12-15-2024, 01:18 AM
4.1 GB | 18min 56s | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English
Files Included :
01 Course Introduction - Become a GRC Consultant.mp4 (7.03 MB)
02 How to get the most out of this course!.mp4 (29.77 MB)
01 Navigating the Cybersecurity & GRC Landscape.mp4 (78.23 MB)
02 Building Resume for Cybersecurity Career.mp4 (60.94 MB)
03 Mastering Networking for Career Success.mp4 (100.42 MB)
02 The Security Objective.mp4 (32.1 MB)
03 What is the Governance, Risk and Compliance.mp4 (20.39 MB)
04 Information Security roles and GRC.mp4 (10.5 MB)
05 Key Security Terminologies.mp4 (52 MB)
06 Adversaries and Threat Actors.mp4 (11.88 MB)
07 Security vulnerabilities.mp4 (31.93 MB)
08 What is Malware.mp4 (54.35 MB)
09 The Cyber Security Attacks.mp4 (12.46 MB)
10 Understand Web Application Attacks.mp4 (38.76 MB)
11 Social Engineering.mp4 (44.35 MB)
12 IT Infrastructure.mp4 (31.57 MB)
02 The Purpose of Security Program.mp4 (28.71 MB)
03 Cybersecurity and Information Security and Information Assurance.mp4 (11.13 MB)
04 Security Goals and Strategy.mp4 (12.09 MB)
05 Security manager role.mp4 (20.78 MB)
06 Security roles and responsibilities.mp4 (17.79 MB)
07 Key Performance Indicators.mp4 (19.73 MB)
01 Information Security Standards and Frameworks.mp4 (42.44 MB)
02 Laws and Regulations that Affect Information Security.mp4 (25.17 MB)
03 Privacy Regulation Requirements.mp4 (48.57 MB)
04 Privacy Policy.mp4 (29.3 MB)
05 Performing Gap analysis.mp4 (32.65 MB)
02 Risk Management Overview.mp4 (24.34 MB)
03 Risk Terminologies.mp4 (32.28 MB)
04 Risk Identification.mp4 (18.03 MB)
05 Risk Analysis.mp4 (39.73 MB)
06 Risk Evaluation and Response.mp4 (65.3 MB)
07 Risk Reporting and Monitoring.mp4 (24.42 MB)
08 Risk Management Frameworks.mp4 (9.49 MB)
09 Threat Model Overview.mp4 (31.26 MB)
01 Security Controls.mp4 (41.44 MB)
02 ITGC.mp4 (17.46 MB)
03 Control Objective, Compensating Control and Countermeasures.mp4 (19.32 MB)
04 Defence in Depth or layered defences.mp4 (20.6 MB)
05 Security Control Assessment & Control References.mp4 (11.84 MB)
02 Policies.mp4 (12.3 MB)
03 Example - Acceptable Use - Physical Security - Clear Desk.mp4 (20.85 MB)
04 Example - Internet Access, Email Security - Remote Access Policies.mp4 (32.13 MB)
05 Example - Network, Wireless & BYOD Policies.mp4 (30.68 MB)
06 Example - Data Protection, Encryption, Classification Policies.mp4 (46.61 MB)
07 User Account, Password and Access Control Policies.mp4 (41.96 MB)
08 Artificial Intelligence Usage Policy.mp4 (33.47 MB)
09 Standards.mp4 (13.43 MB)
10 Procedures and Guidelines.mp4 (14.46 MB)
11 Review Policies, Standards and Procedures.mp4 (39.36 MB)
01 Vendor Management and requirements in Contracts (Outsourcing).mp4 (43.86 MB)
02 Supply Chain Security and Risk Management.mp4 (48.16 MB)
03 Personnel Security Human Resource Security.mp4 (31.39 MB)
04 Security Awareness Training Program.mp4 (12.62 MB)
02 Information System Auditing overview.mp4 (32.16 MB)
03 Types of Audits.mp4 (12.94 MB)
04 Audit Committee.mp4 (6.73 MB)
05 Audit Planning.mp4 (39.24 MB)
06 Audit Execution.mp4 (10.24 MB)
