17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[ CourseHulu.com ] LiveLessons - System And Privacy Data Protection
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Cybersecurity is not only about preventing data breaches and hunting for attackers, it also involves many aspects of system and data privacy. With more than 4 hours of video training, System and Privacy Data Protection LiveLessons provides learners with an understanding of how to protect and store existing data, as well as understand that data confidentiality and business impacts are critical to data protection. In this course, the learner will examine multiple aspects of system privacy and data protection ranging from basic concepts to tools that are commonly used by data practitioners.
System and Privacy Data Protection LiveLessons is taught by expert trainer, author, and cybersecurity expert Aamir Lakhani using hands-on s, in-depth discussions, and lightboard explanations. This course will cover the best practices cybersecurity fundamentals in a way that is easy to access and implement in real world situations.
Topics include
Data Privacy and Protection
Risk Mitigation
Importance of Policies, Procedures, and Controls
Analyzing Logs and Impact Analysis
SIEMs and Query Writing
E-Mail Analysis
Automation
About the Instructor
If You Need More Stuff, kindly Visit and Support Us -->> https://FreeCourseWeb.com
Get More Tutorials and Support Us -->> https://DevCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/01-System and Privacy Data Protection - Introduction.en.srt
1.4 KB
~Get Your Files Here !/01-System and Privacy Data Protection - Introduction.mp4
40.1 MB
~Get Your Files Here !/02-Learning objectives.en.srt
492 B
~Get Your Files Here !/02-Learning objectives.mp4
16.5 MB
~Get Your Files Here !/03-1.1 Privacy vs. Security.en.srt
9 KB
~Get Your Files Here !/03-1.1 Privacy vs. Security.mp4
155.3 MB
~Get Your Files Here !/04-1.2 Non-technical Controls.en.srt
9.1 KB
~Get Your Files Here !/04-1.2 Non-technical Controls.mp4
120.7 MB
~Get Your Files Here !/05-1.3 Classification, Ownership, Retention, and Data Types.en.srt
18.6 KB
~Get Your Files Here !/05-1.3 Classification, Ownership, Retention, and Data Types.mp4
233.9 MB
~Get Your Files Here !/06-1.4 Confidentiality, Legal Requirements, and Data Sovereignty.en.srt
12.8 KB
~Get Your Files Here !/06-1.4 Confidentiality, Legal Requirements, and Data Sovereignty.mp4
199.4 MB
~Get Your Files Here !/07-1.5 Data Minimization, Purpose Limitation, and NDA.en.srt
2.3 KB
~Get Your Files Here !/07-1.5 Data Minimization, Purpose Limitation, and NDA.mp4
30.7 MB
~Get Your Files Here !/08-1.6 Technical Controls.en.srt
1.8 KB
~Get Your Files Here !/08-1.6 Technical Controls.mp4
21.1 MB
~Get Your Files Here !/09-1.7 Encryption.en.srt
8 KB
~Get Your Files Here !/09-1.7 Encryption.mp4
114.8 MB
~Get Your Files Here !/10-1.8 Data Loss Prevention (DLP).en.srt
1.7 KB
~Get Your Files Here !/10-1.8 Data Loss Prevention (DLP).mp4
10.3 MB
~Get Your Files Here !/11-1.9 Data Masking and Deidentification.en.srt
5 KB
~Get Your Files Here !/11-1.9 Data Masking and Deidentification.mp4
69.4 MB
~Get Your Files Here !/12-1.10 Tokenization.en.srt
2 KB
~Get Your Files Here !/12-1.10 Tokenization.mp4
24.6 MB
~Get Your Files Here !/13-1.11 Digital Rights Management (DRM) and Watermarking.en.srt
5.8 KB
~Get Your Files Here !/13-1.11 Digital Rights Management (DRM) and Watermarking.mp4
61.7 MB
~Get Your Files Here !/14-1.12 Geographic Access Requirements.en.srt
4 KB
~Get Your Files Here !/14-1.12 Geographic Access Requirements.mp4
52 MB
~Get Your Files Here !/15-1.13 Access Controls.en.srt
1.8 KB
~Get Your Files Here !/15-1.13 Access Controls.mp4
21.1 MB
~Get Your Files Here !/16-Learning objectives.en.srt
499 B
~Get Your Files Here !/16-Learning objectives.mp4
18 MB
~Get Your Files Here !/17-2.1 Business Impact and Risk Calculation.en.srt
1.7 KB
~Get Your Files Here !/17-2.1 Business Impact and Risk Calculation.mp4
23.9 MB
~Get Your Files Here !/18-2.2 Communication Risk Factors and Risk Prioritization.en.srt
9.6 KB
