:Search:

Udemy NIST 800 30 Risk Assessment Step by Step

Torrent:
Info Hash: CC4771FB4928A6F9E6F274E624382E7EF9FFA90F
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 520
Type: Tutorials
Language: English
Category: Other
Size: 1.4 GB
Added: June 12, 2025, 8:22 a.m.
Peers: Seeders: 12, Leechers: 4 (Last updated: 8 months, 3 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 0 3
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 9 1 329
udp://tracker.torrent.eu.org:451/announce 3 0 188
udp://explodie.org:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.birkenwald.de:6969/announce 0 3 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.therarbg.to:6969/announce (Failed to scrape UDP tracker) 0 0 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 1 -Introduction.mp4 34.6 MB
  3. 2 -Model Company_ MediSure Health Solutions Inc.docx 7.9 KB
  4. 2 -Our Use Case - MediSure Health Solutions Inc.mp4 14.5 MB
  5. 1 -Risk Management Process.mp4 36.1 MB
  6. 2 -Risk Assessment.mp4 10.1 MB
  7. 1 -Key Risk Concepts (1).mp4 68.1 MB
  8. 2 -Key Risk Concepts (1).mp4 52.8 MB
  9. 1 -Application of Risk Assessments (1).mp4 61.4 MB
  10. 2 -Application of Risk Assessments (2).mp4 48.7 MB
  11. 1 -The Risk Assessment Process.mp4 13.1 MB
  12. 2 -Use Case for Assignments AeroLink Logistics.mp4 10.8 MB
  13. 2 -Use Case_ AeroLink Logistics Inc.docx 7.7 KB
  14. 1 -Step 1 - Prepare For The Assessment.mp4 20.1 MB
  15. 2 -Task 1-1 Identify Purpose.mp4 17.3 MB
  16. 3 -Task 1-2 Identify Scope.mp4 19.8 MB
  17. 4 -Task 1-3 Identify the Specific Assumptions and Constraints (1).mp4 47.0 MB
  18. 5 -Task 1-3 Identify the Specific Assumptions and Constraints (2).mp4 52.0 MB
  19. 6 -Task 1-4 Identify Information Sources.mp4 9.2 MB
  20. 1 -Step 2 Conducting The Risk Assessment.mp4 12.5 MB
  21. 10 -APPENDIX F - VULNERABILITIES AND PREDISPOSING CONDITIONS (1).mp4 54.8 MB
  22. 11 -APPENDIX F - VULNERABILITIES AND PREDISPOSING CONDITIONS (2).mp4 50.2 MB
  23. 12 -Task 2-4 - Determine Likelihood of Threat Event Success.mp4 8.9 MB
  24. 13 -Appendix G – Likelihood Determination (1).mp4 48.7 MB
  25. 14 -Appendix G – Likelihood Determination (2).mp4 31.2 MB
  26. 15 -Task 2-5 - Determine Impact of Successful Exploitation.mp4 17.2 MB
  27. 16 -APPENDIX H - IMPACT (1).mp4 34.4 MB
  28. 17 -APPENDIX H - IMPACT (2).mp4 46.7 MB
  29. 18 -Task 2-6 - Determine Information Security Risks.mp4 15.0 MB
  30. 19 -APPENDIX I - RISK DETERMINATION (1).mp4 94.8 MB
  31. 2 -NIST 800-30 Appendices.mp4 16.1 MB
  32. 20 -APPENDIX I - RISK DETERMINATION (2).mp4 104.4 MB
  33. 3 -Task 2-1 Identify Threat Sources.mp4 10.1 MB
  34. 4 -Appendix D - Threat Sources (1).mp4 57.9 MB
  35. 5 -Appendix D - Threat Sources (2).mp4 61.2 MB
  36. 6 -Task 2-2 - Identify Threat Events.mp4 11.4 MB
  37. 7 -APPENDIX E - THREAT EVENTS (1).mp4 106.0 MB
  38. 8 -APPENDIX E - THREAT EVENTS (2).mp4 38.2 MB
  39. 9 -Task 2-3 - Identify Vulnerabilities and Predisposing Conditions.mp4 18.1 MB
  40. 1 -Step 3 - Communicate and Share Results.mp4 11.9 MB
  41. 2 -Step 4 - Maintain the Assessment.mp4 32.9 MB
  42. 3 -Step 5 - Maintain the Risk Assessment.mp4 24.1 MB
  43. 1 -Conclusion.mp4 14.3 MB
  44. Bonus Resources.txt 70 bytes

Discussion