BITCQ

coursera-designing-and-executing-information-security-strategies

Size: 960.6 MB
Magnet link

Name Size
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1.html 50 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/204.js 6 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/400.js 8 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/abUtils.js 2 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/assessApi.js 453 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/catalogApi.js 454 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/course.css 166 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/flexjoinLastChanceModal.html.js 3 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/form-core.js 14 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/ga.js 42 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/government_id.jpg 24 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/header(1).js 89 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/header.html.js 28 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/header.js 2 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/hg.css 29 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/LearnerStoriesCollection.js 518 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/LearnerStoryModel.js 181 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/logo 53 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/MathJax.js 49 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/modernizr-custom.js 9 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/path.js 226 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/readme.js 5 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/require.v2-1-1.js 22 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/ribbon_stripes.png 6 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/routes.js 1 MB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/shim.css 14 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/sidebar(1).js 89 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/sidebar.html.js 9 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/sidebar.js 4 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/signature_track.js 5 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/signatureTrackLastChanceModal.html.js 4 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/spark.main.css 277 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/university_logo 3 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_1_files/webcam_keyboard.jpg 20 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2.html 52 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/204.js 6 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/400.js 8 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/abUtils.js 2 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/assessApi.js 453 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/catalogApi.js 454 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/course.css 166 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/flexjoinLastChanceModal.html.js 3 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/form-core.js 14 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/ga.js 42 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/government_id.jpg 24 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/header(1).js 89 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/header.html.js 28 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/header.js 2 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/hg.css 29 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/LearnerStoriesCollection.js 518 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/LearnerStoryModel.js 181 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/logo 53 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/MathJax.js 49 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/modernizr-custom.js 9 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/path.js 226 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/readme.js 5 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/require.v2-1-1.js 22 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/ribbon_stripes.png 6 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/routes.js 1 MB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/shim.css 14 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/sidebar(1).js 89 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/sidebar.html.js 9 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/sidebar.js 4 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/signature_track.js 5 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/signatureTrackLastChanceModal.html.js 4 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/spark.main.css 277 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/university_logo 3 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_2_files/webcam_keyboard.jpg 20 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3.html 56 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/204.js 6 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/400.js 8 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/abUtils.js 2 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/assessApi.js 453 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/catalogApi.js 454 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/course.css 166 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/flexjoinLastChanceModal.html.js 3 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/form-core.js 14 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/ga.js 42 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/government_id.jpg 24 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/header(1).js 89 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/header.html.js 28 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/header.js 2 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/hg.css 29 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/LearnerStoriesCollection.js 518 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/LearnerStoryModel.js 181 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/logo 53 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/MathJax.js 49 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/modernizr-custom.js 9 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/path.js 226 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/readme.js 5 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/require.v2-1-1.js 22 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/ribbon_stripes.png 6 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/routes.js 1 MB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/shim.css 14 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/sidebar(1).js 89 B
