RAR-files |
linkedin.learning.building.and.auditing.a.cybersecurity.program-xqzt.rar |
50,000,000 |
9FE873FB |
linkedin.learning.building.and.auditing.a.cybersecurity.program-xqzt.r00 |
50,000,000 |
FBE077A2 |
linkedin.learning.building.and.auditing.a.cybersecurity.program-xqzt.r01 |
50,000,000 |
CF706936 |
linkedin.learning.building.and.auditing.a.cybersecurity.program-xqzt.r02 |
50,000,000 |
D8B3237A |
linkedin.learning.building.and.auditing.a.cybersecurity.program-xqzt.r03 |
50,000,000 |
74154E11 |
linkedin.learning.building.and.auditing.a.cybersecurity.program-xqzt.r04 |
50,000,000 |
FF0E46F1 |
linkedin.learning.building.and.auditing.a.cybersecurity.program-xqzt.r05 |
45,441,052 |
175D8764 |
|
Total size: |
345,441,052 |
|
|
Archived
files |
01.01-cybersecurity_simplified.mkv
[64567c87dfa245ae]
|
4,731,725 |
49378408 |
01.02-creating_the_cybersecurity_program_framework.mkv
[668370ee005908d2]
|
3,077,966 |
BC63C31B |
02.01-adopt_security_frameworks_to_drive_cybersecurity_governance.mkv
[d610f3399f2445ae]
|
16,569,342 |
3BA368C4 |
02.02-consider_laws_and_regulations_in_cybersecurity_governance.mkv
[fd5767c0916207cc]
|
17,469,472 |
93238CF1 |
02.03-policies_standards_and_procedures_to_govern_cybersecurity.mkv
[28bc8d94b579104a]
|
17,297,061 |
532C2A6E |
02.04-roles_and_responsibilities_for_cybersecurity_governance.mkv
[b84d6bebd837d732]
|
14,286,848 |
0D1FB06D |
02.05-cyber_risk_management_program_for_cybersecurity_governance.mkv
[b3c3bb1e7fb7ae76]
|
14,386,511 |
E5632DD1 |
02.06-risk_management_process_to_prioritize_cyber_defense.mkv
[700bac1bb65e86bf]
|
21,475,768 |
E0C65085 |
03.01-infrastructure_asset_management_for_cybersecurity.mkv
[29bb69a005c9eeda]
|
11,963,064 |
014A66CC |
03.02-software_asset_management_for_cybersecurity.mkv
[803ff2f840ae93ae]
|
12,124,606 |
48D34394 |
03.03-secure_cyber_supply_chain_to_reduce_risk_of_external_threats.mkv
[b9501b4a8096502b]
|
14,789,413 |
B42EE5C8 |
04.01-establish_data_security_management_practices_to_protect_data.mkv
[5508325a062c4d17]
|
14,199,211 |
46B72C8D |
04.02-encryption_to_provide_confidentiality_of_data.mkv
[c2a6100d8124ee87]
|
17,631,586 |
A02B4005 |
04.03-access_management_to_control_unauthorized_access.mkv
[eb6b6027ad477cf3]
|
12,532,661 |
438AA3DC |
04.04-vulnerability_management_to_mitigate_security_weaknesses.mkv
[3d7a89d9b434b0d3]
|
16,321,496 |
E874B443 |
04.05-secure_configuration_process_to_minimize_vulnerabilities.mkv
[203aa8cca46ef3e2]
|
14,473,313 |
5EBCE185 |
05.01-network_security_monitoring_to_detect_cyber_threats.mkv
[5299d3069e92c958]
|
18,097,888 |
45B5CFEF |
06.01-incident_management_to_respond_to_a_cyber_attack.mkv
[5b93d60eea7912db]
|
15,608,152 |
3A8C6F89 |
07.01-integrating_cybersecurity_into_disaster_recovery.mkv
[687da6eed00848f0]
|
13,097,916 |
A54FCA8C |
07.02-data_backups_to_defend_against_ransomware_and_cyber_threats.mkv
[31742da1817f2a91]
|
16,454,773 |
0AB1C4CB |
08.01-application_security_to_mitigate_data_breaches.mkv
[2e0b36ef6645c95b]
|
34,234,648 |
1704DCEA |
08.02-cloud_security_to_protect_cloud_data_from_threats.mkv
[850b3827ec435a51]
|
21,745,312 |
D652241C |
09.01-additional_resources.mkv
[9e1ecb7fb8dc1c20]
|
2,820,191 |
3AE0B731 |
Ex_Files_Building_and_Auditing_Cybersecurity_Program.zip |
48,932 |
466F0989 |
|
Total size: |
345,437,855 |
|
|