Security for the SMB Implementing the NIST Framework\07 - Recover\02 - Backups, virtualization, and the cloud.srt |
4,584 |
7C0F24E6 |
Security for the SMB Implementing the NIST Framework\07 - Recover\02 - Backups, virtualization, and the cloud.mp4
[693e38e9dc9b546b]
|
8,216,748 |
8B30F230 |
Security for the SMB Implementing the NIST Framework\07 - Recover\01 - Your continuity of operations plan.mp4
[71698ddf09c0553e]
|
7,349,881 |
58BCF07A |
Security for the SMB Implementing the NIST Framework\07 - Recover\01 - Your continuity of operations plan.srt |
6,273 |
C97F0CB3 |
Security for the SMB Implementing the NIST Framework\04 - Protect\02 - Network defenses.mp4
[ac4d0742f6d6a4ea]
|
8,587,393 |
9630E518 |
Security for the SMB Implementing the NIST Framework\04 - Protect\05 - Personnel and physical security.srt |
5,602 |
047EC17A |
Security for the SMB Implementing the NIST Framework\04 - Protect\04 - Encryption.mp4
[45b34f870a724b45]
|
7,994,541 |
0004657C |
Security for the SMB Implementing the NIST Framework\04 - Protect\03 - System security.srt |
5,704 |
9D4F9A21 |
Security for the SMB Implementing the NIST Framework\04 - Protect\02 - Network defenses.srt |
6,139 |
918264E6 |
Security for the SMB Implementing the NIST Framework\04 - Protect\01 - Overview of defending business assets.mp4
[f0716380557dd409]
|
1,948,162 |
E4DFAE29 |
Security for the SMB Implementing the NIST Framework\04 - Protect\01 - Overview of defending business assets.srt |
1,499 |
9AD20E5C |
Security for the SMB Implementing the NIST Framework\04 - Protect\04 - Encryption.srt |
6,205 |
F7A944CA |
Security for the SMB Implementing the NIST Framework\04 - Protect\03 - System security.mp4
[4d194423d5dbca6]
|
10,293,762 |
10A963EB |
Security for the SMB Implementing the NIST Framework\04 - Protect\05 - Personnel and physical security.mp4
[65ebc81644265711]
|
7,042,904 |
D9B4F847 |
Security for the SMB Implementing the NIST Framework\06 - Respond\04 - Response testing and training.srt |
5,165 |
40D7B270 |
Security for the SMB Implementing the NIST Framework\06 - Respond\02 - Incident response plan examples.srt |
4,224 |
A57C1D6F |
Security for the SMB Implementing the NIST Framework\06 - Respond\04 - Response testing and training.mp4
[5059f3ea9cb1791e]
|
6,217,900 |
F332530D |
Security for the SMB Implementing the NIST Framework\06 - Respond\01 - Establishing a response plan.srt |
6,482 |
AE5978E8 |
Security for the SMB Implementing the NIST Framework\06 - Respond\03 - Digital forensics.mp4
[e0cdffb7ebca09fc]
|
9,580,719 |
0F6B4628 |
Security for the SMB Implementing the NIST Framework\06 - Respond\02 - Incident response plan examples.mp4
[bb017c11ebf33746]
|
7,058,921 |
2128F059 |
Security for the SMB Implementing the NIST Framework\06 - Respond\03 - Digital forensics.srt |
5,297 |
998683EF |
Security for the SMB Implementing the NIST Framework\06 - Respond\01 - Establishing a response plan.mp4
[84fc112aa9c56b40]
|
7,124,651 |
0935500F |
Security for the SMB Implementing the NIST Framework\03 - Identify\01 - Inventory of critical assets.srt |
4,191 |
A476F90B |
Security for the SMB Implementing the NIST Framework\03 - Identify\02 - Business impact assessment.mp4
[85aad60737b54b5]
|
3,759,070 |
36ABFB18 |
Security for the SMB Implementing the NIST Framework\03 - Identify\04 - I-AAA.srt |
5,500 |
9613DCF1 |
Security for the SMB Implementing the NIST Framework\03 - Identify\01 - Inventory of critical assets.mp4
[bb2077f0dca45152]
|
6,812,162 |
54F78DD5 |
Security for the SMB Implementing the NIST Framework\03 - Identify\03 - Security policies and procedures.mp4
[23dc446cb4f2b32d]
|
7,018,080 |
BD4DFF37 |
Security for the SMB Implementing the NIST Framework\03 - Identify\04 - I-AAA.mp4
[49256873150fcdd7]
|
7,610,712 |
ABB515F9 |
Security for the SMB Implementing the NIST Framework\03 - Identify\03 - Security policies and procedures.srt |
5,827 |
0A4A100B |
Security for the SMB Implementing the NIST Framework\03 - Identify\02 - Business impact assessment.srt |
3,017 |
0A351486 |
Security for the SMB Implementing the NIST Framework\08 - Conclusion\01 - Best practices.srt |
3,883 |
087C99F6 |
Security for the SMB Implementing the NIST Framework\08 - Conclusion\02 - Resources.mp4
[c82fc8a3d1d963fd]
|
11,863,384 |
E09EA009 |
Security for the SMB Implementing the NIST Framework\08 - Conclusion\02 - Resources.srt |
4,380 |
3C23E098 |
