Udemy Cybersecurity Audit School - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Udemy Cybersecurity Audit School (/Thread-Udemy-Cybersecurity-Audit-School) |
Udemy Cybersecurity Audit School - AD-TEAM - 11-08-2024 11.69 GB | 00:16:58 | mp4 | 1920X1080 | 16:9 Genre:eLearning |Language:English
Files Included :
1 - audit-cyber-school-course-files (327.16 KB) 1 - Overview (10.36 MB) 10 - Security Policies (233.37 MB) 11 - Security Risk Management Overview (113.22 MB) 12 - Threat Analysis (370.38 MB) 13 - Security Risk Management in Practice (167.61 MB) 14 - Asset Identification and Inventory (410.21 MB) 15 - Thirdparty Service Provider Management (117.54 MB) 16 - Business Impact Assessment (112.36 MB) 17 - Configuration Management and Change Control (86.66 MB) 18 - Defending Business Assets Overview (146.19 MB) 19 - Identity and access management (159.72 MB) 2 - Cybersecurity Key Concepts (182 MB) 20 - Authentication and Authorization (154.29 MB) 21 - Vulnerability and Patch Management (222.8 MB) 22 - Security awareness (146.18 MB) 23 - Physical Security (150.76 MB) 24 - Personnel Security (235.4 MB) 25 - Computer Networking Fundamentals (148.92 MB) 26 - Network Defenses (143.26 MB) 27 - Network Security Access Controls (136.87 MB) 28 - EndPoint and System Security Configuration (296.86 MB) 29 - EndPoint and System Security Protection (171.87 MB) 3 - Cybersecurity History and Breaches (174.79 MB) 30 - Application Security (156.25 MB) 31 - Cloud Virtualization Security (375.53 MB) 32 - Encryption Concepts (142.61 MB) 33 - Cryptographic Algorithms (211.02 MB) 34 - Encryption Public Key Infrastructure (133.36 MB) 35 - Data Privacy Controls (147.76 MB) 36 - Securing Data (247.5 MB) 37 - Logging monitoring and alerting (165.01 MB) 38 - Incident Response IR Planning (156.09 MB) 39 - Incident Response IR Testing (379.47 MB) 4 - Types of Cyber Attacks Human (177.72 MB) 40 - Digital Forensics (141.83 MB) 41 - Recovering Systems (162.2 MB) 42 - Business Continuity and Recovery (278.81 MB) 43 - The Auditors Role (249.09 MB) 44 - CISOs Role (408.99 MB) 45 - Establishing Audit Scope (133.87 MB) 46 - Building the Audit Plan (221.15 MB) 47 - Cybersecurity evaluation methods (123.53 MB) 48 - Vulnerability Assessments Scanning and Testing (160.84 MB) 49 - Penetration Testing (175.45 MB) 5 - Types of Cyber Attacks Technical (444.31 MB) 50 - Security Maturity Models (103.34 MB) 51 - Auditing using NIST frameworks (524.61 MB) 52 - Auditing other security frameworks standards ISO (280.27 MB) 53 - Auditing PCI DSS (348.53 MB) 54 - Cybersecurity Auditing Examples (106.25 MB) 55 - Collecting and Organizing Cybersecurity Evidence (198.12 MB) 56 - NIST Reporting Requirements (186.12 MB) 57 - Prioritizing Risks and Influencing decisions (365.18 MB) 58 - Course Summary and Conclusion (49.85 MB) 6 - Cybersecurity Frameworks Standards (210.51 MB) 7 - NIST Frameworks and Standards (291.4 MB) 8 - Industry Frameworks PCI HIPAA CIS CSC ISOIEC (248.07 MB) 9 - Cybersecurity Oversight Governance Compliance (174.32 MB)
Screenshot
RapidGator
TurboBit FileAxa |