[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program

磁链地址复制复制磁链成功
磁链详情
文件数目:38个文件
文件大小:1.76 GB
收录时间:2023-03-26
访问次数:3
相关内容:FreeCourseWebUdemyDevelopInformationSecurityProgram
文件meta
  • ~Get Your Files Here !/2. Information Security Policies/3. Documenting The PROTECT Security Control Policy Statements.mp4
    321.97 MB
  • ~Get Your Files Here !/1. Introduction/1. Introduction.mp4
    311.98 MB
  • ~Get Your Files Here !/2. Information Security Policies/2. Documenting The IDENTIFY Security Controls Policy Statements.mp4
    258.11 MB
  • ~Get Your Files Here !/3. Information Security Procedures/2. Defining Your IT Security Configuration Standards & Guidelines.mp4
    182.49 MB
  • ~Get Your Files Here !/3. Information Security Procedures/1. Documenting Your Information Security Standard Operating Procedures.mp4
    152.45 MB
  • ~Get Your Files Here !/4. Conclusion/1. Going Beyond Information Security Policies & Procedures.mp4
    151 MB
  • ~Get Your Files Here !/4. Conclusion/2. It's Time For Action - Wrapping Things Up.mp4
    88.31 MB
  • ~Get Your Files Here !/1. Introduction/4. Identifying Your Operational Security Policies.mp4
    88.17 MB
  • ~Get Your Files Here !/2. Information Security Policies/4. Documenting The DETECT Security Controls Policy Statements.mp4
    74.85 MB
  • ~Get Your Files Here !/1. Introduction/3. Defining Responsibility Over Software and Applications.mp4
    51.2 MB
  • ~Get Your Files Here !/2. Information Security Policies/5. Documenting The RESPOND Security Controls Policy Statements.mp4
    50.27 MB
  • ~Get Your Files Here !/1. Introduction/2. Identifying Roles by Security Controls.mp4
    44.63 MB
  • ~Get Your Files Here !/2. Information Security Policies/6. Documenting The RECOVER Security Controls Policy Statements.mp4
    15.55 MB
  • ~Get Your Files Here !/2. Information Security Policies/1. Introduction To Your Information Security Polices.mp4
    8.66 MB
  • ~Get Your Files Here !/3. Information Security Procedures/1.1 CSR Information Security Standard Operating Procedures.doc
    1.67 MB
  • ~Get Your Files Here !/1. Introduction/3.1 Application_XRef Template.xlsx
    634.66 KB
  • ~Get Your Files Here !/2. Information Security Policies/1.1 CSR Information Security Policy - NIST CSF.doc
    246.5 KB
  • ~Get Your Files Here !/1. Introduction/4.1 CSR Acceptable Use Policy.docx
    194.57 KB
  • ~Get Your Files Here !/1. Introduction/4.3 CSR Teleworking Policy.docx
    194.08 KB
  • ~Get Your Files Here !/1. Introduction/4.2 CSR Sanctions Policy.docx
    192.18 KB
  • ~Get Your Files Here !/2. Information Security Policies/3. Documenting The PROTECT Security Control Policy Statements.srt
    65.38 KB
  • ~Get Your Files Here !/1. Introduction/1. Introduction.srt
    64.11 KB
  • ~Get Your Files Here !/3. Information Security Procedures/2.1 Secure Configuration Standard v1.0.xlsx
    60.63 KB
  • ~Get Your Files Here !/2. Information Security Policies/2. Documenting The IDENTIFY Security Controls Policy Statements.srt
    49.53 KB
  • ~Get Your Files Here !/1. Introduction/2.1 Roles by Control Matrix.xlsx
    29.16 KB
  • ~Get Your Files Here !/3. Information Security Procedures/2. Defining Your IT Security Configuration Standards & Guidelines.srt
    27.28 KB
  • ~Get Your Files Here !/3. Information Security Procedures/1. Documenting Your Information Security Standard Operating Procedures.srt
    20.62 KB
  • ~Get Your Files Here !/2. Information Security Policies/4. Documenting The DETECT Security Controls Policy Statements.srt
    15.13 KB
  • ~Get Your Files Here !/2. Information Security Policies/6. Documenting The RECOVER Security Controls Policy Statements.srt
    13.33 KB
  • ~Get Your Files Here !/1. Introduction/3. Defining Responsibility Over Software and Applications.srt
    12.45 KB
  • ~Get Your Files Here !/2. Information Security Policies/5. Documenting The RESPOND Security Controls Policy Statements.srt
    10.88 KB
  • ~Get Your Files Here !/4. Conclusion/1. Going Beyond Information Security Policies & Procedures.srt
    10.16 KB
  • ~Get Your Files Here !/1. Introduction/2. Identifying Roles by Security Controls.srt
    6.07 KB
  • ~Get Your Files Here !/4. Conclusion/2. It's Time For Action - Wrapping Things Up.srt
    5.79 KB
  • ~Get Your Files Here !/2. Information Security Policies/1. Introduction To Your Information Security Polices.srt
    5.08 KB
  • ~Get Your Files Here !/1. Introduction/4. Identifying Your Operational Security Policies.srt
    5.05 KB
  • ~Get Your Files Here !/Bonus Resources.txt
    357 Bytes
  • Get Bonus Downloads Here.url
    183 Bytes
©2018 ciligou.app 磁力狗 v2.0
使用必读|联系我们|资源导航|种子提交