:Search:

Udemy The Cyber Security Risk Management Course for IT Managers

Torrent:
Info Hash: C952D077C6EC8085D9E66039D4F216C31981E9D8
Thumbnail:
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 25
Type: Tutorials
Images:
Udemy The Cyber Security Risk Management Course for IT Managers
Language: English
Category: Other
Size: 1.4 GB
Added: Oct. 23, 2023, 5:30 p.m.
Peers: Seeders: 0, Leechers: 10 (Last updated: 10 months, 4 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 2 0
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 0 2 9
udp://tracker.torrent.eu.org:451/announce 0 2 16
udp://explodie.org:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.birkenwald.de:6969/announce 0 2 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 0 0 0
udp://tracker.therarbg.to:6969/announce 0 2 0
Files:
  1. Get Bonus Downloads Here.url 182 bytes
  2. 1. Introduction to the Course.mp4 42.8 MB
  3. 1. Introduction to the Course.srt 3.4 KB
  4. 2. Download the PDF Book & Slides.html 77 bytes
  5. 2.1 Cyber Risk Management Summary Guide.pdf 5.4 MB
  6. 3. Risk Management as a Profession.mp4 57.0 MB
  7. 3. Risk Management as a Profession.srt 5.0 KB
  8. 1. What is Risk.mp4 59.7 MB
  9. 1. What is Risk.srt 5.1 KB
  10. 2. Types of Risks.mp4 121.3 MB
  11. 2. Types of Risks.srt 10.3 KB
  12. 3. Risk Management Definition & Types.mp4 72.8 MB
  13. 3. Risk Management Definition & Types.srt 6.0 KB
  14. 4. Risk Management Scope and Roles.mp4 82.0 MB
  15. 4. Risk Management Scope and Roles.srt 5.4 KB
  16. 5. Threats & Adversaries.mp4 82.7 MB
  17. 5. Threats & Adversaries.srt 6.5 KB
  18. 1. Section Preview.mp4 16.6 MB
  19. 1. Section Preview.srt 1.1 KB
  20. 2. Risk Identification.mp4 79.9 MB
  21. 2. Risk Identification.srt 7.4 KB
  22. 3. Risk Asssessments.mp4 53.1 MB
  23. 3. Risk Asssessments.srt 8.5 KB
  24. 4. Risk Management Processes.mp4 62.1 MB
  25. 4. Risk Management Processes.srt 5.0 KB
  26. 5. Risk Mitigation.mp4 33.8 MB
  27. 5. Risk Mitigation.srt 2.6 KB
  28. 6. Risk Avoidance.mp4 60.3 MB
  29. 6. Risk Avoidance.srt 5.3 KB
  30. 7. Risk Transference.mp4 20.5 MB
  31. 7. Risk Transference.srt 2.0 KB
  32. 8. Risk Acceptance & Risk Rejection.mp4 56.4 MB
  33. 8. Risk Acceptance & Risk Rejection.srt 4.4 KB
  34. 9. Risk Monitoring.mp4 31.6 MB
  35. 9. Risk Monitoring.srt 2.6 KB
  36. 1. Section Preview.mp4 18.4 MB
  37. 1. Section Preview.srt 1.2 KB
  38. 2. Information Classification.mp4 27.0 MB
  39. 2. Information Classification.srt 2.4 KB
  40. 3. Information Security Controls.mp4 38.2 MB
  41. 3. Information Security Controls.srt 3.9 KB
  42. 4. Implementation of Security Controls.mp4 135.6 MB
  43. 4. Implementation of Security Controls.srt 12.1 KB
  44. 1. Third Party Cyber Risk Management.mp4 46.9 MB
  45. 1. Third Party Cyber Risk Management.srt 6.5 KB
  46. 2. Steps to Implement TPCRM.mp4 59.0 MB
  47. 2. Steps to Implement TPCRM.srt 8.1 KB
  48. 1. Section Preview.mp4 29.5 MB
  49. 1. Section Preview.srt 2.1 KB
  50. 2. What is Vulnerability Management.mp4 39.3 MB
  51. 2. What is Vulnerability Management.srt 3.9 KB
  52. 3. Ethical Hacking & Pen Testing.mp4 99.6 MB
  53. 3. Ethical Hacking & Pen Testing.srt 8.1 KB
  54. 1. Conclusion.mp4 24.7 MB
  55. 1. Conclusion.srt 1.5 KB
  56. Bonus Resources.txt 386 bytes

Discussion