RAR-files |
linkedin.learning.it.and.cybersecurity.risk.management.essential.training-xqzt.rar |
50,000,000 |
E0B2D4A0 |
linkedin.learning.it.and.cybersecurity.risk.management.essential.training-xqzt.r00 |
50,000,000 |
8FCB8ABC |
linkedin.learning.it.and.cybersecurity.risk.management.essential.training-xqzt.r01 |
50,000,000 |
009B59FC |
linkedin.learning.it.and.cybersecurity.risk.management.essential.training-xqzt.r02 |
50,000,000 |
BD1F99C9 |
linkedin.learning.it.and.cybersecurity.risk.management.essential.training-xqzt.r03 |
50,000,000 |
2A452EE7 |
linkedin.learning.it.and.cybersecurity.risk.management.essential.training-xqzt.r04 |
50,000,000 |
A90A71B2 |
linkedin.learning.it.and.cybersecurity.risk.management.essential.training-xqzt.r05 |
50,000,000 |
F00ED121 |
linkedin.learning.it.and.cybersecurity.risk.management.essential.training-xqzt.r06 |
50,000,000 |
C080D965 |
linkedin.learning.it.and.cybersecurity.risk.management.essential.training-xqzt.r07 |
26,364,067 |
C48B5AAB |
|
Total size: |
426,364,067 |
|
|
Archived
files |
01.01-managing_risk_in_it.mkv
[ebfe15cb6718f77c]
|
19,780,609 |
4D21820F |
02.01-what_is_it_risk.mkv
[5f054691cfbcfd5e]
|
19,005,581 |
82F88DB9 |
02.02-what_is_it_risk_appetite.mkv
[89836b999500b761]
|
11,007,530 |
4E9166CA |
02.03-what_is_it_risk_tolerance.mkv
[bb320bf736a5296c]
|
13,297,617 |
388F056D |
02.04-types_of_it_risks.mkv
[8e42377789c0fd18]
|
14,536,593 |
23352A43 |
02.05-it_risk_management_roles_and_responsibilities.mkv
[45e6ba0cb89b054]
|
13,645,328 |
275679F1 |
02.06-making_an_it_risk_decision.mkv
[e6e95d7d6497303c]
|
15,563,566 |
D18ABB46 |
03.01-it_risk_management_in_small_companies.mkv
[d1ca5269fca38006]
|
18,864,275 |
0FAE16CC |
03.02-it_risk_management_in_medium_companies.mkv
[ee047c4d4cba4236]
|
28,055,030 |
A4EDAFCE |
03.03-it_risk_management_in_large_companies.mkv
[4d71a292b90daa7f]
|
28,308,164 |
168D1621 |
03.04-quantitative_vs._qualitative_risk_assessments.mkv
[2aef5ef44b4d1039]
|
15,163,378 |
C03F9957 |
03.05-the_role_of_organizational_culture.mkv
[afb5ff894eb560e8]
|
12,408,856 |
B1E78D1C |
03.06-the_minimum_viable_approach.mkv
[891213fe4497753c]
|
16,352,813 |
4F44BCFC |
04.01-performing_the_it_risk_assessment.mkv
[aeb44b838415e544]
|
22,725,804 |
11A8337A |
04.02-choosing_an_it_risk_management_framework.mkv
[d06f9934958b274e]
|
18,534,234 |
73E398A9 |
04.03-choosing_an_it_risk_management_tool.mkv
[605359f5bb5e27d5]
|
11,559,395 |
371A8575 |
04.04-determining_an_acceptable_level_of_it_risk.mkv
[2d9bce767cc519e2]
|
13,825,784 |
7E18E5C5 |
04.05-using_an_it_risk_register.mkv
[4cab971fdbf814ed]
|
17,322,710 |
3E4795FE |
04.06-it_risk_management_techniques.mkv
[34a2068bc1bd3ddf]
|
28,387,933 |
CD34CCEC |
05.01-choosing_the_right_it_risk_management_technique.mkv
[cd03ef059be8f352]
|
22,932,169 |
02141A8F |
05.02-choosing_controls.mkv
[3de4488183860733]
|
16,534,266 |
142CA693 |
05.03-implementing_controls.mkv
[13c53341fd5913e8]
|
14,892,358 |
A0EE08BE |
05.04-operating_controls.mkv
[8c7a788f6cfe2cd1]
|
18,001,840 |
F394B5F2 |
05.05-validating_controls.mkv
[775d8049c82753e3]
|
12,384,656 |
7048AD25 |
06.01-next_steps_with_managing_risk_in_it.mkv
[cf2f2aeb16a1a1d9]
|
3,270,664 |
3F3E46EC |
|
Total size: |
426,361,153 |
|
|