RAR-files |
linkedin.learning.sscp.cert.prep.3.risk.identification.monitoring.and.analysis-xqzt.rar |
50,000,000 |
879EB9CD |
linkedin.learning.sscp.cert.prep.3.risk.identification.monitoring.and.analysis-xqzt.r00 |
50,000,000 |
73828F27 |
linkedin.learning.sscp.cert.prep.3.risk.identification.monitoring.and.analysis-xqzt.r01 |
50,000,000 |
DE9F814E |
linkedin.learning.sscp.cert.prep.3.risk.identification.monitoring.and.analysis-xqzt.r02 |
50,000,000 |
F266BB1D |
linkedin.learning.sscp.cert.prep.3.risk.identification.monitoring.and.analysis-xqzt.r03 |
50,000,000 |
223F3E7A |
linkedin.learning.sscp.cert.prep.3.risk.identification.monitoring.and.analysis-xqzt.r04 |
50,000,000 |
2FA7AF50 |
linkedin.learning.sscp.cert.prep.3.risk.identification.monitoring.and.analysis-xqzt.r05 |
50,000,000 |
A73AC03D |
linkedin.learning.sscp.cert.prep.3.risk.identification.monitoring.and.analysis-xqzt.r06 |
50,000,000 |
97B3BBF8 |
linkedin.learning.sscp.cert.prep.3.risk.identification.monitoring.and.analysis-xqzt.r07 |
4,804,009 |
54F9BCE2 |
|
Total size: |
404,804,009 |
|
|
Archived
files |
01.01-managing_risks.mkv
[15bf93038faa2fca]
|
28,787,209 |
80708AC3 |
01.02-what_you_need_to_know.mkv
[373286f9035e7822]
|
1,095,521 |
00719030 |
01.03-study_resources.mkv
[1cb095a60ef2968e]
|
6,434,595 |
6F4E228F |
02.01-risk_assessment.mkv
[6f0af399123ea7f]
|
11,298,019 |
8CF82CB7 |
02.02-quantitative_risk_assessment.mkv
[a380261e5ce9a368]
|
19,963,598 |
FD967035 |
02.03-risk_management.mkv
[7254c5ee4280c59e]
|
14,460,387 |
210C00F4 |
02.04-ongoing_risk_management.mkv
[d7c7c57a1934e378]
|
6,732,373 |
51E5FF2F |
02.05-risk_management_frameworks.mkv
[dabdf0907c8e8e30]
|
10,430,928 |
CD4DAE4A |
02.06-risk_visibility_and_reporting.mkv
[eaf4b04f46eb06d6]
|
24,607,883 |
2B4117C3 |
03.01-threat_intelligence_.mkv
[614deb2e701ba035]
|
10,278,097 |
CA35CBB8 |
03.02-managing_threat_indicators.mkv
[16cee3327b6798b7]
|
11,767,993 |
F0A8195C |
03.03-intelligence_sharing.mkv
[cf3ccdc25b972296]
|
12,108,625 |
6ED394D1 |
03.04-identifying_threats.mkv
[14a8102fc63d4e2d]
|
4,608,133 |
D131AA01 |
03.05-automating_threat_intelligence.mkv
[6e4d753d78173e8b]
|
11,600,893 |
B1CD4F6F |
03.06-threat_hunting.mkv
[c10dd495c0bb11c1]
|
10,828,324 |
7655CF15 |
04.01-vulnerability_impacts.mkv
[547bafd7699e5ee6]
|
17,135,608 |
20D44DA0 |
04.02-supply_chain_vulnerabilities.mkv
[922ccaa9f9f1cd55]
|
15,342,459 |
004BBC04 |
04.03-configuration_vulnerabilities.mkv
[7d0a3957e74535fd]
|
11,071,406 |
BEFF42F3 |
04.04-architectural_vulnerabilities.mkv
[4a0a42c820b69cd]
|
7,488,130 |
B9345266 |
05.01-what_is_vulnerability_management.mkv
[56eb2ab80c7cc0c5]
|
12,096,655 |
3A5401C6 |
05.02-identifying_scan_targets.mkv
[c38a625b7741fb4f]
|
10,498,761 |
A18E9BC8 |
05.03-scan_configuration.mkv
[12599d391d6de2e0]
|
13,106,448 |
2ECAD25E |
05.04-scan_perspective.mkv
[1f5ef298126b8ef9]
|
10,058,726 |
FCB14697 |
05.05-cvss_(common_vulnerability_scoring_system).mkv
[9244e0ef5479c3fc]
|
6,678,858 |
9DCF0CB1 |
05.06-analyzing_scan_reports.mkv
[510f5a81dd21567d]
|
11,337,272 |
BF67826D |
05.07-correlating_scan_results.mkv
[cac34dc818d46cea]
|
6,143,468 |
ED8ED38E |
06.01-legal_and_compliance_risks.mkv
[9c581af8a42e344a]
|
6,163,044 |
A09FC980 |
06.02-legal_definitions.mkv
[6159cb0c670e3513]
|
8,173,780 |
7F8196AD |
06.03-data_privacy.mkv
[f2ac768cadeae197]
|
11,231,042 |
2669DBC5 |
06.04-data_breaches_.mkv
[662581b9e7d99079]
|
9,250,329 |
65FFC2DB |
07.01-monitoring_log_files.mkv
[7e1102514876f702]
|
13,580,047 |
B55B22AB |
07.02-security_information_and_event_management.mkv
[cfce0d90b86dab62]
|
11,551,156 |
0D4A8A24 |
07.03-continuous_security_monitoring.mkv
[d34e8da1afc5d49c]
|
12,027,240 |
8B96294A |
07.04-visualization_and_reporting.mkv
[657f76b2552d99bb]
|
9,880,794 |
E3A6AD19 |
07.05-compliance_monitoring.mkv
[6eed249ae5cd79e3]
|
4,472,274 |
1759BF4B |
07.06-legal_and_ethical_issues_in_monitoring.mkv
[b0d5c253f108722d]
|
10,185,515 |
6F653339 |
08.01-continuing_your_studies.mkv
[803a1c569109a140]
|
2,324,871 |
CF051560 |
|
Total size: |
404,800,461 |
|
|