07 Evidence Collection during Auditing.mp4 (21.89 MB)
08 Evaluation of Controls during the Audit.mp4 (11.97 MB)
09 Using Sampling in Audit Engagement.mp4 (17.48 MB)
10 Audit Reporting and Documentation.mp4 (18.59 MB)
11 SSAE.mp4 (27.4 MB)
12 SOC Audit and Understand SOC Reports.mp4 (16.82 MB)
02 Information System Architecture.mp4 (30.22 MB)
03 # Computing System Components.mp4 (65.69 MB)
04 # Computing device forms and types of OS and Platforms.mp4 (179.23 MB)
05 # Introduction to IT Networks.mp4 (94.76 MB)
06 # OSI & TCPIP Reference Models.mp4 (134.61 MB)
07 # Transport Protocols and Application Layer in Networking.mp4 (56.18 MB)
01 # Introduction to Databases.mp4 (33 MB)
02 # Primary and Foreign Key.mp4 (11.28 MB)
03 # Database Management System (DBMS).mp4 (7.61 MB)
04 # Database Security.mp4 (26.94 MB)
05 # Database Resiliency.mp4 (18.4 MB)
01 # IAAA Framework.mp4 (28 MB)
02 # Authorization and Access Control Models.mp4 (66.42 MB)
03 # Accounting.mp4 (29.2 MB)
04 # Active Directory and LDAP Overview.mp4 (51.09 MB)
01 Virtualization and Hypervisors.mp4 (29.03 MB)
02 Containers.mp4 (33.95 MB)
03 Software Defined Networks.mp4 (67.54 MB)
04 Cloud Computing Overview.mp4 (25.09 MB)
05 Cloud Deployments Models.mp4 (15.24 MB)
06 Cloud Service Models.mp4 (25.18 MB)
07 Cloud Shared Responsibility Matrix.mp4 (20.45 MB)
08 Cloud Advantages and Security.mp4 (25 MB)
01 # Securing Endpoints.mp4 (32.79 MB)
02 # Endpoint Security Software & Endpoint Protection Platform.mp4 (31.76 MB)
03 Data Lifecycle.mp4 (8.02 MB)
04 Roles in Data and Assets Protection.mp4 (11.61 MB)
05 Data Classification.mp4 (56.73 MB)
06 Data Security Measures and Controls.mp4 (25.76 MB)
07 DLP.mp4 (22.22 MB)
08 DRM.mp4 (21.76 MB)
09 Data Destruction.mp4 (22.92 MB)
10 Physical Security.mp4 (33.7 MB)
01 The Process of Acquiring New technology.mp4 (17.12 MB)
02 Feasibility Analysis and Business Case.mp4 (21.9 MB)
03 Software Development Process.mp4 (32.72 MB)
04 Software Development Methodologies.mp4 (20.77 MB)
05 Software and Information System Testing.mp4 (50.63 MB)
06 Secure Coding and Software Development.mp4 (34.07 MB)
07 DevOps.mp4 (21.41 MB)
08 DevSecOps.mp4 (23.32 MB)
09 Software Types and Licenses.mp4 (42.55 MB)
10 Intellectual Property.mp4 (9.83 MB)
01 Software and System Implementation & PIR.mp4 (69.48 MB)
02 Vulnerability Assessment and Patch Management.mp4 (12.57 MB)
03 Penetration Testing.mp4 (33.56 MB)
04 The Bug Bounty Program.mp4 (13.48 MB)
05 Release Management.mp4 (19.54 MB)
06 Change Management Process.mp4 (65.96 MB)
07 Configuration Management.mp4 (38.98 MB)
08 IT Assets Management.mp4 (29.65 MB)
10 IT Management and ITIL Framework Overview.mp4 (52.22 MB)
11 Control Objective of IT - COBIT.mp4 (33.26 MB)
01 # Incident Management Process.mp4 (19.26 MB)
02 # Responding to Incidents.mp4 (29.53 MB)
03 # Business Impact Assessment.mp4 (33.82 MB)
04 # Understand RTO and RPO.mp4 (29.33 MB)
05 # Recovery Strategies.mp4 (12.81 MB)
06 # BCP and DRP Testing and Evaluation.mp4 (12.3 MB)
07 Backup and Recovery.mp4 (53.83 MB)
08 # Storage Redundancy and RAID.mp4 (33.05 MB)
