responsibility/2. Learning Layers of Responsibility Security Administrator.mp4 36MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/5. Protecting Assets Subtypes - 1.mp4 35MB
~Get Your Files Here !/4. Learn About Information Classification/2. Learning Information Classification Classifications Levels.mp4 35MB
~Get Your Files Here !/5. Learn and Understand Retention Policies/2. Learning Retention Policies Data Must Be Securely Maintained - 2.mp4 34MB
~Get Your Files Here !/4. Learn About Information Classification/11. Implement Protective and Monitoring Technologies - 1.mp4 30MB
~Get Your Files Here !/3. Learning Layers of Responsibility/4. Learning Layers of Responsibility Data Custodian & User.mp4 28MB
~Get Your Files Here !/4. Learn About Information Classification/12. Implement Protective and Monitoring Technologies - 2.mp4 28MB
~Get Your Files Here !/4. Learn About Information Classification/3. Understanding Information Classification - 1.mp4 27MB
~Get Your Files Here !/4. Learn About Information Classification/8. Learning Information Classification Define Classifications.mp4 27MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/6. Protecting Assets Subtypes - 2.mp4 26MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/11. Protecting Assets Standards and Baselines.mp4 26MB
~Get Your Files Here !/3. Learning Layers of Responsibility/3. Learning Layers of Responsibility Data Owner & System Custodian.mp4 25MB
~Get Your Files Here !/4. Learn About Information Classification/4. Understanding Information Classification - 2.mp4 25MB
~Get Your Files Here !/4. Learn About Information Classification/13. Learning Information Classification Data Classification - Provide Training.mp4 23MB
~Get Your Files Here !/5. Learn and Understand Retention Policies/1. Learning Retention Policies Data Must Be Securely Maintained - 1.mp4 23MB
~Get Your Files Here !/4. Learn About Information Classification/7. Learning Information Classification Assign an Accurate Value to Each Asset.mp4 22MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/16. Protecting Assets Learn and Understand Data Remanence - 1.mp4 22MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/3. Protecting Assets Technical.mp4 22MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/15. Protecting Assets Handling Data & Removable Media.mp4 22MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/9. Protecting Assets Using Accepted Standards - 2.mp4 22MB
~Get Your Files Here !/2. Understanding Information Life Cycle/5. Information Life Cycle Confidentiality, Integrity, and Availability - 1.mp4 20MB
~Get Your Files Here !/4. Learn About Information Classification/14. Section Outro.mp4 19MB
~Get Your Files Here !/4. Learn About Information Classification/6. Learning Information Classification Data At Rest.mp4 19MB
~Get Your Files Here !/7. Course Summary/1. Summary.mp4 18MB
~Get Your Files Here !/4. Learn About Information Classification/5. Learning Information Classification Develop An Inventory of Data Assets.mp4 18MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/4. Protecting Assets Physical.mp4 16MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/1. Introduction.mp4 16MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/2. Protecting Assets Administrative.mp4 14MB
~Get Your Files Here !/5. Learn and Understand Retention Policies/3. Ensure Retention Policies Meet Compliance Requirements - 1.mp4 13MB
~Get Your Files Here !/5. Learn and Understand Retention Policies/4. Ensure Retention Policies Meet Compliance Requirements - 2.mp4 12MB
~Get Your Files Here !/2. Understanding Information Life Cycle/6. Information Life Cycle Confidentiality, Integrity, and Availability - 2.mp4 8MB
~Get Your Files Here !/1. Welcome/1. Introduction.mp4 2MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/14. Protecting Assets Understanding Configuration Management - 2.srt 13KB
~Get Your Files Here !/2. Understanding Information Life Cycle/1. Introduction.srt 12KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/13. Protecting Assets Understanding Configuration Management - 1.srt 12KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/19. Section Outro.srt 12KB
~Get Your Files Here !/2. Understanding Information Life Cycle/3. Information Life Cycle The Valuable Information Assets - 2.srt 12KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/12. Protecting Assets Learning System Configuration.srt 11KB
~Get Your Files Here !/2. Understanding Information Life Cycle/2. Information Life Cycle The Valuable Information Assets - 1.srt 11KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/8. Protecting Assets Using Accepted Standards - 1.srt 11KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/17. Protecting Assets Learn and Understand Data Remanence - 2.srt 11KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/7. Protecting Assets Subtypes - 3.srt 11KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/10. Protecting Assets Learn About ASD.srt 11KB
