11-08-2024, 03:45 PM
11.69 GB | 00:16:58 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English
Files Included :
1 - audit-cyber-school-course-files (327.16 KB)
1 - Overview (10.36 MB)
10 - Security Policies (233.37 MB)
11 - Security Risk Management Overview (113.22 MB)
12 - Threat Analysis (370.38 MB)
13 - Security Risk Management in Practice (167.61 MB)
14 - Asset Identification and Inventory (410.21 MB)
15 - Thirdparty Service Provider Management (117.54 MB)
16 - Business Impact Assessment (112.36 MB)
17 - Configuration Management and Change Control (86.66 MB)
18 - Defending Business Assets Overview (146.19 MB)
19 - Identity and access management (159.72 MB)
2 - Cybersecurity Key Concepts (182 MB)
20 - Authentication and Authorization (154.29 MB)
21 - Vulnerability and Patch Management (222.8 MB)
22 - Security awareness (146.18 MB)
23 - Physical Security (150.76 MB)
24 - Personnel Security (235.4 MB)
25 - Computer Networking Fundamentals (148.92 MB)
26 - Network Defenses (143.26 MB)
27 - Network Security Access Controls (136.87 MB)
28 - EndPoint and System Security Configuration (296.86 MB)
29 - EndPoint and System Security Protection (171.87 MB)
3 - Cybersecurity History and Breaches (174.79 MB)
30 - Application Security (156.25 MB)
31 - Cloud Virtualization Security (375.53 MB)
32 - Encryption Concepts (142.61 MB)
33 - Cryptographic Algorithms (211.02 MB)
34 - Encryption Public Key Infrastructure (133.36 MB)
35 - Data Privacy Controls (147.76 MB)
36 - Securing Data (247.5 MB)
37 - Logging monitoring and alerting (165.01 MB)
38 - Incident Response IR Planning (156.09 MB)
39 - Incident Response IR Testing (379.47 MB)
4 - Types of Cyber Attacks Human (177.72 MB)
40 - Digital Forensics (141.83 MB)
41 - Recovering Systems (162.2 MB)
42 - Business Continuity and Recovery (278.81 MB)
43 - The Auditors Role (249.09 MB)
44 - CISOs Role (408.99 MB)
45 - Establishing Audit Scope (133.87 MB)
46 - Building the Audit Plan (221.15 MB)
47 - Cybersecurity evaluation methods (123.53 MB)
48 - Vulnerability Assessments Scanning and Testing (160.84 MB)
49 - Penetration Testing (175.45 MB)
5 - Types of Cyber Attacks Technical (444.31 MB)
50 - Security Maturity Models (103.34 MB)
51 - Auditing using NIST frameworks (524.61 MB)
52 - Auditing other security frameworks standards ISO (280.27 MB)
53 - Auditing PCI DSS (348.53 MB)
54 - Cybersecurity Auditing Examples (106.25 MB)
55 - Collecting and Organizing Cybersecurity Evidence (198.12 MB)
56 - NIST Reporting Requirements (186.12 MB)
57 - Prioritizing Risks and Influencing decisions (365.18 MB)
58 - Course Summary and Conclusion (49.85 MB)
6 - Cybersecurity Frameworks Standards (210.51 MB)
7 - NIST Frameworks and Standards (291.4 MB)
8 - Industry Frameworks PCI HIPAA CIS CSC ISOIEC (248.07 MB)
9 - Cybersecurity Oversight Governance Compliance (174.32 MB)
1 - audit-cyber-school-course-files (327.16 KB)
1 - Overview (10.36 MB)
10 - Security Policies (233.37 MB)
11 - Security Risk Management Overview (113.22 MB)
12 - Threat Analysis (370.38 MB)
13 - Security Risk Management in Practice (167.61 MB)
14 - Asset Identification and Inventory (410.21 MB)
15 - Thirdparty Service Provider Management (117.54 MB)
16 - Business Impact Assessment (112.36 MB)
17 - Configuration Management and Change Control (86.66 MB)
18 - Defending Business Assets Overview (146.19 MB)
19 - Identity and access management (159.72 MB)
2 - Cybersecurity Key Concepts (182 MB)
20 - Authentication and Authorization (154.29 MB)
21 - Vulnerability and Patch Management (222.8 MB)
22 - Security awareness (146.18 MB)
23 - Physical Security (150.76 MB)
24 - Personnel Security (235.4 MB)
25 - Computer Networking Fundamentals (148.92 MB)
26 - Network Defenses (143.26 MB)
27 - Network Security Access Controls (136.87 MB)
28 - EndPoint and System Security Configuration (296.86 MB)
29 - EndPoint and System Security Protection (171.87 MB)
3 - Cybersecurity History and Breaches (174.79 MB)
30 - Application Security (156.25 MB)
31 - Cloud Virtualization Security (375.53 MB)
32 - Encryption Concepts (142.61 MB)
33 - Cryptographic Algorithms (211.02 MB)
34 - Encryption Public Key Infrastructure (133.36 MB)
35 - Data Privacy Controls (147.76 MB)
36 - Securing Data (247.5 MB)
37 - Logging monitoring and alerting (165.01 MB)
38 - Incident Response IR Planning (156.09 MB)
39 - Incident Response IR Testing (379.47 MB)
4 - Types of Cyber Attacks Human (177.72 MB)
40 - Digital Forensics (141.83 MB)
41 - Recovering Systems (162.2 MB)
42 - Business Continuity and Recovery (278.81 MB)
43 - The Auditors Role (249.09 MB)
44 - CISOs Role (408.99 MB)
45 - Establishing Audit Scope (133.87 MB)
46 - Building the Audit Plan (221.15 MB)
47 - Cybersecurity evaluation methods (123.53 MB)
48 - Vulnerability Assessments Scanning and Testing (160.84 MB)
49 - Penetration Testing (175.45 MB)
5 - Types of Cyber Attacks Technical (444.31 MB)
50 - Security Maturity Models (103.34 MB)
51 - Auditing using NIST frameworks (524.61 MB)
52 - Auditing other security frameworks standards ISO (280.27 MB)
53 - Auditing PCI DSS (348.53 MB)
54 - Cybersecurity Auditing Examples (106.25 MB)
55 - Collecting and Organizing Cybersecurity Evidence (198.12 MB)
56 - NIST Reporting Requirements (186.12 MB)
57 - Prioritizing Risks and Influencing decisions (365.18 MB)
58 - Course Summary and Conclusion (49.85 MB)
6 - Cybersecurity Frameworks Standards (210.51 MB)
7 - NIST Frameworks and Standards (291.4 MB)
8 - Industry Frameworks PCI HIPAA CIS CSC ISOIEC (248.07 MB)
9 - Cybersecurity Oversight Governance Compliance (174.32 MB)
Screenshot