~Get Your Files Here !/18-2.2 Communication Risk Factors and Risk Prioritization.mp4
120.5 MB
~Get Your Files Here !/19-2.3 System Assessments.en.srt
6.6 KB
~Get Your Files Here !/19-2.3 System Assessments.mp4
68.7 MB
~Get Your Files Here !/20-2.4 Compensating Controls and Training - Part 1.en.srt
19.9 KB
~Get Your Files Here !/20-2.4 Compensating Controls and Training - Part 1.mp4
207.9 MB
~Get Your Files Here !/21-2.5 Compensating Controls and Training - Part 2.en.srt
13.9 KB
~Get Your Files Here !/21-2.5 Compensating Controls and Training - Part 2.mp4
151.5 MB
~Get Your Files Here !/22-2.6 Supply Chain Assessment.en.srt
7.3 KB
~Get Your Files Here !/22-2.6 Supply Chain Assessment.mp4
60.9 MB
~Get Your Files Here !/23-Learning objectives.en.srt
517 B
~Get Your Files Here !/23-Learning objectives.mp4
17.9 MB
~Get Your Files Here !/24-3.1 Frameworks.en.srt
3.8 KB
~Get Your Files Here !/24-3.1 Frameworks.mp4
46.1 MB
~Get Your Files Here !/25-3.2 AUP, Password Policies, Data Ownership, and Other Procedures.en.srt
17 KB
~Get Your Files Here !/25-3.2 AUP, Password Policies, Data Ownership, and Other Procedures.mp4
176.5 MB
~Get Your Files Here !/26-3.3 Control Types.en.srt
16.9 KB
~Get Your Files Here !/26-3.3 Control Types.mp4
166.7 MB
~Get Your Files Here !/27-3.4 Audits and Assessments.en.srt
10.6 KB
~Get Your Files Here !/27-3.4 Audits and Assessments.mp4
70.4 MB
~Get Your Files Here !/28-Learning objectives.en.srt
422 B
~Get Your Files Here !/28-Learning objectives.mp4
15 MB
~Get Your Files Here !/29-4.1 Event Logs.en.srt
6.7 KB
~Get Your Files Here !/29-4.1 Event Logs.mp4
32.2 MB
~Get Your Files Here !/30-4.2 Syslogs.en.srt
15.2 KB
~Get Your Files Here !/30-4.2 Syslogs.mp4
131.6 MB
~Get Your Files Here !/31-4.3 Firewall Logs.en.srt
14.6 KB
~Get Your Files Here !/31-4.3 Firewall Logs.mp4
193.1 MB
~Get Your Files Here !/32-4.4 Web Application Firewall (WAF).en.srt
11.2 KB
~Get Your Files Here !/32-4.4 Web Application Firewall (WAF).mp4
172.6 MB
~Get Your Files Here !/33-4.5 Proxy.en.srt
22.6 KB
~Get Your Files Here !/33-4.5 Proxy.mp4
315.3 MB
~Get Your Files Here !/34-4.6 Intrusion Detection and Prevention (IDS_IPS).en.srt
15.2 KB
~Get Your Files Here !/34-4.6 Intrusion Detection and Prevention (IDS_IPS).mp4
203.9 MB
~Get Your Files Here !/35-4.7 Impact Analysis.en.srt
23.6 KB
~Get Your Files Here !/35-4.7 Impact Analysis.mp4
461.1 MB
~Get Your Files Here !/36-4.8 Organizations Impact vs. Localized Impact.en.srt
2.9 KB
~Get Your Files Here !/36-4.8 Organizations Impact vs. Localized Impact.mp4
24.3 MB
~Get Your Files Here !/37-4.9 Immediate vs. Total.en.srt
2.7 KB
~Get Your Files Here !/37-4.9 Immediate vs. Total.mp4
16.8 MB
~Get Your Files Here !/38-Learning objectives.en.srt
451 B
~Get Your Files Here !/38-Learning objectives.mp4
15.7 MB
~Get Your Files Here !/39-5.1 Security Information and Event Management (SIEM) - Part 1.en.srt
11.9 KB
~Get Your Files Here !/39-5.1 Security Information and Event Management (SIEM) - Part 1.mp4
133.3 MB
~Get Your Files Here !/40-5.2 Security Information and Event Management (SIEM) - Part 2.en.srt
20.6 KB
~Get Your Files Here !/40-5.2 Security Information and Event Management (SIEM) - Part 2.mp4
266.1 MB
~Get Your Files Here !/41-5.3 Rule Writing.en.srt
6.3 KB
~Get Your Files Here !/41-5.3 Rule Writing.mp4
99.5 MB
~Get Your Files Here !/42-5.4 Known-bad Internet Protocol (IP).en.srt
5.7 KB
~Get Your Files Here !/42-5.4 Known-bad Internet Protocol (IP).mp4
73.5 MB
~Get Your Files Here !/43-Learning objectives.en.srt
607 B
~Get Your Files Here !/43-Learning objectives.mp4
18.5 MB
~Get Your Files Here !/44-6.1 Malicious Payload.en.srt
22.9 KB
~Get Your Files Here !/44-6.1 Malicious Payload.mp4
222.6 MB
~Get Your Files Here !/45-6.2 Domain Keys Identified Mail (DKIM).en.srt
13.2 KB
~Get Your Files Here !/45-6.2 Domain Keys Identified Mail (DKIM).mp4
158.7 MB
~Get Your Files Here !/46-6.3 Domain-based Message.en.srt
14.8 KB
~Get Your Files Here !/46-6.3 Domain-based Message.mp4
94.2 MB
~Get Your Files Here !/47-6.4 Embedded Links.en.srt
5.9 KB
~Get Your Files Here !/47-6.4 Embedded Links.mp4
54.1 MB
~Get Your Files Here !/48-6.5 Impersonation.en.srt