|  

Udemy - Selection and Implementation of Cybersecurity Risks Controls



Size :1.9 GB
Peers : Seeders : 0      Leechers : 0
Added : 11 months ago » by freecoursewb » in Other
Language : English
Last Updated :8 months ago
Info_Hash :9ECDC328C2970B539CF63570188BB86FE71EA634

Torrent File Contents

Udemy - Selection and Implementation of Cybersecurity Risks Controls
  Get Bonus Downloads Here.url
  -  182 Bytes

  ~Get Your Files Here !/1. Introduction/1. Introduction.mp4
  -  25.4 MB

  ~Get Your Files Here !/1. Introduction/10. 9-Key considerations for the identification- selection & implementation of contr.mp4
  -  97.07 MB

  ~Get Your Files Here !/1. Introduction/11. 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis.mp4
  -  77.36 MB

  ~Get Your Files Here !/1. Introduction/12. 11-Cost Benefit Analysis associated with controls selection.mp4
  -  55.64 MB

  ~Get Your Files Here !/1. Introduction/13. 12- Technology integration, operational impact, continuous monitoring, employee.mp4
  -  50.34 MB

  ~Get Your Files Here !/1. Introduction/14. 13-Regulatory Compliance, Incident Response Planning.mp4
  -  51.42 MB

  ~Get Your Files Here !/1. Introduction/2. 1b-Course Intro- The Case at hand.mp4
  -  19.78 MB

  ~Get Your Files Here !/1. Introduction/3. 2-About the course.mp4
  -  26.82 MB

  ~Get Your Files Here !/1. Introduction/4. 3-Meet your Instructor-Mentor.mp4
  -  40.11 MB

  ~Get Your Files Here !/1. Introduction/5. 4-Course Roadmap.mp4
  -  32.14 MB

  ~Get Your Files Here !/1. Introduction/6. 5-Approach to Control Selection_ pt1.mp4
  -  23.36 MB

  ~Get Your Files Here !/1. Introduction/7. 6-Approach to Control Selection_ pt2.mp4
  -  89.71 MB

  ~Get Your Files Here !/1. Introduction/8. 7-Applying same approach to real Data Breaches at a high-level.mp4
  -  46.38 MB

  ~Get Your Files Here !/1. Introduction/9. 8-Introduction to security controls.mp4
  -  73.83 MB

  ~Get Your Files Here !/2. SECTION-2/1. 14-High-level process of selecting controls to protect ecommerce web server-Pt1.mp4
  -  51.94 MB

  ~Get Your Files Here !/2. SECTION-2/10. 21-Challenges, & considerations associated with implementing frameworks-pt1.mp4
  -  42.05 MB

  ~Get Your Files Here !/2. SECTION-2/11. 21-Challenges, & considerations associated with implementing frameworks-pt2.mp4
  -  79.02 MB

  ~Get Your Files Here !/2. SECTION-2/12. 22-When to use frameworks for the selection and implementation of controls.mp4
  -  29.15 MB

  ~Get Your Files Here !/2. SECTION-2/13. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT1.mp4
  -  60 MB

  ~Get Your Files Here !/2. SECTION-2/14. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT2.mp4
  -  116.74 MB

  ~Get Your Files Here !/2. SECTION-2/15. 24-Implementation Plan for selected controls.mp4
  -  83.04 MB

  ~Get Your Files Here !/2. SECTION-2/16. 25- Measuring the effectiveness of implemented controls.mp4
  -  111.96 MB

  ~Get Your Files Here !/2. SECTION-2/17. Putting it all together-The Selection and Implementation of Cyber Risks controls.mp4
  -  110.37 MB

  ~Get Your Files Here !/2. SECTION-2/18. 27-Course Recap-END.mp4
  -  27.96 MB

  ~Get Your Files Here !/2. SECTION-2/2. 14-High-level process of selecting controls to protect ecommerce web server-Pt2.mp4
  -  7.56 MB

  ~Get Your Files Here !/2. SECTION-2/3. 15-Steps involved in assessing the identified cyber risks in web server.mp4
  -  52.5 MB

  ~Get Your Files Here !/2. SECTION-2/4. 16-Identify assets, identify threats, identify vulnerabilities.mp4
  -  42.69 MB

  ~Get Your Files Here !/2. SECTION-2/5. 17-Determine likelihood, Impact, Calculate risk.mp4
  -  69.07 MB

  ~Get Your Files Here !/2. SECTION-2/6. 18- Documenting Cybersecurity Risk Assessment Report-Pt1.mp4
  -  48.1 MB

  ~Get Your Files Here !/2. SECTION-2/7. 18-Documenting Cybersecurity Risk Assessment Report-Pt2.mp4
  -  71.97 MB

  ~Get Your Files Here !/2. SECTION-2/8. 19- The role of governance in the effective selection and implementation of cybe.mp4
  -  136.3 MB

  ~Get Your Files Here !/2. SECTION-2/9. 20-Why not implement frameworks that already have recommended controls.mp4
  -  86.1 MB

  ~Get Your Files Here !/3. Assignment- To reinforce knowledge gained/1. Research Exercise-CIS Controls.html
  -  175 Bytes

  ~Get Your Files Here !/4. Course Resources/1. Course Resources.html
  -  1.16 KB

  ~Get Your Files Here !/Bonus Resources.txt
  -  386 Bytes



Torrent Description

Selection and Implementation of Cybersecurity Risks Controls

https://DevCourseWeb.com

Published 11/2023
Created by Richea Perry
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 33 Lectures ( 3h 6m ) | Size: 1.88 GB

Selection and Implementation of Cybersecurity Risks Controls

What you'll learn
Student will learn how to holistically apply a 360 degree approach to the selection and implementation of security risks control measures
Key considerations for the identification, selection & implementation of security controls
High-level process of selecting controls to protect\ address idenitfied security risks on ecommerce web server
The role of governance in the effective selection and implementation of cybersecurity controls
Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF)

Requirements
Basic to advance understanding of information security principles.