The Governance of Information Security\1.Course Overview\01.Course Overview.mp4
[4c0bd1dc568d02ed]
|
2,430,519 |
5D7D368F |
The Governance of Information Security\1.Course Overview\01.Course Overview.en.srt |
1,833 |
6C3F718C |
The Governance of Information Security\2.The Principles of Governance\06.Governance and Accountability - Part One.mp4
[d5b70af2f6c4ee2a]
|
7,659,664 |
CED9788E |
The Governance of Information Security\2.The Principles of Governance\05.The Principles of Governance - Part Four.en.srt |
8,917 |
94F27E35 |
The Governance of Information Security\2.The Principles of Governance\02.The Principles of Governance - Part One.mp4
[c6b6ba8dd854f8af]
|
11,656,469 |
CBE1A94E |
The Governance of Information Security\2.The Principles of Governance\02.The Principles of Governance - Part One.en.srt |
11,066 |
191AEB63 |
The Governance of Information Security\2.The Principles of Governance\04.The Principles of Governance - Part Three.mp4
[3c29240ac26e2d16]
|
7,128,718 |
12259A20 |
The Governance of Information Security\2.The Principles of Governance\03.The Principles of Governance - Part Two.mp4
[15d6e9248474f64c]
|
8,813,124 |
A08AFBD0 |
The Governance of Information Security\2.The Principles of Governance\04.The Principles of Governance - Part Three.en.srt |
8,380 |
6D527E62 |
The Governance of Information Security\2.The Principles of Governance\06.Governance and Accountability - Part One.en.srt |
7,850 |
A0FF12A0 |
The Governance of Information Security\2.The Principles of Governance\07.Governance and Accountability - Part Two.mp4
[9d8e901c08c1d404]
|
8,699,184 |
041B9D79 |
The Governance of Information Security\2.The Principles of Governance\07.Governance and Accountability - Part Two.en.srt |
8,402 |
ECA5CD87 |
The Governance of Information Security\2.The Principles of Governance\03.The Principles of Governance - Part Two.en.srt |
11,572 |
BE4E0114 |
The Governance of Information Security\2.The Principles of Governance\05.The Principles of Governance - Part Four.mp4
[589083803ab01e2]
|
9,339,129 |
CDFD0197 |
The Governance of Information Security\Exercise Files\governance-information-security.zip |
4,623,046 |
8DAF5293 |
The Governance of Information Security\3.Providing Direction to the Information Security Governance Function\14.Development of Strategy - Part Three.mp4
[a4fdc1a16bdf074b]
|
10,834,985 |
61237B28 |
The Governance of Information Security\3.Providing Direction to the Information Security Governance Function\12.Development of Strategy - Part One.en.srt |
12,938 |
BD527B6B |
The Governance of Information Security\3.Providing Direction to the Information Security Governance Function\08.Providing Direction to the Information Security Governance Function - Part One.mp4
[9466e601589e5152]
|
11,357,195 |
C252895E |
The Governance of Information Security\3.Providing Direction to the Information Security Governance Function\10.Providing Direction to the Information Security Governance Function - Part Three.en.srt |
13,118 |
F03D1F87 |
The Governance of Information Security\3.Providing Direction to the Information Security Governance Function\13.Development of Strategy - Part Two.mp4
[cc744831ede1a15d]
|
11,360,137 |
FCF86492 |
The Governance of Information Security\3.Providing Direction to the Information Security Governance Function\09.Providing Direction to the Information Security Governance Function - Part Two.mp4
[bc62c67aca9dae4a]
|
6,044,056 |
90C8C923 |
The Governance of Information Security\3.Providing Direction to the Information Security Governance Function\10.Providing Direction to the Information Security Governance Function - Part Three.mp4
[b2c4c37cce98eea8]
|
11,607,487 |
89BDC3CA |
The Governance of Information Security\3.Providing Direction to the Information Security Governance Function\14.Development of Strategy - Part Three.en.srt |
10,434 |
009B7C4A |
The Governance of Information Security\3.Providing Direction to the Information Security Governance Function\11.Providing Direction to the Information Security Governance Function - Part Four.mp4
[8f3d090ee459e838]
|
8,103,121 |
AD48D1A6 |
The Governance of Information Security\3.Providing Direction to the Information Security Governance Function\13.Development of Strategy - Part Two.en.srt |
9,761 |
F0DDE370 |
The Governance of Information Security\3.Providing Direction to the Information Security Governance Function\09.Providing Direction to the Information Security Governance Function - Part Two.en.srt |
6,907 |
9BE717A1 |
The Governance of Information Security\3.Providing Direction to the Information Security Governance Function\08.Providing Direction to the Information Security Governance Function - Part One.en.srt |
12,529 |
68B489FD |
The Governance of Information Security\3.Providing Direction to the Information Security Governance Function\12.Development of Strategy - Part One.mp4
[d5963617d49b5b6a]
|
11,833,842 |
67F5E0AB |
The Governance of Information Security\3.Providing Direction to the Information Security Governance Function\11.Providing Direction to the Information Security Governance Function - Part Four.en.srt |
8,136 |
DBFC3E1C |
The Governance of Information Security\6.Security Metrics and Reporting\29.Channels of Communication - Part Two.en.srt |
