资源详情

返回首页 | 相关搜索
[ WebToolTip.com ] Udemy - CISM Masterclass - Managing Information Security UPDATED
大小 933.38 MB
文件数 26
Info Hash: FABDB1E708F1127E4F9C59AB15641A6FF546895C
收录时间 2026-02-27 23:30:48
更新时间 2026-02-27 23:30:48
文件列表 (26)
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Foundations of Information Security Management/1. Introduction to CISM and the Role of a Security Manager.mp4
28.65 MB
~Get Your Files Here !/1 - Foundations of Information Security Management/2. Information Security Principles and Core Terminology.mp4
29.42 MB
~Get Your Files Here !/1 - Foundations of Information Security Management/3. Security Governance vs Security Management.mp4
24.19 MB
~Get Your Files Here !/2 - Information Security Governance/4. Governance Frameworks and Standards.mp4
35.42 MB
~Get Your Files Here !/2 - Information Security Governance/5. Developing an Information Security Strategy.mp4
36.79 MB
~Get Your Files Here !/2 - Information Security Governance/6. Security Policies, Guidelines, and High-Level Requirements.mp4
36.94 MB
~Get Your Files Here !/2 - Information Security Governance/7. Legal, Regulatory, and Contractual Requirements.mp4
43.68 MB
~Get Your Files Here !/2 - Information Security Governance/8. Defining Roles, Responsibilities, and Accountability.mp4
33.54 MB
~Get Your Files Here !/3 - Information Security Risk Management/10. Establishing a Risk Management Program.mp4
38.83 MB
~Get Your Files Here !/3 - Information Security Risk Management/11. Risk Assessment Concepts.mp4
43.72 MB
~Get Your Files Here !/3 - Information Security Risk Management/12. Risk Response and Treatment Options.mp4
31.85 MB
~Get Your Files Here !/3 - Information Security Risk Management/13. Risk Monitoring, Reporting, and Review.mp4
40.41 MB
~Get Your Files Here !/3 - Information Security Risk Management/9. Understanding Risk in Information Security.mp4
35.92 MB
~Get Your Files Here !/4 - Information Security Program Development & Management/14. Designing the Information Security Program.mp4
46.93 MB
~Get Your Files Here !/4 - Information Security Program Development & Management/15. Security Architecture Concepts for Managers.mp4
64.62 MB
~Get Your Files Here !/4 - Information Security Program Development & Management/16. Control Types and Control Frameworks.mp4
46.7 MB
~Get Your Files Here !/4 - Information Security Program Development & Management/17. Security Training, Awareness, and Culture.mp4
35.63 MB
~Get Your Files Here !/4 - Information Security Program Development & Management/18. Managing Third-Party and Outsourced Services.mp4
41.05 MB
~Get Your Files Here !/5 - Information Security Incident Management/19. Foundations of Incident Management.mp4
34.82 MB
~Get Your Files Here !/5 - Information Security Incident Management/20. Preparing the Organization for Security Incidents.mp4
45.98 MB
~Get Your Files Here !/5 - Information Security Incident Management/21. Detection, Reporting, and Investigation Concepts.mp4
47.64 MB
~Get Your Files Here !/5 - Information Security Incident Management/22. Response, Containment, and Recovery Concepts.mp4
34.57 MB
~Get Your Files Here !/6 - Program Performance and Continuous Improvement/23. Measuring and Monitoring the Security Program.mp4
31.2 MB
~Get Your Files Here !/6 - Program Performance and Continuous Improvement/24. Continuous Improvement and Evolving Security Needs.mp4
44.88 MB
~Get Your Files Here !/Bonus Resources.txt
70 B

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。