资源详情

返回首页 | 相关搜索
[ WebToolTip.com ] Corporate Security Policies by Infosec
大小 1.53 GB
文件数 123
Info Hash: 57926780CBAF38EB2D6F37F549DEB709A76DDDBA
收录时间 2026-01-25 14:22:44
更新时间 2026-01-25 14:22:44
文件列表 (123)
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/01 - Introduction to corporate security policies.mp4
29.73 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/01 - Introduction to corporate security policies.srt
18.05 KB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/02 - What are security policies, and why do we need them.mp4
24.99 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/02 - What are security policies, and why do we need them.srt
21.49 KB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/03 - Rules introduced Let’s talk about what they are in general.mp4
24.87 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/03 - Rules introduced Let’s talk about what they are in general.srt
20.97 KB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/04 - Internal rules Organization policies, procedures, and more.mp4
22.81 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/04 - Internal rules Organization policies, procedures, and more.srt
18.13 KB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/05 - Rethinking the rules pyramid as a platform.mp4
28.12 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/05 - Rethinking the rules pyramid as a platform.srt
21.62 KB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/06 - Three platforms plus a fourth to build your policies.mp4
18.91 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/06 - Three platforms plus a fourth to build your policies.srt
15.32 KB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/07 - Planning policies and internal rules conceptually.mp4
20.17 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/07 - Planning policies and internal rules conceptually.srt
16.1 KB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/08 - Building internal rules conceptually.mp4
31.78 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/08 - Building internal rules conceptually.srt
24.07 KB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/09 - Effective governance documents look like this.mp4
32.31 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/09 - Effective governance documents look like this.srt
25.32 KB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/10 - The people who write, read, and approve security policies.mp4
30.67 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/10 - The people who write, read, and approve security policies.srt
27.8 KB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/11 - Policy knowledge and skills introduced.mp4
13.7 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/11 - Policy knowledge and skills introduced.srt
11.85 KB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/12 - Summary.mp4
12.07 MB
~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/12 - Summary.srt
9.49 KB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/01 - Introduction to business needs for policies.mp4
21.55 MB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/01 - Introduction to business needs for policies.srt
13.6 KB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/02 - The business mission is always first.mp4
37.78 MB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/02 - The business mission is always first.srt
27.38 KB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/03 - Knowing your organization's mission, business, and culture.mp4
27.76 MB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/03 - Knowing your organization's mission, business, and culture.srt
20.89 KB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/04 - Ethics, business, security, and policies.mp4
59.52 MB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/04 - Ethics, business, security, and policies.srt
40.37 KB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/05 - Good internal rules help the business achieve its mission.mp4
11.9 MB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/05 - Good internal rules help the business achieve its mission.srt
9.02 KB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/06 - Synchronizing business needs and priorities.mp4
33.29 MB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/06 - Synchronizing business needs and priorities.srt
25.75 KB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/07 - Summary.mp4
24.83 MB
~Get Your Files Here !/02 - 1. Business Needs for Security Policies/07 - Summary.srt
11.56 KB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/01 - Introduction to external laws and rules.mp4
19.46 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/01 - Introduction to external laws and rules.srt
12.51 KB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/02 - Legal implications of policies and procedures.mp4
24.21 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/02 - Legal implications of policies and procedures.srt
17 KB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/03 - Introduction to law and regulation.mp4
50.88 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/03 - Introduction to law and regulation.srt
40.26 KB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/04 - Introducing laws as external rules to inform policies.mp4
27.23 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/04 - Introducing laws as external rules to inform policies.srt
18.88 KB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/05 - Cybersecurity laws and regulations, part 1.mp4
40.92 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/05 - Cybersecurity laws and regulations, part 1.srt
32.33 KB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/06 - Cybersecurity laws and regulations, part 2.mp4
31.47 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/06 - Cybersecurity laws and regulations, part 2.srt
22.62 KB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/07 - When and how to seek legal review.mp4
41.94 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/07 - When and how to seek legal review.srt
30.61 KB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/08 - Summary.mp4
21.49 MB
~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/08 - Summary.srt
11.61 KB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/01 - External guidance to assist with security policies overview.mp4
16.8 MB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/01 - External guidance to assist with security policies overview.srt
14.55 KB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/02 - Government regulatory guidance.mp4
32.31 MB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/02 - Government regulatory guidance.srt
22.9 KB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/03 - Finding good sample infosec policies from the internet.mp4
