Udemy - Data Security strategy for organizations

seeders: 8
leechers: 5
updated:

Download Fast Safe Anonymous
movies, software, shows...

Files

[ DevCourseWeb.com ] Udemy - Data Security strategy for organizations
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1. Introduction
    • 1. Introduction.mp4 (8.1 MB)
    • 1. Introduction.srt (2.1 KB)
    • 1.1 Data Security Presentation Slides .pdf (2.0 MB)
    • 10. Section 1 - Quiz.html (0.2 KB)
    • 2. What is Digital Information.mp4 (9.9 MB)
    • 2. What is Digital Information.srt (3.2 KB)
    • 3. Sensitive Data Types.mp4 (8.2 MB)
    • 3. Sensitive Data Types.srt (2.4 KB)
    • 4. What are Sensitive Identifiable Information.mp4 (8.6 MB)
    • 4. What are Sensitive Identifiable Information.srt (2.6 KB)
    • 5. Non-Public and Financial Information.mp4 (4.6 MB)
    • 5. Non-Public and Financial Information.srt (2.0 KB)
    • 6. Intellectual Property.mp4 (21.5 MB)
    • 6. Intellectual Property.srt (4.1 KB)
    • 7. Structured vs Unstructured Data.mp4 (5.9 MB)
    • 7. Structured vs Unstructured Data.srt (1.5 KB)
    • 8. Data Classification.mp4 (26.6 MB)
    • 8. Data Classification.srt (7.2 KB)
    • 9. Data Lifecycle Management.mp4 (19.6 MB)
    • 9. Data Lifecycle Management.srt (6.9 KB)
    2. Law and Industry Regulations
    • 1. Section Intro - Laws and Regulations.mp4 (7.2 MB)
    • 1. Section Intro - Laws and Regulations.srt (2.5 KB)
    • 2. PCI DSS (Payment Card Industry Data Security Standard).mp4 (20.8 MB)
    • 2. PCI DSS (Payment Card Industry Data Security Standard).srt (5.6 KB)
    • 3. HIPAA (Health Insurance Portability and Accountability Act).mp4 (27.4 MB)
    • 3. HIPAA (Health Insurance Portability and Accountability Act).srt (7.3 KB)
    • 4. GDPR (General Data Protection Regulation).mp4 (17.7 MB)
    • 4. GDPR (General Data Protection Regulation).srt (6.5 KB)
    • 5. SOX (Sarbanes–Oxley Act).mp4 (15.0 MB)
    • 5. SOX (Sarbanes–Oxley Act).srt (6.1 KB)
    • 6. ISO 27001.mp4 (41.6 MB)
    • 6. ISO 27001.srt (10.8 KB)
    • 7. Local legislations.mp4 (9.9 MB)
    • 7. Local legislations.srt (3.6 KB)
    • 8. Section 2 - Quiz.html (0.2 KB)
    3. Data Governance and Management
    • 1. Section Intro - What is Security governance.mp4 (5.1 MB)
    • 1. Section Intro - What is Security governance.srt (1.5 KB)
    • 10. Risk Assessment.mp4 (33.8 MB)
    • 10. Risk Assessment.srt (10.5 KB)
    • 11. Risk Response.mp4 (43.8 MB)
    • 11. Risk Response.srt (12.2 KB)
    • 12. Risk Monitoring.mp4 (4.4 MB)
    • 12. Risk Monitoring.srt (1.5 KB)
    • 13. Third Party Risks.mp4 (31.0 MB)
    • 13. Third Party Risks.srt (8.4 KB)
    • 14. Security Awareness Training.mp4 (9.8 MB)
    • 14. Security Awareness Training.srt (4.9 KB)
    • 15. Security Metrics and Improvements.mp4 (12.6 MB)
    • 15. Security Metrics and Improvements.srt (5.0 KB)
    • 16. Section 3 - Quiz.html (0.2 KB)
    • 2. Security governance components.mp4 (10.8 MB)
    • 2. Security governance components.srt (4.2 KB)
    • 3. Security policy framework.mp4 (37.8 MB)
    • 3. Security policy framework.srt (10.9 KB)
    • 4. Roles and responsibilities.mp4 (9.6 MB)
    • 4. Roles and responsibilities.srt (3.6 KB)
    • 5. Security Risk Management.mp4 (12.0 MB)
    • 5. Security Risk Management.srt (3.9 KB)
    • 6. What are Threats and Vulnerabilities.mp4 (16.5 MB)
    • 6. What are Threats and Vulnerabilities.srt (4.5 KB)