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/sidebar.html.js 9 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/sidebar.js 4 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/signature_track.js 5 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/signatureTrackLastChanceModal.html.js 4 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/spark.main.css 277 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/university_logo 3 KB
coursera-designing-and-executing-information-security-strategies/assignments/assignment_3_files/webcam_keyboard.jpg 20 KB
coursera-designing-and-executing-information-security-strategies/lectures/week1/Designing and Executing Information Security Strategies 0.0 Part 1 - Course Overview (544).mp4 8.3 MB
coursera-designing-and-executing-information-security-strategies/lectures/week1/Designing and Executing Information Security Strategies 0.1 Part 2 - HackMeCo Basics (1623).mp4 23.4 MB
coursera-designing-and-executing-information-security-strategies/lectures/week1/Designing and Executing Information Security Strategies 0.2 Part 3 - Case 1 Background Part 1 of 2 (1655).mp4 24.2 MB
coursera-designing-and-executing-information-security-strategies/lectures/week1/Designing and Executing Information Security Strategies 0.3 Part 4 - Case 1 Background Part 2 of 2 (1241).mp4 19 MB
coursera-designing-and-executing-information-security-strategies/lectures/week1/Designing and Executing Information Security Strategies 0.4 Part 5 - Controls Review (914).mp4 13.8 MB
coursera-designing-and-executing-information-security-strategies/lectures/week1/Designing and Executing Information Security Strategies 0.5 Part 6 - Case 1 (1108).mp4 17 MB
coursera-designing-and-executing-information-security-strategies/lectures/week10/Designing and Executing Information Security Strategies 9.0 Part 1 - Sources and Uses for Threat Information (705).mp4 9.8 MB
coursera-designing-and-executing-information-security-strategies/lectures/week10/Designing and Executing Information Security Strategies 9.1 Part 2 - Sources of Threats Part 1 of 3 (935).mp4 13.6 MB
coursera-designing-and-executing-information-security-strategies/lectures/week10/Designing and Executing Information Security Strategies 9.2 Part 3 - Sources of Threats Part 2 of 3 (958).mp4 13.9 MB
coursera-designing-and-executing-information-security-strategies/lectures/week10/Designing and Executing Information Security Strategies 9.3 Part 4 - Sources of Threats Part 3 of 3 (815).mp4 11.3 MB
coursera-designing-and-executing-information-security-strategies/lectures/week10/Designing and Executing Information Security Strategies 9.4 Part 5 - Why What and Who (756).mp4 10.9 MB
coursera-designing-and-executing-information-security-strategies/lectures/week10/Designing and Executing Information Security Strategies 9.5 Part 6 - What to do With What You Find (758).mp4 11.1 MB
coursera-designing-and-executing-information-security-strategies/lectures/week10/Designing and Executing Information Security Strategies 9.6 Bonus Lecture Part 1 of 2 (1232).mp4 49.8 MB
coursera-designing-and-executing-information-security-strategies/lectures/week10/Designing and Executing Information Security Strategies 9.7 Bonus Lecture Part 2 of 2 (1233).mp4 53.7 MB
coursera-designing-and-executing-information-security-strategies/lectures/week2/Designing and Executing Information Security Strategies 1.0 Part 1 - Week 1 Review (617).mp4 9.3 MB
coursera-designing-and-executing-information-security-strategies/lectures/week2/Designing and Executing Information Security Strategies 1.1 Part 2 - Incident Response Part 1 of 2 (1408).mp4 20.2 MB
coursera-designing-and-executing-information-security-strategies/lectures/week2/Designing and Executing Information Security Strategies 1.2 Part 3 - Incident Response Part 2 of 2 (1401).mp4 20.1 MB
coursera-designing-and-executing-information-security-strategies/lectures/week2/Designing and Executing Information Security Strategies 1.3 Part 4 - My Monday Part 1 of 2 (1528).mp4 22.4 MB
coursera-designing-and-executing-information-security-strategies/lectures/week2/Designing and Executing Information Security Strategies 1.4 Part 5 - My Monday Part 2 of 2 (1508).mp4 22.1 MB
coursera-designing-and-executing-information-security-strategies/lectures/week3/Designing and Executing Information Security Strategies 2.0 Part 1 - Compliance (1438).mp4 21 MB
coursera-designing-and-executing-information-security-strategies/lectures/week3/Designing and Executing Information Security Strategies 2.1 Part 2 - Penalties (828).mp4 12.3 MB
coursera-designing-and-executing-information-security-strategies/lectures/week3/Designing and Executing Information Security Strategies 2.2 Part 3 - Complicated Landscape (607).mp4 9.1 MB
coursera-designing-and-executing-information-security-strategies/lectures/week3/Designing and Executing Information Security Strategies 2.3 Part 4 - Compliance (1109).mp4 16.1 MB
coursera-designing-and-executing-information-security-strategies/lectures/week3/Designing and Executing Information Security Strategies 2.4 Part 5 - Your Case (711).mp4 10.8 MB
coursera-designing-and-executing-information-security-strategies/lectures/week4/Designing and Executing Information Security Strategies 3.0 Part 1 - Approach to Lesson 3 (328).mp4 5 MB
coursera-designing-and-executing-information-security-strategies/lectures/week4/Designing and Executing Information Security Strategies 3.1 Part 2 - Organizational Risk (1100).mp4 15.8 MB
coursera-designing-and-executing-information-security-strategies/lectures/week4/Designing and Executing Information Security Strategies 3.2 Part 3 - Context - Who is Right (846).mp4 13.2 MB
coursera-designing-and-executing-information-security-strategies/lectures/week4/Designing and Executing Information Security Strategies 3.3 Part 4 - Mini Assignment (144).mp4 2.6 MB