22.15 MB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/03 - Finding good sample infosec policies from the internet.srt
17.26 KB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/04 - Cybersecurity frameworks.mp4
54.26 MB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/04 - Cybersecurity frameworks.srt
38.7 KB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/05 - Books, articles, and other resources.mp4
17.31 MB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/05 - Books, articles, and other resources.srt
13.45 KB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/06 - Tools to assist with creating and managing policies.mp4
36.21 MB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/06 - Tools to assist with creating and managing policies.srt
28.44 KB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/07 - Summary.mp4
19.93 MB
~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/07 - Summary.srt
13.11 KB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/01 - Introduction to planning the policy project.mp4
25.98 MB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/01 - Introduction to planning the policy project.srt
22.1 KB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/02 - Planning for when you don't have time to plan.mp4
21.24 MB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/02 - Planning for when you don't have time to plan.srt
17.38 KB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/03 - Planning, scoping, and selling (evangelizing) the project.mp4
32.44 MB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/03 - Planning, scoping, and selling (evangelizing) the project.srt
28.87 KB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/04 - Where are we now, and where do we want to go.mp4
32.96 MB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/04 - Where are we now, and where do we want to go.srt
27.92 KB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/05 - Who should be on your team, and who else should be involved.mp4
15.39 MB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/05 - Who should be on your team, and who else should be involved.srt
12.45 KB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/06 - Summary.mp4
12.41 MB
~Get Your Files Here !/05 - 4. Planning the Security Document Project/06 - Summary.srt
6.89 KB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/01 - Overview of project management and execution.mp4
19.58 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/01 - Overview of project management and execution.srt
12.48 KB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/02 - Project management basics.mp4
39.52 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/02 - Project management basics.srt
33.08 KB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/03 - Overview of all steps and phases.mp4
36.68 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/03 - Overview of all steps and phases.srt
32.54 KB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/04 - Review your project's scope and avoid scope creep.mp4
32.42 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/04 - Review your project's scope and avoid scope creep.srt
26.88 KB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/05 - Starting the project Project kickoff.mp4
13.06 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/05 - Starting the project Project kickoff.srt
10.11 KB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/06 - Review relevant existing internal rules.mp4
8.13 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/06 - Review relevant existing internal rules.srt
6.86 KB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/07 - People skills for managing and communicating in your project.mp4
27.18 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/07 - People skills for managing and communicating in your project.srt
24.02 KB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/08 - Resolving differences of opinion.mp4
36.24 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/08 - Resolving differences of opinion.srt
29.54 KB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/09 - Reading, writing, technical writing, and editing.mp4
54.21 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/09 - Reading, writing, technical writing, and editing.srt
38.18 KB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/10 - Tracking changes within documents and version control.mp4
50.73 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/10 - Tracking changes within documents and version control.srt
35.18 KB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/11 - Security and technical decisions.mp4
12.09 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/11 - Security and technical decisions.srt
9.58 KB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/12 - Gaining approval and finalizing the documents.mp4
27.52 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/12 - Gaining approval and finalizing the documents.srt
22.45 KB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/13 - Publication, training, and implementing phases.mp4
24.1 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/13 - Publication, training, and implementing phases.srt
20.36 KB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/14 - Summary.mp4
5.88 MB
~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/14 - Summary.srt
3.88 KB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/01 - Post-project.mp4
19.32 MB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/01 - Post-project.srt
12.49 KB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/02 - Document usage and the maintenance phase.mp4
19.62 MB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/02 - Document usage and the maintenance phase.srt
15.85 KB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/03 - When to start a new document project.mp4
25.05 MB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/03 - When to start a new document project.srt
20.73 KB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/04 - Summary.mp4
8.7 MB
~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/04 - Summary.srt
6.38 KB
~Get Your Files Here !/Bonus Resources.txt
70 B
~Get Your Files Here !/Ex_Files_Corporate_Security_Policies/Exercise Files/Course 1 Handout Policies.pdf
3.86 MB
~Get Your Files Here !/Ex_Files_Corporate_Security_Policies/Exercise Files/Course 2 Knowledge Check.pdf
166.38 KB
~Get Your Files Here !/Ex_Files_Corporate_Security_Policies/Exercise Files/Course 3 Knowledge Check.pdf
186.26 KB
~Get Your Files Here !/Ex_Files_Corporate_Security_Policies/Exercise Files/Course 4 Knowledge Check.pdf
170.32 KB
~Get Your Files Here !/Ex_Files_Corporate_Security_Policies/Exercise Files/Course 5 Knowledge Check.pdf
199.37 KB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。