17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Linkedin - Certified Information Security Manager (CISM) Cert Prep - 2 Information Security Risk Management
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Prepare to pass the Certified Information Security Manager (CISM) exam. In this course, Mike Chapple dives into the topic of information security risk management practices, helping you bolster your ability to identify, assess, and mitigate risks as you prepare for the Information Risk Management exam domain. Mike goes over the key steps of the risk assessment process, the possible risk management options, and frameworks and tools that can help you keep your organization safe. He also includes comprehensive coverage of the many cybersecurity threats facing modern organizations, including viruses, adware, and advanced persistent threats (APTs). Learn about business continuity, disaster recovery, legal and regulatory compliance, and more.
If You Need More Stuff, kindly Visit and Support Us -->> https://FreeCourseWeb.com
Get More Tutorials and Support Us -->> https://DevCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/01 - Introduction/01 - Information security risk management.mp4
13.2 MB
~Get Your Files Here !/01 - Introduction/01 - Information security risk management.srt
1.2 KB
~Get Your Files Here !/01 - Introduction/02 - What you need to know.mp4
2 MB
~Get Your Files Here !/01 - Introduction/02 - What you need to know.srt
1.2 KB
~Get Your Files Here !/01 - Introduction/03 - Study resources.mp4
13.4 MB
~Get Your Files Here !/01 - Introduction/03 - Study resources.srt
2.5 KB
~Get Your Files Here !/02 - 1. Risk Assessment/01 - Risk assessment.mp4
13.7 MB
~Get Your Files Here !/02 - 1. Risk Assessment/01 - Risk assessment.srt
8.6 KB
~Get Your Files Here !/02 - 1. Risk Assessment/02 - Quantitative risk assessment.mp4
20.1 MB
~Get Your Files Here !/02 - 1. Risk Assessment/02 - Quantitative risk assessment.srt
10.7 KB
~Get Your Files Here !/02 - 1. Risk Assessment/03 - Information classification.mp4
12.5 MB
~Get Your Files Here !/02 - 1. Risk Assessment/03 - Information classification.srt
6.7 KB
~Get Your Files Here !/03 - 2. Risk Management/01 - Risk treatment options.mp4
17.2 MB
~Get Your Files Here !/03 - 2. Risk Management/01 - Risk treatment options.srt
7.5 KB
~Get Your Files Here !/03 - 2. Risk Management/02 - Security control selection and implementation.mp4
20.1 MB
~Get Your Files Here !/03 - 2. Risk Management/02 - Security control selection and implementation.srt
10.7 KB
~Get Your Files Here !/03 - 2. Risk Management/03 - Ongoing risk management.mp4
8.8 MB
~Get Your Files Here !/03 - 2. Risk Management/03 - Ongoing risk management.srt
4.6 KB
~Get Your Files Here !/03 - 2. Risk Management/04 - Risk management frameworks.mp4
10.9 MB
~Get Your Files Here !/03 - 2. Risk Management/04 - Risk management frameworks.srt
5.9 KB
~Get Your Files Here !/03 - 2. Risk Management/05 - Risk visibility and reporting.mp4
21.2 MB
~Get Your Files Here !/03 - 2. Risk Management/05 - Risk visibility and reporting.srt
8.1 KB
~Get Your Files Here !/04 - 3. Malware/01 - Comparing viruses, worms, and Trojans.mp4
23.3 MB
~Get Your Files Here !/04 - 3. Malware/01 - Comparing viruses, worms, and Trojans.srt
9.7 KB
~Get Your Files Here !/04 - 3. Malware/02 - Malware payloads.mp4
20.5 MB
~Get Your Files Here !/04 - 3. Malware/02 - Malware payloads.srt
10.4 KB
~Get Your Files Here !/04 - 3. Malware/03 - Understanding backdoors and logic bombs.mp4
15.6 MB
~Get Your Files Here !/04 - 3. Malware/03 - Understanding backdoors and logic bombs.srt
8.1 KB
~Get Your Files Here !/04 - 3. Malware/04 - Botnets.mp4
9.3 MB
~Get Your Files Here !/04 - 3. Malware/04 - Botnets.srt
6.1 KB
~Get Your Files Here !/04 - 3. Malware/05 - Advanced persistent threats.mp4
10.6 MB
~Get Your Files Here !/04 - 3. Malware/05 - Advanced persistent threats.srt
6.1 KB
~Get Your Files Here !/05 - 4. Understanding Attackers/01 - Cybersecurity adversaries.mp4
16.9 MB
~Get Your Files Here !/05 - 4. Understanding Attackers/01 - Cybersecurity adversaries.srt
8.5 KB
~Get Your Files Here !/05 - 4. Understanding Attackers/02 - Preventing insider threats.mp4
9.8 MB
~Get Your Files Here !/05 - 4. Understanding Attackers/02 - Preventing insider threats.srt
4.7 KB
~Get Your Files Here !/05 - 4. Understanding Attackers/03 - Threat intelligence.mp4
11.1 MB
~Get Your Files Here !/05 - 4. Understanding Attackers/03 - Threat intelligence.srt
6.4 KB
~Get Your Files Here !/06 - 5. Attack Types/01 - Denial of service attacks.mp4
15.6 MB
~Get Your Files Here !/06 - 5. Attack Types/01 - Denial of service attacks.srt
7.7 KB
~Get Your Files Here !/06 - 5. Attack Types/02 - Eavesdropping attacks.mp4
13.6 MB
~Get Your Files Here !/06 - 5. Attack Types/02 - Eavesdropping attacks.srt
7.9 KB
~Get Your Files Here !/06 - 5. Attack Types/03 - DNS attacks.mp4
12.6 MB
~Get Your Files Here !/06 - 5. Attack Types/03 - DNS attacks.srt
6.3 KB
~Get Your Files Here !/06 - 5. Attack Types/04 - Layer 2 attacks.mp4
