Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
0001.Course Overview.mp4 |
6.44MB |
0101.Introduction.mp4 |
8.93MB |
0201.Introduction.mp4 |
3.18MB |
0202.Security and Risk Management Fundamentals.mp4 |
8.16MB |
0203.Balancing Business and Security.mp4 |
3.16MB |
0204.The CIA Triad.mp4 |
15.49MB |
0205.Accountability and Assurance.mp4 |
8.82MB |
0206.Control Types.mp4 |
2.97MB |
0207.Delaying, Preventing, or Detecting Attacks.mp4 |
7.14MB |
0208.Due Care and Due Diligence.mp4 |
3.45MB |
0209.Ethics.mp4 |
4.68MB |
0210.Conclusion.mp4 |
1.25MB |
0301.Introduction.mp4 |
1.61MB |
0302.Legal Systems.mp4 |
975.66KB |
0303.Criminal and Civil Law.mp4 |
3.66MB |
0304.Administrative Law.mp4 |
3.43MB |
0305.Important Laws.mp4 |
11.75MB |
0306.Summary.mp4 |
625.65KB |
0401.Introduction.mp4 |
1.29MB |
0402.Computers Can Be Used for EVIL.mp4 |
5.44MB |
0403.Some Hack Just Because They Can.mp4 |
2.91MB |
0404.It's All About the Money.mp4 |
3.99MB |
0405.Spies Are Real.mp4 |
5.01MB |
0406.Payback and Government Hackers.mp4 |
5.49MB |
0407.Theft, Vandalism, and Trespass.mp4 |
2.77MB |
0408.Fraud, Spam, and Slander.mp4 |
4.53MB |
0409.Conclusion.mp4 |
2.63MB |
0501.Introduction.mp4 |
1.11MB |
0502.Patents.mp4 |
3.57MB |
0503.Trademarks and Trade Secrets.mp4 |
2.28MB |
0504.Copyrights.mp4 |
2.67MB |
0505.Summary.mp4 |
632.19KB |
0601.Introduction.mp4 |
1.71MB |
0602.Privacy Matters.mp4 |
8.09MB |
0603.Privacy Law Examples.mp4 |
14.59MB |
0604.Conclusion.mp4 |
1.63MB |
0701.Introduction.mp4 |
1.11MB |
0702.Reasons for Licensing.mp4 |
3.17MB |
0703.License Types.mp4 |
495.75KB |
0704.Open Versus Closed Source Licensing.mp4 |
4.01MB |
0705.Commercial Versus Non-commercial Licensing.mp4 |
4.72MB |
0706.End User License Agreements.mp4 |
1.05MB |
0707.Free Software.mp4 |
4.58MB |
0708.Demo and Trial Licenses.mp4 |
1.73MB |
0709.Shareware.mp4 |
1.77MB |
0710.Academic Software Licensing.mp4 |
1.25MB |
0711.Summary.mp4 |
1.17MB |
0801.Introduction.mp4 |
1.38MB |
0802.Trans-border Data Flow.mp4 |
8.17MB |
0803.Import and Export Controls.mp4 |
4.75MB |
0804.Summary.mp4 |
1.79MB |
0901.Introduction.mp4 |
1.69MB |
0902.Develop a Culture of Security Awareness.mp4 |
8.63MB |
0903.Types of Security Awareness.mp4 |
5.05MB |
0904.Expected Impact of Training.mp4 |
3.95MB |
0905.Awareness Validation.mp4 |
8.07MB |
0906.Summary.mp4 |
1.31MB |
1001.Introduction.mp4 |
1.83MB |
1002.Governance.mp4 |
1.00MB |
1003.Roles and Responsibilities.mp4 |
11.33MB |
1004.Organizational Objectives.mp4 |
2.81MB |
1005.Security Goals.mp4 |
5.86MB |
1006.Security Mission.mp4 |
2.36MB |
1007.Conclusion.mp4 |
1.30MB |
1101.Introduction.mp4 |
1.92MB |
1102.Security Frameworks Introduction.mp4 |
7.59MB |
1103.Effective Policies and Procedures.mp4 |
7.51MB |
1104.Policy Sections.mp4 |
5.34MB |
1105.Procedures.mp4 |
4.86MB |
1106.Guidelines.mp4 |
1.89MB |
1107.Baselines.mp4 |
3.82MB |
1108.Summary.mp4 |
2.35MB |
1201.Introduction.mp4 |
1.86MB |
1202.Business Continuity Process.mp4 |
1.73MB |
1203.Conducting a Business Impact Analysis.mp4 |
1.76MB |
1204.Disaster Recovery Planning vs. Business Continuity Planning.mp4 |
2.82MB |
1205.Testing Your Plans.mp4 |
2.51MB |
1206.Disaster Events.mp4 |
958.23KB |
1207.Recovering from Disaster.mp4 |
1.40MB |
1208.Disaster Recovery Controls.mp4 |
3.55MB |
1209.Conclusion.mp4 |
631.93KB |
1301.Introduction.mp4 |
1.92MB |
1302.Threat Modeling Overview.mp4 |
3.69MB |
1303.Threat Modeling Focus.mp4 |
4.62MB |
1304.Threat Model - Scoping.mp4 |
3.31MB |
1305.Reviewing the Architecture.mp4 |
1.87MB |
1306.Decomposing.mp4 |
1.55MB |
1307.Threat Identification using STRIDE.mp4 |
4.90MB |
1308.Defining and Documenting Countermeasures.mp4 |
1.77MB |
1309.Prioritization with DREAD.mp4 |
1.05MB |
1310.Summary.mp4 |
1.65MB |
1401.Introduction.mp4 |
2.04MB |
1402.Threats.mp4 |
2.64MB |
1403.Threat Source.mp4 |
2.79MB |
1404.Vulnerabilities.mp4 |
2.02MB |
1405.Risk.mp4 |
754.30KB |
1406.Risk Assessments.mp4 |
2.77MB |
1407.Risk Assessment Methodologies.mp4 |
2.58MB |
1408.Real World Threats and Vulnerabilities.mp4 |
3.35MB |
1409.Assessment Approach.mp4 |
870.48KB |
1410.Analysis Approach.mp4 |
1.01MB |
1411.Risk Acceptance and Assignment.mp4 |
3.24MB |
1412.Common Calculations.mp4 |
1.52MB |
1413.Conclusion.mp4 |
1.06MB |
1501.Introduction.mp4 |
1.96MB |
1502.What Is a Countermeasure.mp4 |
2.04MB |
1503.Control Variations.mp4 |
1.99MB |
1504.Control Types.mp4 |
2.43MB |
1505.Control Considerations.mp4 |
2.90MB |
1506.Assessing Control Strength.mp4 |
3.30MB |
1507.Countermeasure Assurance.mp4 |
1.15MB |
1508.Example Countermeasures.mp4 |
5.75MB |
1509.Conclusion.mp4 |
1.20MB |
1601.Introduction.mp4 |
2.57MB |
1602.Risk Management Framework.mp4 |
1.16MB |
1603.Leveraging Frameworks.mp4 |
1.95MB |
1604.NIST Risk Management Framework RMF.mp4 |
8.64MB |
1605.FAIR.mp4 |
4.12MB |
1606.OCTAVE Allegro.mp4 |
3.06MB |
1607.Summary.mp4 |
897.41KB |
cissp-security-risk-management.zip |
21.20MB |