09 # Network Redundancy.mp4 (31.24 MB)]
Screenshot
01 Course Introduction - Become a GRC Consultant.mp4 (7.03 MB)
02 How to get the most out of this course!.mp4 (29.77 MB)
01 Navigating the Cybersecurity & GRC Landscape.mp4 (78.23 MB)
02 Building Resume for Cybersecurity Career.mp4 (60.94 MB)
03 Mastering Networking for Career Success.mp4 (100.42 MB)
02 The Security Objective.mp4 (32.1 MB)
03 What is the Governance, Risk and Compliance.mp4 (20.39 MB)
04 Information Security roles and GRC.mp4 (10.5 MB)
05 Key Security Terminologies.mp4 (52 MB)
06 Adversaries and Threat Actors.mp4 (11.88 MB)
07 Security vulnerabilities.mp4 (31.93 MB)
08 What is Malware.mp4 (54.35 MB)
09 The Cyber Security Attacks.mp4 (12.46 MB)
10 Understand Web Application Attacks.mp4 (38.76 MB)
11 Social Engineering.mp4 (44.35 MB)
12 IT Infrastructure.mp4 (31.57 MB)
02 The Purpose of Security Program.mp4 (28.71 MB)
03 Cybersecurity and Information Security and Information Assurance.mp4 (11.13 MB)
04 Security Goals and Strategy.mp4 (12.09 MB)
05 Security manager role.mp4 (20.78 MB)
06 Security roles and responsibilities.mp4 (17.79 MB)
07 Key Performance Indicators.mp4 (19.73 MB)
01 Information Security Standards and Frameworks.mp4 (42.44 MB)
02 Laws and Regulations that Affect Information Security.mp4 (25.17 MB)
03 Privacy Regulation Requirements.mp4 (48.57 MB)
04 Privacy Policy.mp4 (29.3 MB)
05 Performing Gap analysis.mp4 (32.65 MB)
02 Risk Management Overview.mp4 (24.34 MB)
03 Risk Terminologies.mp4 (32.28 MB)
04 Risk Identification.mp4 (18.03 MB)
05 Risk Analysis.mp4 (39.73 MB)
06 Risk Evaluation and Response.mp4 (65.3 MB)
07 Risk Reporting and Monitoring.mp4 (24.42 MB)
08 Risk Management Frameworks.mp4 (9.49 MB)
09 Threat Model Overview.mp4 (31.26 MB)
01 Security Controls.mp4 (41.44 MB)
02 ITGC.mp4 (17.46 MB)
03 Control Objective, Compensating Control and Countermeasures.mp4 (19.32 MB)
04 Defence in Depth or layered defences.mp4 (20.6 MB)
05 Security Control Assessment & Control References.mp4 (11.84 MB)
02 Policies.mp4 (12.3 MB)
03 Example - Acceptable Use - Physical Security - Clear Desk.mp4 (20.85 MB)
04 Example - Internet Access, Email Security - Remote Access Policies.mp4 (32.13 MB)
05 Example - Network, Wireless & BYOD Policies.mp4 (30.68 MB)
06 Example - Data Protection, Encryption, Classification Policies.mp4 (46.61 MB)
07 User Account, Password and Access Control Policies.mp4 (41.96 MB)
08 Artificial Intelligence Usage Policy.mp4 (33.47 MB)
09 Standards.mp4 (13.43 MB)
10 Procedures and Guidelines.mp4 (14.46 MB)
11 Review Policies, Standards and Procedures.mp4 (39.36 MB)
01 Vendor Management and requirements in Contracts (Outsourcing).mp4 (43.86 MB)
02 Supply Chain Security and Risk Management.mp4 (48.16 MB)
03 Personnel Security Human Resource Security.mp4 (31.39 MB)
04 Security Awareness Training Program.mp4 (12.62 MB)
02 Information System Auditing overview.mp4 (32.16 MB)
03 Types of Audits.mp4 (12.94 MB)
04 Audit Committee.mp4 (6.73 MB)
05 Audit Planning.mp4 (39.24 MB)
06 Audit Execution.mp4 (10.24 MB)
07 Evidence Collection during Auditing.mp4 (21.89 MB)