7.1 MB
~Get Your Files Here !/06 - 5. Attack Types/04 - Layer 2 attacks.srt
3.8 KB
~Get Your Files Here !/06 - 5. Attack Types/05 - Network address spoofing.mp4
12 MB
~Get Your Files Here !/06 - 5. Attack Types/05 - Network address spoofing.srt
6.9 KB
~Get Your Files Here !/06 - 5. Attack Types/06 - Password attacks.mp4
32.8 MB
~Get Your Files Here !/06 - 5. Attack Types/06 - Password attacks.srt
14.5 KB
~Get Your Files Here !/06 - 5. Attack Types/07 - Password spraying and credential stuffing.mp4
6.1 MB
~Get Your Files Here !/06 - 5. Attack Types/07 - Password spraying and credential stuffing.srt
3.2 KB
~Get Your Files Here !/06 - 5. Attack Types/08 - Watering hole attacks.mp4
12 MB
~Get Your Files Here !/06 - 5. Attack Types/08 - Watering hole attacks.srt
5.7 KB
~Get Your Files Here !/07 - 6. Social Engineering Attacks/01 - Social engineering.mp4
16.9 MB
~Get Your Files Here !/07 - 6. Social Engineering Attacks/01 - Social engineering.srt
10.2 KB
~Get Your Files Here !/07 - 6. Social Engineering Attacks/02 - Impersonation attacks.mp4
15.1 MB
~Get Your Files Here !/07 - 6. Social Engineering Attacks/02 - Impersonation attacks.srt
10 KB
~Get Your Files Here !/07 - 6. Social Engineering Attacks/03 - Physical social engineering.mp4
11.1 MB
~Get Your Files Here !/07 - 6. Social Engineering Attacks/03 - Physical social engineering.srt
4.6 KB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/01 - What is vulnerability management.mp4
16.6 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/01 - What is vulnerability management.srt
9.8 KB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/02 - Identify scan targets.mp4
13.7 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/02 - Identify scan targets.srt
8.6 KB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/03 - Scan configuration.mp4
15.5 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/03 - Scan configuration.srt
10.9 KB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/04 - Scan perspective.mp4
12.8 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/04 - Scan perspective.srt
8.5 KB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/05 - Security Content Automation Protocol (SCAP).mp4
7 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/05 - Security Content Automation Protocol (SCAP).srt
4.3 KB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/06 - Common Vulnerability Scoring System (CVSS).mp4
10.3 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/06 - Common Vulnerability Scoring System (CVSS).srt
6.2 KB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/07 - Analyzing scan reports.mp4
16.2 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/07 - Analyzing scan reports.srt
9 KB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/08 - Correlating scan results.mp4
8 MB
~Get Your Files Here !/08 - 7. Vulnerability Scanning and Penetration Testing/08 - Correlating scan results.srt
4.4 KB
~Get Your Files Here !/09 - 8. Awareness and Training/01 - Security awareness training.mp4
19.8 MB
~Get Your Files Here !/09 - 8. Awareness and Training/01 - Security awareness training.srt
9.6 KB
~Get Your Files Here !/09 - 8. Awareness and Training/02 - Compliance training.mp4
13.3 MB
~Get Your Files Here !/09 - 8. Awareness and Training/02 - Compliance training.srt
5.5 KB
~Get Your Files Here !/09 - 8. Awareness and Training/03 - User habits.mp4
9.5 MB
~Get Your Files Here !/09 - 8. Awareness and Training/03 - User habits.srt
6.6 KB
~Get Your Files Here !/09 - 8. Awareness and Training/04 - Measuring compliance and security posture.mp4
7.7 MB
~Get Your Files Here !/09 - 8. Awareness and Training/04 - Measuring compliance and security posture.srt
3.5 KB
~Get Your Files Here !/09 - 8. Awareness and Training/05 - Awareness program reviews.mp4
3.2 MB
~Get Your Files Here !/09 - 8. Awareness and Training/05 - Awareness program reviews.srt
2.2 KB
~Get Your Files Here !/10 - 9. Business Continuity/01 - Business continuity planning.mp4
8 MB
~Get Your Files Here !/10 - 9. Business Continuity/01 - Business continuity planning.srt
6.2 KB
~Get Your Files Here !/10 - 9. Business Continuity/02 - Business continuity controls.mp4
11.1 MB
~Get Your Files Here !/10 - 9. Business Continuity/02 - Business continuity controls.srt
7 KB
~Get Your Files Here !/10 - 9. Business Continuity/03 - High availability and fault tolerance.mp4
14.6 MB
~Get Your Files Here !/10 - 9. Business Continuity/03 - High availability and fault tolerance.srt
10.7 KB
~Get Your Files Here !/11 - 10. Disaster Recovery/01 - Disaster recovery planning.mp4
14.1 MB
~Get Your Files Here !/11 - 10. Disaster Recovery/01 - Disaster recovery planning.srt
8.3 KB
~Get Your Files Here !/11 - 10. Disaster Recovery/02 - Backups.mp4
11.1 MB
~Get Your Files Here !/11 - 10. Disaster Recovery/02 - Backups.srt
7.8 KB
~Get Your Files Here !/11 - 10. Disaster Recovery/03 - Restoring backups.mp4
7.3 MB
~Get Your Files Here !/11 - 10. Disaster Recovery/03 - Restoring backups.srt