    • 7. How security risks are calculated.mp4 (21.7 MB)
    • 7. How security risks are calculated.srt (8.5 KB)
    • 8. Risk Management Framework.mp4 (9.4 MB)
    • 8. Risk Management Framework.srt (3.7 KB)
    • 9. Risk Identification.mp4 (5.9 MB)
    • 9. Risk Identification.srt (1.6 KB)
    4. Data Monitoring and Incident Response
    • 1. Section Intro.mp4 (1.5 MB)
    • 1. Section Intro.srt (0.7 KB)
    • 10. Incident Response Panning - Identification phase.mp4 (37.0 MB)
    • 10. Incident Response Panning - Identification phase.srt (12.8 KB)
    • 11. Incident Response Panning - Containment phase.mp4 (14.8 MB)
    • 11. Incident Response Panning - Containment phase.srt (6.6 KB)
    • 12. Incident Response Panning - Remediation phase.mp4 (10.9 MB)
    • 12. Incident Response Panning - Remediation phase.srt (4.6 KB)
    • 13. Incident Response Panning - Recovery phase.mp4 (17.1 MB)
    • 13. Incident Response Panning - Recovery phase.srt (6.7 KB)
    • 14. Incident Response Panning - Lessons Learned phase.mp4 (15.5 MB)
    • 14. Incident Response Panning - Lessons Learned phase.srt (6.2 KB)
    • 15. Incident Response Panning - Table Top Exercises.mp4 (10.4 MB)
    • 15. Incident Response Panning - Table Top Exercises.srt (3.5 KB)
    • 16. Data Breach Notification.mp4 (34.5 MB)
    • 16. Data Breach Notification.srt (10.1 KB)
    • 17. Section 4 - Quiz.html (0.2 KB)
    • 2. Asset Management.mp4 (17.5 MB)
    • 2. Asset Management.srt (6.1 KB)
    • 3. Example of an Asset Management Tool.mp4 (65.6 MB)
    • 3. Example of an Asset Management Tool.srt (15.5 KB)
    • 4. Structured vs Unstructured data access management and monitoring.mp4 (36.3 MB)
    • 4. Structured vs Unstructured data access management and monitoring.srt (8.9 KB)
    • 5. Access Monitoring Solutions.mp4 (7.0 MB)
    • 5. Access Monitoring Solutions.srt (2.3 KB)
    • 6. File Access Monitoring Tool Demonstration.mp4 (61.6 MB)
    • 6. File Access Monitoring Tool Demonstration.srt (15.0 KB)
    • 7. Data Breach and Incident Response.mp4 (14.0 MB)
    • 7. Data Breach and Incident Response.srt (3.3 KB)
    • 8. Incident Response Team and Process.mp4 (16.0 MB)
    • 8. Incident Response Team and Process.srt (4.8 KB)
    • 9. Incident Response Panning - Preparation phase.mp4 (44.2 MB)
    • 9. Incident Response Panning - Preparation phase.srt (15.2 KB)
    5. Data Security Technical Controls
    • 1. Section Intro.mp4 (1.4 MB)
    • 1. Section Intro.srt (0.8 KB)
    • 10. Office 365 Data Classification Portal.mp4 (25.7 MB)
    • 10. Office 365 Data Classification Portal.srt (4.6 KB)
    • 1

Description

Data Security strategy for organizations



https://DevCourseWeb.com

Updated 04/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 61 lectures (4h 53m) | Size: 1.28 GB

Learn about Data Security requirements and strategy for enterprise organizations

What you'll learn
Data Security Strategy Development
Data Types, Classification, Lifecycle management
Data regulatory requirements
Data Governance and Management
Data Monitoring and Incident Response
Data Security Technical Controls

Requirements
No specific requirements.



Download torrent
1.2 GB
seeders:8
leechers:5
Udemy - Data Security strategy for organizations


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
1.2 GB
seeders:8
leechers:5
Udemy - Data Security strategy for organizations


Torrent hash: 34C136B3BC0E017FDAF97FADEC5EF113156EB5DF