[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/Get Bonus Downloads Here.url |
183 B |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/1. Introduction/1. Introduction.mp4 |
312 MB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/1. Introduction/1. Introduction.srt |
64 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/1. Introduction/2. Identifying Roles by Security Controls.mp4 |
44.6 MB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/1. Introduction/2. Identifying Roles by Security Controls.srt |
6 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/1. Introduction/2.1 Roles by Control Matrix.xlsx |
29 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/1. Introduction/3. Defining Responsibility Over Software and Applications.mp4 |
51.2 MB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/1. Introduction/3. Defining Responsibility Over Software and Applications.srt |
12 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/1. Introduction/3.1 Application_XRef Template.xlsx |
635 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/1. Introduction/4. Identifying Your Operational Security Policies.mp4 |
88.2 MB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/1. Introduction/4. Identifying Your Operational Security Policies.srt |
5 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/1. Introduction/4.1 CSR Acceptable Use Policy.docx |
195 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/1. Introduction/4.2 CSR Sanctions Policy.docx |
192 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/1. Introduction/4.3 CSR Teleworking Policy.docx |
194 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/2. Information Security Policies/1. Introduction To Your Information Security Polices.mp4 |
8.7 MB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/2. Information Security Policies/1. Introduction To Your Information Security Polices.srt |
5 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/2. Information Security Policies/1.1 CSR Information Security Policy - NIST CSF.doc |
247 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/2. Information Security Policies/2. Documenting The IDENTIFY Security Controls Policy Statements.mp4 |
258.1 MB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/2. Information Security Policies/2. Documenting The IDENTIFY Security Controls Policy Statements.srt |
50 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/2. Information Security Policies/3. Documenting The PROTECT Security Control Policy Statements.mp4 |
322 MB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/2. Information Security Policies/3. Documenting The PROTECT Security Control Policy Statements.srt |
65 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/2. Information Security Policies/4. Documenting The DETECT Security Controls Policy Statements.mp4 |
74.8 MB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/2. Information Security Policies/4. Documenting The DETECT Security Controls Policy Statements.srt |
15 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/2. Information Security Policies/5. Documenting The RESPOND Security Controls Policy Statements.mp4 |
50.3 MB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/2. Information Security Policies/5. Documenting The RESPOND Security Controls Policy Statements.srt |
11 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/2. Information Security Policies/6. Documenting The RECOVER Security Controls Policy Statements.mp4 |
15.6 MB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/2. Information Security Policies/6. Documenting The RECOVER Security Controls Policy Statements.srt |
13 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/3. Information Security Procedures/1. Documenting Your Information Security Standard Operating Procedures.mp4 |
152.5 MB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/3. Information Security Procedures/1. Documenting Your Information Security Standard Operating Procedures.srt |
21 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/3. Information Security Procedures/1.1 CSR Information Security Standard Operating Procedures.doc |
1.7 MB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/3. Information Security Procedures/2. Defining Your IT Security Configuration Standards & Guidelines.mp4 |
182.5 MB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/3. Information Security Procedures/2. Defining Your IT Security Configuration Standards & Guidelines.srt |
27 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/3. Information Security Procedures/2.1 Secure Configuration Standard v1.0.xlsx |
61 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/4. Conclusion/1. Going Beyond Information Security Policies & Procedures.mp4 |
151 MB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/4. Conclusion/1. Going Beyond Information Security Policies & Procedures.srt |
10 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/4. Conclusion/2. It's Time For Action - Wrapping Things Up.mp4 |
88.3 MB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/4. Conclusion/2. It's Time For Action - Wrapping Things Up.srt |
6 KB |
[ FreeCourseWeb.com ] Udemy - How To Develop An Information Security Program/~Get Your Files Here !/Bonus Resources.txt |
357 B |