7,307 |
2A38189A |
The Governance of Information Security\6.Security Metrics and Reporting\26.Key Metrics - Part Two.en.srt |
11,923 |
049ABC2A |
The Governance of Information Security\6.Security Metrics and Reporting\27.Key Metrics - Part Three.mp4
[cba35bfb04f5288a]
|
10,032,108 |
F7E6933F |
The Governance of Information Security\6.Security Metrics and Reporting\28.Channels of Communication - Part One.mp4
[eabc2fb97be1a25]
|
7,784,414 |
65ED5F25 |
The Governance of Information Security\6.Security Metrics and Reporting\28.Channels of Communication - Part One.en.srt |
9,689 |
E2EEE65E |
The Governance of Information Security\6.Security Metrics and Reporting\26.Key Metrics - Part Two.mp4
[b08559709ace2a1c]
|
9,524,968 |
6894A9F9 |
The Governance of Information Security\6.Security Metrics and Reporting\25.Key Metrics - Part One.mp4
[2aa9bef6acdfd38a]
|
10,704,822 |
6003F788 |
The Governance of Information Security\6.Security Metrics and Reporting\29.Channels of Communication - Part Two.mp4
[f2b6f3f6376b9d39]
|
6,345,478 |
42E831F4 |
The Governance of Information Security\6.Security Metrics and Reporting\25.Key Metrics - Part One.en.srt |
13,527 |
3A8B36DD |
The Governance of Information Security\6.Security Metrics and Reporting\27.Key Metrics - Part Three.en.srt |
11,382 |
E2830AA6 |
The Governance of Information Security\5.Governance, Budget, and Business\23.Business Case Development - Part Three.mp4
[b82e4983813cbe7a]
|
7,796,657 |
4580B4C3 |
The Governance of Information Security\5.Governance, Budget, and Business\23.Business Case Development - Part Three.en.srt |
10,507 |
A8664CD4 |
The Governance of Information Security\5.Governance, Budget, and Business\21.Business Case Development - Part One.mp4
[e95413c0207dd018]
|
13,346,662 |
985C0E27 |
The Governance of Information Security\5.Governance, Budget, and Business\22.Business Case Development - Part Two.en.srt |
13,648 |
3A73A6BD |
The Governance of Information Security\5.Governance, Budget, and Business\22.Business Case Development - Part Two.mp4
[728f08e561315c83]
|
12,744,242 |
F3447F26 |
The Governance of Information Security\5.Governance, Budget, and Business\21.Business Case Development - Part One.en.srt |
14,847 |
A65953BC |
The Governance of Information Security\5.Governance, Budget, and Business\24.Business Case Development - Part Four.mp4
[aab5d27a18a48f89]
|
10,500,655 |
D7CF81B7 |
The Governance of Information Security\5.Governance, Budget, and Business\24.Business Case Development - Part Four.en.srt |
12,225 |
9B937069 |
The Governance of Information Security\4.Tools and Techniques that Support Governance\19.Governance Frameworks - Part FIve.en.srt |
9,792 |
229A9BF1 |
The Governance of Information Security\4.Tools and Techniques that Support Governance\18.Governance Frameworks - Part Four.mp4
[784d9b9a07628180]
|
9,131,126 |
CAC000B6 |
The Governance of Information Security\4.Tools and Techniques that Support Governance\20.Governance Frameworks - Part Six.en.srt |
11,129 |
AC4466B6 |
The Governance of Information Security\4.Tools and Techniques that Support Governance\19.Governance Frameworks - Part FIve.mp4
[2ebbce6eeb0f2ce3]
|
9,784,287 |
2AAB3985 |
The Governance of Information Security\4.Tools and Techniques that Support Governance\15.Governance Frameworks - Part One.mp4
[ed960b4891583b98]
|
11,128,706 |
2D59F7D8 |
The Governance of Information Security\4.Tools and Techniques that Support Governance\20.Governance Frameworks - Part Six.mp4
[f9a231f7e1aee56a]
|
13,066,299 |
E5C9F9A8 |
The Governance of Information Security\4.Tools and Techniques that Support Governance\17.Governance Frameworks - Part Three.mp4
[aa35cccbe3a2e353]
|
11,240,792 |
8DBB50CD |
The Governance of Information Security\4.Tools and Techniques that Support Governance\18.Governance Frameworks - Part Four.en.srt |
10,186 |
BD3A9E51 |
The Governance of Information Security\4.Tools and Techniques that Support Governance\17.Governance Frameworks - Part Three.en.srt |
12,863 |
85834939 |
The Governance of Information Security\4.Tools and Techniques that Support Governance\15.Governance Frameworks - Part One.en.srt |
12,543 |
AF00C373 |
The Governance of Information Security\4.Tools and Techniques that Support Governance\16.Governance Frameworks - Part Two.en.srt |
11,170 |
6E917AF2 |
The Governance of Information Security\4.Tools and Techniques that Support Governance\16.Governance Frameworks - Part Two.mp4
[bd5b7472f153ffca]
|
10,992,037 |
8CCCF663 |
The Governance of Information Security\1.Course Overview |
0 |
00000000 |
The Governance of Information Security\2.The Principles of Governance |
0 |
00000000 |
The Governance of Information Security\Exercise Files |
0 |
00000000 |
The Governance of Information Security\3.Providing Direction to the Information Security Governance Function |
0 |
00000000 |
The Governance of Information Security\6.Security Metrics and Reporting |
0 |
00000000 |
The Governance of Information Security\5.Governance, Budget, and Business |
0 |
00000000 |
The Governance of Information Security\4.Tools and Techniques that Support Governance |
0 |
00000000 |
The Governance of Information Security |
0 |
00000000 |
|
Total size: |
285,918,510 |
|