Information Management - Document Security\1.Introduction\02.Why security matters.mp4
[f970cd66d7a35e10]
|
5,500,559 |
77185303 |
Information Management - Document Security\1.Introduction\01.Welcome.en.srt |
1,464 |
77805B44 |
Information Management - Document Security\1.Introduction\02.Why security matters.en.srt |
4,425 |
14655799 |
Information Management - Document Security\1.Introduction\03.Understanding security concerns.en.srt |
3,747 |
394064A3 |
Information Management - Document Security\1.Introduction\01.Welcome.mp4
[c660ae557bcb31bd]
|
17,423,147 |
2E5A3A42 |
Information Management - Document Security\1.Introduction\03.Understanding security concerns.mp4
[25de4a0bfd3c148e]
|
4,469,688 |
E28F5FE6 |
Information Management - Document Security\1.Introduction\04.Are your services secure.mp4
[b38e5011b54624df]
|
7,786,751 |
7024B7D9 |
Information Management - Document Security\1.Introduction\04.Are your services secure.en.srt |
5,320 |
6A76D877 |
Information Management - Document Security\5.Conclusion\23.Next steps.mp4
[fae4d46ef44f8420]
|
3,014,612 |
735AA20E |
Information Management - Document Security\5.Conclusion\23.Next steps.en.srt |
2,521 |
6FB9C7A5 |
Information Management - Document Security\4.3. Best Practices for Document Security\19.Create separate spaces for external documents.mp4
[ba1457de53605618]
|
4,436,875 |
0EE33330 |
Information Management - Document Security\4.3. Best Practices for Document Security\22.Ongoing employee awareness.en.srt |
5,607 |
E69CBC49 |
Information Management - Document Security\4.3. Best Practices for Document Security\21.Plug-ins and add-ons.mp4
[6a22f8764973b81d]
|
5,995,048 |
5B4997A8 |
Information Management - Document Security\4.3. Best Practices for Document Security\17.Manage sharing permissions.en.srt |
4,776 |
E9A66F60 |
Information Management - Document Security\4.3. Best Practices for Document Security\18.Links, not attachments.mp4
[fe3c756848c36366]
|
5,478,505 |
72DD88D5 |
Information Management - Document Security\4.3. Best Practices for Document Security\22.Ongoing employee awareness.mp4
[2cec25d4ebea2f2]
|
7,058,199 |
B5588290 |
Information Management - Document Security\4.3. Best Practices for Document Security\20.Choose reliable services.en.srt |
5,341 |
D8367E03 |
Information Management - Document Security\4.3. Best Practices for Document Security\17.Manage sharing permissions.mp4
[15a061b7d06eaf6f]
|
6,376,552 |
43E1E03C |
Information Management - Document Security\4.3. Best Practices for Document Security\18.Links, not attachments.en.srt |
3,932 |
3F7CF170 |
Information Management - Document Security\4.3. Best Practices for Document Security\20.Choose reliable services.mp4
[8716142f035a3428]
|
6,499,919 |
D7B0052C |
Information Management - Document Security\4.3. Best Practices for Document Security\19.Create separate spaces for external documents.en.srt |
3,375 |
F6069858 |
Information Management - Document Security\4.3. Best Practices for Document Security\21.Plug-ins and add-ons.en.srt |
3,574 |
2A4D949B |
Information Management - Document Security\2.1. Server and Security Basics\10.Compliance vs. best practices.en.srt |
4,235 |
6225810C |
Information Management - Document Security\2.1. Server and Security Basics\08.Levels of security classification.en.srt |
5,809 |
B1933168 |
Information Management - Document Security\2.1. Server and Security Basics\06.On-premises vs. cloud.mp4
[bcda3fe1801ef18b]
|
4,377,832 |
D848E2AD |
Information Management - Document Security\2.1. Server and Security Basics\07.Layers of cloud security.mp4
[123ca339b59c1aee]
|
5,001,001 |
08D45E98 |
Information Management - Document Security\2.1. Server and Security Basics\08.Levels of security classification.mp4
[c510e388aa1b3977]
|
6,956,608 |
3D19845C |
Information Management - Document Security\2.1. Server and Security Basics\09.What's your data-retention policy.en.srt |
5,683 |
7D3AD07D |
Information Management - Document Security\2.1. Server and Security Basics\10.Compliance vs. best practices.mp4
[acb889d2c4426ddd]
|
5,494,645 |
D0292439 |
Information Management - Document Security\2.1. Server and Security Basics\06.On-premises vs. cloud.en.srt |
3,593 |
B15FF2D7 |
Information Management - Document Security\2.1. Server and Security Basics\09.What's your data-retention policy.mp4
[15c9084592f33cd0]
|
9,102,394 |
21A47F26 |
Information Management - Document Security\2.1. Server and Security Basics\07.Layers of cloud security.en.srt |
4,273 |
7F8A720E |
Information Management - Document Security\2.1. Server and Security Basics\05.Understanding different server structures.mp4
[9fbb27e4e50f702b]
|
4,444,769 |
6D31037E |
Information Management - Document Security\2.1. Server and Security Basics\05.Understanding different server structures.en.srt |
3,578 |
C7E932C6 |
Information Management - Document Security\3.2. Levels of Security and Permissions\14.Document control - Collaborative vs. protected.en.srt |
7,743 |
604A7C00 |
Information Management - Document Security\3.2. Levels of Security and Permissions\16.Limiting executable code.en.srt |
3,875 |
C98E2125 |
Information Management - Document Security\3.2. Levels of Security and Permissions\14.Document control - Collaborative vs. protected.mp4
[8dda73ff19e83c8e]
|
15,098,168 |
6A5D4A3A |
Information Management - Document Security\3.2. Levels of Security and Permissions\12.Dealing with remote access.mp4
[ccd0ff4222fc4c83]
|
7,626,232 |
EA6F6916 |
Information Management - Document Security\3.2. Levels of Security and Permissions\13.Connecting systems.mp4
[2a3151514dd07a59]
|
6,888,738 |
A2554607 |
Information Management - Document Security\3.2. Levels of Security and Permissions\15.Version control.en.srt |
5,660 |
13A5513A |
Information Management - Document Security\3.2. Levels of Security and Permissions\13.Connecting systems.en.srt |
4,767 |
1D70B140 |
Information Management - Document Security\3.2. Levels of Security and Permissions\16.Limiting executable code.mp4
[b7a56a9f2fd2d914]
|
5,121,412 |
8FDC4742 |
Information Management - Document Security\3.2. Levels of Security and Permissions\15.Version control.mp4
[f00f497443910099]
|
8,071,800 |
324B99A4 |
Information Management - Document Security\3.2. Levels of Security and Permissions\11.Set security levels that make sense.mp4
[81c700e1adec6113]
|
6,031,980 |
5764D4B2 |
Information Management - Document Security\3.2. Levels of Security and Permissions\12.Dealing with remote access.en.srt |
6,107 |
98066ABA |
Information Management - Document Security\3.2. Levels of Security and Permissions\11.Set security levels that make sense.en.srt |
4,916 |
4DECE87F |
Information Management - Document Security\1.Introduction |
0 |
00000000 |
Information Management - Document Security\5.Conclusion |
0 |
00000000 |
Information Management - Document Security\4.3. Best Practices for Document Security |
0 |
00000000 |
Information Management - Document Security\2.1. Server and Security Basics |
0 |
00000000 |
Information Management - Document Security\3.2. Levels of Security and Permissions |
0 |
00000000 |
Information Management - Document Security |
0 |
00000000 |
|
Total size: |
158,359,755 |
|