08 Evaluation of Controls during the Audit.mp4 (11.97 MB)
09 Using Sampling in Audit Engagement.mp4 (17.48 MB)
10 Audit Reporting and Documentation.mp4 (18.59 MB)
11 SSAE.mp4 (27.4 MB)
12 SOC Audit and Understand SOC Reports.mp4 (16.82 MB)
02 Information System Architecture.mp4 (30.22 MB)
03 # Computing System Components.mp4 (65.69 MB)
04 # Computing device forms and types of OS and Platforms.mp4 (179.23 MB)
05 # Introduction to IT Networks.mp4 (94.76 MB)
06 # OSI & TCPIP Reference Models.mp4 (134.61 MB)
07 # Transport Protocols and Application Layer in Networking.mp4 (56.18 MB)
01 # Introduction to Databases.mp4 (33 MB)
02 # Primary and Foreign Key.mp4 (11.28 MB)
03 # Database Management System (DBMS).mp4 (7.61 MB)
04 # Database Security.mp4 (26.94 MB)
05 # Database Resiliency.mp4 (18.4 MB)
01 # IAAA Framework.mp4 (28 MB)
02 # Authorization and Access Control Models.mp4 (66.42 MB)
03 # Accounting.mp4 (29.2 MB)
04 # Active Directory and LDAP Overview.mp4 (51.09 MB)
01 Virtualization and Hypervisors.mp4 (29.03 MB)
02 Containers.mp4 (33.95 MB)
03 Software Defined Networks.mp4 (67.54 MB)
04 Cloud Computing Overview.mp4 (25.09 MB)
05 Cloud Deployments Models.mp4 (15.24 MB)
06 Cloud Service Models.mp4 (25.18 MB)
07 Cloud Shared Responsibility Matrix.mp4 (20.45 MB)
08 Cloud Advantages and Security.mp4 (25 MB)
01 # Securing Endpoints.mp4 (32.79 MB)
02 # Endpoint Security Software & Endpoint Protection Platform.mp4 (31.76 MB)
03 Data Lifecycle.mp4 (8.02 MB)
04 Roles in Data and Assets Protection.mp4 (11.61 MB)
05 Data Classification.mp4 (56.73 MB)
06 Data Security Measures and Controls.mp4 (25.76 MB)
07 DLP.mp4 (22.22 MB)
08 DRM.mp4 (21.76 MB)
09 Data Destruction.mp4 (22.92 MB)
10 Physical Security.mp4 (33.7 MB)
01 The Process of Acquiring New technology.mp4 (17.12 MB)
02 Feasibility Analysis and Business Case.mp4 (21.9 MB)
03 Software Development Process.mp4 (32.72 MB)
04 Software Development Methodologies.mp4 (20.77 MB)
05 Software and Information System Testing.mp4 (50.63 MB)
06 Secure Coding and Software Development.mp4 (34.07 MB)
07 DevOps.mp4 (21.41 MB)
08 DevSecOps.mp4 (23.32 MB)
09 Software Types and Licenses.mp4 (42.55 MB)
10 Intellectual Property.mp4 (9.83 MB)
01 Software and System Implementation & PIR.mp4 (69.48 MB)
02 Vulnerability Assessment and Patch Management.mp4 (12.57 MB)
03 Penetration Testing.mp4 (33.56 MB)
04 The Bug Bounty Program.mp4 (13.48 MB)
05 Release Management.mp4 (19.54 MB)
06 Change Management Process.mp4 (65.96 MB)
07 Configuration Management.mp4 (38.98 MB)
08 IT Assets Management.mp4 (29.65 MB)
10 IT Management and ITIL Framework Overview.mp4 (52.22 MB)
11 Control Objective of IT - COBIT.mp4 (33.26 MB)
01 # Incident Management Process.mp4 (19.26 MB)
02 # Responding to Incidents.mp4 (29.53 MB)
03 # Business Impact Assessment.mp4 (33.82 MB)
04 # Understand RTO and RPO.mp4 (29.33 MB)
05 # Recovery Strategies.mp4 (12.81 MB)
06 # BCP and DRP Testing and Evaluation.mp4 (12.3 MB)
07 Backup and Recovery.mp4 (53.83 MB)
08 # Storage Redundancy and RAID.mp4 (33.05 MB)
09 # Network Redundancy.mp4 (31.24 MB)]
Screenshot