coursera-designing-and-executing-information-security-strategies/lectures/week4/Designing and Executing Information Security Strategies 3.4 Part 5 - Information Assurance and Progress (757).mp4 12.2 MB
coursera-designing-and-executing-information-security-strategies/lectures/week4/Designing and Executing Information Security Strategies 3.5 Part 6 - Enabling Information Assurance (1113).mp4 16.7 MB
coursera-designing-and-executing-information-security-strategies/lectures/week5/Designing and Executing Information Security Strategies 4.0 Part 1 - Your Case (548).mp4 8.8 MB
coursera-designing-and-executing-information-security-strategies/lectures/week5/Designing and Executing Information Security Strategies 4.1 Part 2 - Week 4 Review (1054).mp4 15.4 MB
coursera-designing-and-executing-information-security-strategies/lectures/week5/Designing and Executing Information Security Strategies 4.2 Part 3 - Liability Scenarios Part 1 of 3 (1221).mp4 17.8 MB
coursera-designing-and-executing-information-security-strategies/lectures/week5/Designing and Executing Information Security Strategies 4.3 Part 4 - Liability Scenarios Part 2 of 3 (1110).mp4 16 MB
coursera-designing-and-executing-information-security-strategies/lectures/week5/Designing and Executing Information Security Strategies 4.4 Part 5 - Liability Scenarios Part 3 of 3 (1413).mp4 20.9 MB
coursera-designing-and-executing-information-security-strategies/lectures/week5/Designing and Executing Information Security Strategies 4.5 Part 6 - Glitter.com (1042).mp4 15.4 MB
coursera-designing-and-executing-information-security-strategies/lectures/week6/Designing and Executing Information Security Strategies 5.0 Part 1 - Water and Rats (721).mp4 10.4 MB
coursera-designing-and-executing-information-security-strategies/lectures/week6/Designing and Executing Information Security Strategies 5.1 Part 2 - Go Native (407).mp4 5.7 MB
coursera-designing-and-executing-information-security-strategies/lectures/week6/Designing and Executing Information Security Strategies 5.2 Part 3 - The CISO Part 1 of 2 (930).mp4 13.4 MB
coursera-designing-and-executing-information-security-strategies/lectures/week6/Designing and Executing Information Security Strategies 5.3 Part 4 - The CISO Part 2 of 2 (915).mp4 13.1 MB
coursera-designing-and-executing-information-security-strategies/lectures/week6/Designing and Executing Information Security Strategies 5.4 Part 5 - How Not To (1505).mp4 22 MB
coursera-designing-and-executing-information-security-strategies/lectures/week6/Designing and Executing Information Security Strategies 5.5 Part 6 - Understanding Differences - Working with Them (1444).mp4 20.9 MB
coursera-designing-and-executing-information-security-strategies/lectures/week7/Designing and Executing Information Security Strategies 6.0 Part 1 - The Cloud Risks (437).mp4 6.4 MB
coursera-designing-and-executing-information-security-strategies/lectures/week7/Designing and Executing Information Security Strategies 6.1 Part 2 - System Characterization Inputs (1101).mp4 15.4 MB
coursera-designing-and-executing-information-security-strategies/lectures/week7/Designing and Executing Information Security Strategies 6.2 Part 3 - System Characterization Outputs (853).mp4 12.5 MB
coursera-designing-and-executing-information-security-strategies/lectures/week7/Designing and Executing Information Security Strategies 6.3 Part 4 - Sensitivity Levels (640).mp4 9.6 MB
coursera-designing-and-executing-information-security-strategies/lectures/week7/Designing and Executing Information Security Strategies 6.4 Part 5 - Threat Identification (801).mp4 11.4 MB
coursera-designing-and-executing-information-security-strategies/lectures/week7/Designing and Executing Information Security Strategies 6.5 Part 6 - Vulnerability Identification (637).mp4 9.7 MB
coursera-designing-and-executing-information-security-strategies/lectures/week7/Designing and Executing Information Security Strategies 6.6 Part 7 - Control Analysis (1117).mp4 15.7 MB
coursera-designing-and-executing-information-security-strategies/lectures/week7/Designing and Executing Information Security Strategies 6.7 Part 8 - Compare the Cloud (647).mp4 9.7 MB
coursera-designing-and-executing-information-security-strategies/lectures/week8/Designing and Executing Information Security Strategies 7.0 Part 1 - Budget Decisions (1019).mp4 14.6 MB
coursera-designing-and-executing-information-security-strategies/lectures/week8/Designing and Executing Information Security Strategies 7.1 Part 2 - Heartland Example (1123).mp4 16.3 MB
coursera-designing-and-executing-information-security-strategies/lectures/week8/Designing and Executing Information Security Strategies 7.2 Part 3 - Accounting vs. Economics (825).mp4 12.2 MB
coursera-designing-and-executing-information-security-strategies/lectures/week8/Designing and Executing Information Security Strategies 7.3 Part 4 - Financial Justification (1215).mp4 18 MB
coursera-designing-and-executing-information-security-strategies/lectures/week8/Designing and Executing Information Security Strategies 7.4 Part 5 - Finance and Real Numbers (1311).mp4 19.1 MB
coursera-designing-and-executing-information-security-strategies/lectures/week8/Designing and Executing Information Security Strategies 7.5 Part 6 - TJ Maxx (607).mp4 8.7 MB
coursera-designing-and-executing-information-security-strategies/lectures/week9/Designing and Executing Information Security Strategies 8.0 Part 1 - Privacy and Security Introduction (851).mp4 12.6 MB
coursera-designing-and-executing-information-security-strategies/lectures/week9/Designing and Executing Information Security Strategies 8.1 Part 2 - Private Information (1022).mp4 14.7 MB
coursera-designing-and-executing-information-security-strategies/lectures/week9/Designing and Executing Information Security Strategies 8.2 Part 3 - History of Privacy (858).mp4 12.8 MB
coursera-designing-and-executing-information-security-strategies/lectures/week9/Designing and Executing Information Security Strategies 8.3 Part 4 - Scientific Methods Data (809).mp4 11.7 MB
coursera-designing-and-executing-information-security-strategies/lectures/week9/Designing and Executing Information Security Strategies 8.4 Part 5 - Examples (1043).mp4 15.4 MB
coursera-designing-and-executing-information-security-strategies/lectures/week9/Designing and Executing Information Security Strategies 8.5 Part 6 - Privacy Value and Concerns (1421).mp4 20.8 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce

Loading...