Filename Size ~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4 35.5 MB ~Get Your Files Here !/1 - Introduction/1 - S0-lecture0-Introduction.pdf 900.9 KB ~Get Your Files Here !/1 - Introduction/2 - Course structure and supporting material.mp4 38.9 MB ~Get Your Files Here !/1 - Introduction/2 - S0-lecture1-Course-Content.pdf 10.1 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/10 - ANNEX I1.mp4 16.4 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/10 - S1-lecture7-Annex-I.1.pdf 786 KB ~Get Your Files Here !/2 - The European Cyber Resilience Act/11 - ANNEX I2.mp4 15.3 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/11 - S1-lecture8-Annex-I.2.pdf 1.1 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/12 - ANNEX II.mp4 14.1 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/12 - S1-lecture9-ANNEX-II.pdf 1.1 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/13 - Conformity of the Product with Digital Elements Chapter 3.mp4 20.6 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/13 - S1-lecture10-Conformity-of-the-Product-with-Digital-Elements-Chapter-3.pdf 243.4 KB ~Get Your Files Here !/2 - The European Cyber Resilience Act/14 - ANNEX V.mp4 3.7 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/14 - S1-lecture11-ANNEX-V.pdf 189.4 KB ~Get Your Files Here !/2 - The European Cyber Resilience Act/15 - ANNEX VI.mp4 1.5 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/15 - S1-lecture12-ANNEX-VI.pdf 23.8 KB ~Get Your Files Here !/2 - The European Cyber Resilience Act/16 - ANNEX VII.mp4 12.6 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/16 - S1-lecture12-ANNEX-VII.pdf 386.9 KB ~Get Your Files Here !/2 - The European Cyber Resilience Act/17 - ANNEX VIII.mp4 18.4 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/17 - S1-lecture12-ANNEX-VIII.pdf 108.8 KB ~Get Your Files Here !/2 - The European Cyber Resilience Act/18 - Notification of Conformity Assessment Bodies Chapter 4.mp4 5.1 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/18 - S1-lecture13-Notification-of-Conformity-Assessment-Bodies-Chapter-4.pdf 62.3 KB ~Get Your Files Here !/2 - The European Cyber Resilience Act/19 - Notification of Conformity Assessment Bodies Chapter 4 Actions.mp4 1.8 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/20 - Market Surveillance and Enforcement Chapter 5.mp4 18.2 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/20 - S1-lecture15-Market-Surveillance-and-Enforcement-Chapter-5.pdf 385.5 KB ~Get Your Files Here !/2 - The European Cyber Resilience Act/21 - Market Surveillance and Enforcement Chapter 5 Actions.mp4 13.6 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/22 - Delegated Powers and Committee Procedures Chapter 6.mp4 9.1 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/22 - S1-lecture17-Delegated-Powers-and-Committee-Procedures-Chapter-6.pdf 217 KB ~Get Your Files Here !/2 - The European Cyber Resilience Act/23 - Delegated Powers and Committee Procedures Chapter 6 Actions.mp4 8.6 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/24 - Confidentiality and Penalties Chapter 7.mp4 11.8 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/24 - S1-lecture19-Confidentiality-and-Penalties-Chapter-7.pdf 537.9 KB ~Get Your Files Here !/2 - The European Cyber Resilience Act/25 - Confidentiality and Penalties Chapter 7 Actions.mp4 7.7 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/26 - S1-lecture21-Transitional-and-Final-Provisions-Chapter-8.pdf 364.4 KB ~Get Your Files Here !/2 - The European Cyber Resilience Act/26 - Transitional and Final Provisions Chapter 8.mp4 10.4 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/27 - Transitional and Final Provisions Chapter 8 Actions.mp4 3.4 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/3 - Introduction to the EU Cyber Resilience Act.mp4 22 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/3 - S1-lecture0-Introduction-to-the-EU-Cyber-Resilience-Act.pdf 167 KB ~Get Your Files Here !/2 - The European Cyber Resilience Act/4 - S1-lecture1-Understanding-Cybersecurity-in-the-EU.pdf 785 KB ~Get Your Files Here !/2 - The European Cyber Resilience Act/4 - Understanding Cybersecurity in the EU.mp4 19.8 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/5 - General Provisions Chapter 1.mp4 27.8 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/5 - S1-lecture2-General-Provisions-Chapter-1.pdf 1 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/6 - General Provisions Chapter 1 Actions.mp4 7 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/7 - ANNEX III and ANNEX IV.mp4 11.6 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/7 - S1-lecture4-ANNEX-III-and-ANNEX-IV.pdf 233.9 KB ~Get Your Files Here !