Udemy - How To Develop An Information Security Program

seeders: 8
leechers: 9
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 63
  • Language: English

Files

[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1. Introduction
    • 1. Introduction.mp4 (312.0 MB)
    • 1. Introduction.srt (64.1 KB)
    • 2. Identifying Roles by Security Controls.mp4 (44.6 MB)
    • 2. Identifying Roles by Security Controls.srt (6.1 KB)
    • 2.1 Roles by Control Matrix.xlsx (29.2 KB)
    • 3. Defining Responsibility Over Software and Applications.mp4 (51.2 MB)
    • 3. Defining Responsibility Over Software and Applications.srt (12.4 KB)
    • 3.1 Application_XRef Template.xlsx (634.7 KB)
    • 4. Identifying Your Operational Security Policies.mp4 (88.2 MB)
    • 4. Identifying Your Operational Security Policies.srt (5.1 KB)
    • 4.1 CSR Acceptable Use Policy.docx (194.6 KB)
    • 4.2 CSR Sanctions Policy.docx (192.2 KB)
    • 4.3 CSR Teleworking Policy.docx (194.1 KB)
    2. Information Security Policies
    • 1. Introduction To Your Information Security Polices.mp4 (8.7 MB)
    • 1. Introduction To Your Information Security Polices.srt (5.1 KB)
    • 1.1 CSR Information Security Policy - NIST CSF.doc (246.5 KB)
    • 2. Documenting The IDENTIFY Security Controls Policy Statements.mp4 (258.1 MB)
    • 2. Documenting The IDENTIFY Security Controls Policy Statements.srt (49.5 KB)
    • 3. Documenting The PROTECT Security Control Policy Statements.mp4 (322.0 MB)
    • 3. Documenting The PROTECT Security Control Policy Statements.srt (65.4 KB)
    • 4. Documenting The DETECT Security Controls Policy Statements.mp4 (74.8 MB)
    • 4. Documenting The DETECT Security Controls Policy Statements.srt (15.1 KB)
    • 5. Documenting The RESPOND Security Controls Policy Statements.mp4 (50.3 MB)
    • 5. Documenting The RESPOND Security Controls Policy Statements.srt (10.9 KB)
    • 6. Documenting The RECOVER Security Controls Policy Statements.mp4 (15.6 MB)
    • 6. Documenting The RECOVER Security Controls Policy Statements.srt (13.3 KB)
    3. Information Security Procedures
    • 1. Documenting Your Information Security Standard Operating Procedures.mp4 (152.5 MB)
    • 1. Documenting Your Information Security Standard Operating Procedures.srt (20.6 KB)
    • 1.1 CSR Information Security Standard Operating Procedures.doc (1.7 MB)
    • 2. Defining Your IT Security Configuration Standards & Guidelines.mp4 (182.5 MB)
    • 2. Defining Your IT Security Configuration Standards & Guidelines.srt (27.3 KB)
    • 2.1 Secure Configuration Standard v1.0.xlsx (60.6 KB)
    4. Conclusion
    • 1. Going Beyond Information Security Policies & Procedures.mp4 (151.0 MB)
    • 1. Going Beyond Information Security Policies & Procedures.srt (10.2 KB)
    • 2. It's Time For Action - Wrapping Things Up.mp4 (88.3 MB)
    • 2. It's Time For Action - Wrapping Things Up.srt (5.8 KB)
    • Bonus Resources.txt (0.3 KB)

Description

How To Develop An Information Security Program



MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 14 lectures (4h 13m) | Size: 959.2 MB
Step by Step Guide to Information Security Program Development Processes
What you'll learn:
How to establishing NIST CSF information security policies within your organization.
How to document departmental IT security procedures within your organization.
How to define standard configuration guidelines within your organization.
How to manage, monitor and maintain an information security program for your organization.

Requirements
No technical experience required, or deep IT Security experience needed.

Description
INFORMATION SECURITY PROGRAM DEVELOPMENT COURSE

INFORMATION SECURITY POLICY - PROCEDURES - IT STANDARD CONFIGURATION GUIDELINES



Download torrent
1.8 GB
seeders:8
leechers:9
Udemy - How To Develop An Information Security Program


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
1.8 GB
seeders:8
leechers:9
Udemy - How To Develop An Information Security Program


Torrent hash: 336F66098D3A2456458C2FABA38538744ACEDA75