~Get Your Files Here !/3. Learning Layers of Responsibility/5. Section Outro.srt 9KB
~Get Your Files Here !/4. Learn About Information Classification/2. Learning Information Classification Classifications Levels.srt 9KB
~Get Your Files Here !/3. Learning Layers of Responsibility/1. Introduction.srt 9KB
~Get Your Files Here !/4. Learn About Information Classification/9. Learning Information Classification Define Appropriate Protections.srt 9KB
~Get Your Files Here !/4. Learn About Information Classification/10. Learning Information Classification Apply Classification Labels.srt 9KB
~Get Your Files Here !/2. Understanding Information Life Cycle/4. Information Life Cycle What Allows Access.srt 9KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/18. Protecting Assets Tools to Securely Delete Content.srt 9KB
~Get Your Files Here !/3. Learning Layers of Responsibility/2. Learning Layers of Responsibility Security Administrator.srt 9KB
~Get Your Files Here !/4. Learn About Information Classification/1. Introduction.srt 9KB
~Get Your Files Here !/5. Learn and Understand Retention Policies/2. Learning Retention Policies Data Must Be Securely Maintained - 2.srt 8KB
~Get Your Files Here !/4. Learn About Information Classification/8. Learning Information Classification Define Classifications.srt 7KB
~Get Your Files Here !/4. Learn About Information Classification/11. Implement Protective and Monitoring Technologies - 1.srt 7KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/5. Protecting Assets Subtypes - 1.srt 7KB
~Get Your Files Here !/3. Learning Layers of Responsibility/4. Learning Layers of Responsibility Data Custodian & User.srt 7KB
~Get Your Files Here !/4. Learn About Information Classification/3. Understanding Information Classification - 1.srt 6KB
~Get Your Files Here !/4. Learn About Information Classification/12. Implement Protective and Monitoring Technologies - 2.srt 6KB
~Get Your Files Here !/4. Learn About Information Classification/13. Learning Information Classification Data Classification - Provide Training.srt 6KB
~Get Your Files Here !/4. Learn About Information Classification/4. Understanding Information Classification - 2.srt 6KB
~Get Your Files Here !/2. Understanding Information Life Cycle/5. Information Life Cycle Confidentiality, Integrity, and Availability - 1.srt 6KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/6. Protecting Assets Subtypes - 2.srt 6KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/3. Protecting Assets Technical.srt 6KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/16. Protecting Assets Learn and Understand Data Remanence - 1.srt 6KB
~Get Your Files Here !/5. Learn and Understand Retention Policies/1. Learning Retention Policies Data Must Be Securely Maintained - 1.srt 6KB
~Get Your Files Here !/3. Learning Layers of Responsibility/3. Learning Layers of Responsibility Data Owner & System Custodian.srt 5KB
~Get Your Files Here !/7. Course Summary/1. Summary.srt 5KB
~Get Your Files Here !/4. Learn About Information Classification/6. Learning Information Classification Data At Rest.srt 5KB
~Get Your Files Here !/4. Learn About Information Classification/7. Learning Information Classification Assign an Accurate Value to Each Asset.srt 5KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/9. Protecting Assets Using Accepted Standards - 2.srt 5KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/15. Protecting Assets Handling Data & Removable Media.srt 5KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/11. Protecting Assets Standards and Baselines.srt 5KB
~Get Your Files Here !/4. Learn About Information Classification/5. Learning Information Classification Develop An Inventory of Data Assets.srt 5KB
~Get Your Files Here !/4. Learn About Information Classification/14. Section Outro.srt 5KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/1. Introduction.srt 4KB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/2. Protecting Assets Administrative.srt 4KB
~Get Your Files Here !/2. Understanding Information Life Cycle/6. Information Life Cycle Confidentiality, Integrity, and Availability - 2.srt 3KB
~Get Your Files Here !/5. Learn and Understand Retention Policies/4. Ensure Retention Policies Meet Compliance Requirements - 2.srt 3KB
~Get Your Files Here !/5. Learn and Understand Retention Policies/3. Ensure Retention Policies Meet Compliance Requirements - 1.srt 3KB
~Get Your Files Here !/1. Welcome/1. Introduction.srt 677B