Security for the SMB Implementing the NIST Framework\08 - Conclusion\01 - Best practices.mp4
[691c3f3754576dd3]
|
5,856,088 |
02CA0BE7 |
Security for the SMB Implementing the NIST Framework\01 - Introduction\01 - Secure your infrastructure with NIST.srt |
2,026 |
1C102B17 |
Security for the SMB Implementing the NIST Framework\01 - Introduction\01 - Secure your infrastructure with NIST.mp4
[7cd661832c8489df]
|
26,397,867 |
64A53026 |
Security for the SMB Implementing the NIST Framework\05 - Detection\02 - System auditing and logging.srt |
6,369 |
4842DED5 |
Security for the SMB Implementing the NIST Framework\05 - Detection\01 - Detecting security issues overview.srt |
4,323 |
CEADB931 |
Security for the SMB Implementing the NIST Framework\05 - Detection\04 - Assessments and audits.mp4
[8b5756398e043cb7]
|
6,596,098 |
B9452595 |
Security for the SMB Implementing the NIST Framework\05 - Detection\01 - Detecting security issues overview.mp4
[29e7604f8da182df]
|
6,689,921 |
2C619257 |
Security for the SMB Implementing the NIST Framework\05 - Detection\03 - Monitoring and alerting.srt |
4,703 |
4A15D768 |
Security for the SMB Implementing the NIST Framework\05 - Detection\04 - Assessments and audits.srt |
6,387 |
211EC17A |
Security for the SMB Implementing the NIST Framework\05 - Detection\02 - System auditing and logging.mp4
[3819d3c60627e582]
|
7,231,317 |
20124CC5 |
Security for the SMB Implementing the NIST Framework\05 - Detection\03 - Monitoring and alerting.mp4
[a9d1a33b49792082]
|
7,501,656 |
719BDC24 |
Security for the SMB Implementing the NIST Framework\02 - Review of Cybersecurity Fundamentals\01 - Understanding and managing your risks.mp4
[75bd339891e1872a]
|
9,882,038 |
2802B70A |
Security for the SMB Implementing the NIST Framework\02 - Review of Cybersecurity Fundamentals\06 - Building a cybersecurity program.srt |
5,717 |
9DD723D5 |
Security for the SMB Implementing the NIST Framework\02 - Review of Cybersecurity Fundamentals\06 - Building a cybersecurity program.mp4
[b9f4d17a63bde44]
|
6,251,010 |
7574F96F |
Security for the SMB Implementing the NIST Framework\02 - Review of Cybersecurity Fundamentals\05 - Cybersecurity five-step process overview.srt |
4,783 |
26D4D835 |
Security for the SMB Implementing the NIST Framework\02 - Review of Cybersecurity Fundamentals\03 - Cybersecurity requirements.mp4
[8a24b163f362fdd]
|
5,398,188 |
4B67402D |
Security for the SMB Implementing the NIST Framework\02 - Review of Cybersecurity Fundamentals\04 - NIST Cybersecurity Framework.srt |
5,296 |
F5EF7022 |
Security for the SMB Implementing the NIST Framework\02 - Review of Cybersecurity Fundamentals\03 - Cybersecurity requirements.srt |
4,534 |
6A38E6C1 |
Security for the SMB Implementing the NIST Framework\02 - Review of Cybersecurity Fundamentals\01 - Understanding and managing your risks.srt |
6,068 |
92179899 |
Security for the SMB Implementing the NIST Framework\02 - Review of Cybersecurity Fundamentals\05 - Cybersecurity five-step process overview.mp4
[1b1d16e45c714c16]
|
4,953,772 |
9930D06B |
Security for the SMB Implementing the NIST Framework\02 - Review of Cybersecurity Fundamentals\02 - Cybersecurity threats and vulnerabilities.srt |
6,515 |
D0F9B73E |
Security for the SMB Implementing the NIST Framework\02 - Review of Cybersecurity Fundamentals\04 - NIST Cybersecurity Framework.mp4
[36eddd01835200aa]
|
5,472,598 |
406E937A |
Security for the SMB Implementing the NIST Framework\02 - Review of Cybersecurity Fundamentals\02 - Cybersecurity threats and vulnerabilities.mp4
[72789c3b862d38eb]
|
9,909,419 |
DC1B06B1 |
Security for the SMB Implementing the NIST Framework\07 - Recover |
0 |
00000000 |
Security for the SMB Implementing the NIST Framework\04 - Protect |
0 |
00000000 |
Security for the SMB Implementing the NIST Framework\06 - Respond |
0 |
00000000 |
Security for the SMB Implementing the NIST Framework\03 - Identify |
0 |
00000000 |
Security for the SMB Implementing the NIST Framework\08 - Conclusion |
0 |
00000000 |
Security for the SMB Implementing the NIST Framework\01 - Introduction |
0 |
00000000 |
Security for the SMB Implementing the NIST Framework\05 - Detection |
0 |
00000000 |
Security for the SMB Implementing the NIST Framework\02 - Review of Cybersecurity Fundamentals |
0 |
00000000 |
Security for the SMB Implementing the NIST Framework |
0 |
00000000 |
|
Total size: |
220,759,655 |
|