/2 - The European Cyber Resilience Act/8 - Obligations of Economic Operators Chapter 2.mp4 48.1 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/8 - S1-lecture5-Obligations-of-Economic-Operators-Chapter-2.pdf 1.3 MB ~Get Your Files Here !/2 - The European Cyber Resilience Act/9 - Obligations of Economic Operators Chapter 2 Actions.mp4 11.3 MB ~Get Your Files Here !/3 - HandsOn A practical example/28 - S2-lecture0-Session-Intro.pdf 650.9 KB ~Get Your Files Here !/3 - HandsOn A practical example/28 - Session Intro.mp4 9.6 MB ~Get Your Files Here !/3 - HandsOn A practical example/29 - CRA Practical overview.mp4 19.7 MB ~Get Your Files Here !/3 - HandsOn A practical example/29 - CRA-Practical-overview-Diagram.pdf 122.7 KB ~Get Your Files Here !/3 - HandsOn A practical example/29 - S2-lecture1-CRA-Practical-overview.pdf 174.4 KB ~Get Your Files Here !/3 - HandsOn A practical example/30 - IEC 62443 and CRA.mp4 15.6 MB ~Get Your Files Here !/3 - HandsOn A practical example/30 - S2-lecture2-IEC-62443-and-CRA.pdf 242.7 KB ~Get Your Files Here !/3 - HandsOn A practical example/31 - Process 1 Decide product applicability.mp4 8 MB ~Get Your Files Here !/3 - HandsOn A practical example/31 - Process-1-Decide-product-applicability.pdf 69.7 KB ~Get Your Files Here !/3 - HandsOn A practical example/32 - Process 2 Establish economic operator.mp4 27.3 MB ~Get Your Files Here !/3 - HandsOn A practical example/32 - S2-lecture4-Process-2-Stablish-economic-operator.pdf 929.1 KB ~Get Your Files Here !/3 - HandsOn A practical example/33 - Process 3 Define product criticality.mp4 9.5 MB ~Get Your Files Here !/3 - HandsOn A practical example/33 - Process-3-Define-Product-Criticality.pdf 32.6 KB ~Get Your Files Here !/3 - HandsOn A practical example/34 - Outcome 1 Product Registry entry.mp4 10.8 MB ~Get Your Files Here !/3 - HandsOn A practical example/34 - Outcome-1-Product-Registry-Entry.pdf 45.5 KB ~Get Your Files Here !/3 - HandsOn A practical example/35 - Process 4 Security By design.mp4 11.6 MB ~Get Your Files Here !/3 - HandsOn A practical example/35 - S2-lecture7-Process-4-Security-By-design.pdf 100.3 KB ~Get Your Files Here !/3 - HandsOn A practical example/36 - Documented-Security-Context-Threat-Model.pdf 69.8 KB ~Get Your Files Here !/3 - HandsOn A practical example/36 - Outcome 2 Risk assessment Threat Model.mp4 21 MB ~Get Your Files Here !/3 - HandsOn A practical example/37 - Outcome 2 Risk assessment Security Analysis for Product Interfaces.mp4 12.2 MB ~Get Your Files Here !/3 - HandsOn A practical example/37 - Security-Analysis-for-Product-Interfaces.pdf 37 KB ~Get Your Files Here !/3 - HandsOn A practical example/38 - Outcome 3 Security verification testing and SBOM.mp4 39.7 MB ~Get Your Files Here !/3 - HandsOn A practical example/38 - Security-Verification-and-Validation-Testing.pdf 65.4 KB ~Get Your Files Here !/3 - HandsOn A practical example/39 - Outcome 4 User Documentation.mp4 25.6 MB ~Get Your Files Here !/3 - HandsOn A practical example/39 - Security-User-Documentation.pdf 57 KB ~Get Your Files Here !/3 - HandsOn A practical example/40 - Outcome 5 Risk Register.mp4 7.8 MB ~Get Your Files Here !/3 - HandsOn A practical example/40 - Risk-Register.pdf 30 KB ~Get Your Files Here !/3 - HandsOn A practical example/41 - Process 5 Vulnerability Handling.mp4 18.3 MB ~Get Your Files Here !/3 - HandsOn A practical example/41 - Vulnerability-Handling.pdf 116.8 KB ~Get Your Files Here !/3 - HandsOn A practical example/42 - Process 6 Conformity Assessment.mp4 8.1 MB ~Get Your Files Here !/3 - HandsOn A practical example/42 - S2-lecture14-Process-6-Conformity-Assessment.pdf 348.9 KB ~Get Your Files Here !/3 - HandsOn A practical example/43 - Outcome 6 Conformity Assessment.mp4 4.3 MB ~Get Your Files Here !/3 - HandsOn A practical example/43 - S2-lecture15-Outcome-6-Conformity-Assessment.pdf 30.4 KB ~Get Your Files Here !/3 - HandsOn A practical example/44 - Incident-Handling-Process.pdf 60.6 KB ~Get Your Files Here !/3 - HandsOn A practical example/44 - Process 7 Incident Handling.mp4 8.5 MB ~Get Your Files Here !/3 - HandsOn A practical example/45 - Process 8 Security Updates.mp4 7.4 MB ~Get Your Files Here !/3 - HandsOn A practical example/45 - Security-Updates.pdf 23.4 KB ~Get Your Files Here !/3 - HandsOn A practical example/46 - S2-lecture18-Session-Conclusion.pdf 173 KB ~Get Your Files Here !/3 - HandsOn A practical example/46 - Session Conclusion.mp4 4.5 MB ~Get Your Files Here !/4 - Recap/47 - Recap.mp4 5.3 MB ~Get Your Files Here !/Bonus Resources.txt 386 B