资源详情

返回首页 | 相关搜索
[ DevCourseWeb.com ] Udemy - IT Cyber Security NIST Risk Management Framework
大小 1.84 GB
文件数 96
Info Hash: 6233E9605DC589B4074A920952E94B2AF39072FA
收录时间 2025-12-18 04:16:20
更新时间 2025-12-18 04:16:20
文件列表 (96)
Get Bonus Downloads Here.url
182 B
~Get Your Files Here !/1. Introduction/1. What You will learn in this course.mp4
32.25 MB
~Get Your Files Here !/1. Introduction/1. What You will learn in this course.srt
4.51 KB
~Get Your Files Here !/1. Introduction/1.2 IT Cyber Security NIST Risk Management Framework.pdf
2.1 MB
~Get Your Files Here !/1. Introduction/1.3 My published Book on Amazon Store.html
97 B
~Get Your Files Here !/1. Introduction/2. Introduction.mp4
76.61 MB
~Get Your Files Here !/1. Introduction/2. Introduction.srt
6.46 KB
~Get Your Files Here !/1. Introduction/3. Integrating Cybersecurity and ERM.mp4
31.7 MB
~Get Your Files Here !/1. Introduction/3. Integrating Cybersecurity and ERM.srt
3.95 KB
~Get Your Files Here !/1. Introduction/Exercise Files/CIS_Controls_v8_Mapping_to_NIST_SP_800_53_Rev_5_Low_Baseline_06_21_20.xlsx
416.62 KB
~Get Your Files Here !/1. Introduction/Exercise Files/Controlled Unclassified Information (CUI) -SSP-Template-final.docx
69.65 KB
~Get Your Files Here !/1. Introduction/Exercise Files/Copy of SSP-A13-FedRAMP-Integrated-Inventory-Workbook-Template.xlsx
292.01 KB
~Get Your Files Here !/1. Introduction/Exercise Files/IC-Security-Gap-Analysis-9197.xlsx
75.27 KB
~Get Your Files Here !/1. Introduction/Exercise Files/NIST_CSF_Risk_template_DL.xlsx
48.67 KB
~Get Your Files Here !/1. Introduction/Exercise Files/POAM_example_DL.xlsx
11.97 KB
~Get Your Files Here !/1. Introduction/Exercise Files/SSP A13 FedRAMP Integrated Inventory Template.xlsx
292.11 KB
~Get Your Files Here !/1. Introduction/Exercise Files/SSP Template.docx
61.46 KB
~Get Your Files Here !/1. Introduction/Exercise Files/business-impact-analysis-worksheet.pdf
37.42 KB
~Get Your Files Here !/1. Introduction/Exercise Files/business_risk-assessment-table.pdf
106.42 KB
~Get Your Files Here !/1. Introduction/NIST.IR.8286.pdf
2.18 MB
~Get Your Files Here !/1. Introduction/NIST.IR.8286A.pdf
2.75 MB
~Get Your Files Here !/1. Introduction/NIST.SP.800-171r2.pdf
1.25 MB
~Get Your Files Here !/1. Introduction/NIST.SP.800-37r2.pdf
2.18 MB
~Get Your Files Here !/1. Introduction/NIST.SP.800-53Ar5-draft.pdf
4.97 MB
~Get Your Files Here !/1. Introduction/NIST.SP.800-53B.pdf
1.55 MB
~Get Your Files Here !/1. Introduction/NIST.SP.800-53r5.pdf
5.79 MB
~Get Your Files Here !/1. Introduction/nistspecialpublication800-30r1.pdf
807.52 KB
~Get Your Files Here !/10. RMF Authorize Information System step 6/1. RMF Authorization.mp4
34.14 MB
~Get Your Files Here !/10. RMF Authorize Information System step 6/1. RMF Authorization.srt
4.57 KB
~Get Your Files Here !/11. RMF Monitor Security Controls step 7/1. NIST RMF Monitoring.mp4
65.07 MB
~Get Your Files Here !/11. RMF Monitor Security Controls step 7/1. NIST RMF Monitoring.srt
7.84 KB
~Get Your Files Here !/11. RMF Monitor Security Controls step 7/2. Monitoring is an Ongoing Process.mp4
61.28 MB
~Get Your Files Here !/11. RMF Monitor Security Controls step 7/2. Monitoring is an Ongoing Process.srt
9.28 KB
~Get Your Files Here !/12. NIST RMF Knowledge Resources and Best Practices/1. Tips For Streamlining RMF Implementation.mp4
16.71 MB
~Get Your Files Here !/12. NIST RMF Knowledge Resources and Best Practices/1. Tips For Streamlining RMF Implementation.srt
2.74 KB
~Get Your Files Here !/12. NIST RMF Knowledge Resources and Best Practices/2. NIST RMF Best practices and Knowledge Resources.mp4
48.63 MB
~Get Your Files Here !/12. NIST RMF Knowledge Resources and Best Practices/2. NIST RMF Best practices and Knowledge Resources.srt
6.62 KB
~Get Your Files Here !/13. CMMI maturity model and NIST RMF/1. NIST CMMI Maturity Model.mp4
33.94 MB
~Get Your Files Here !/13. CMMI maturity model and NIST RMF/1. NIST CMMI Maturity Model.srt
4.27 KB
~Get Your Files Here !/14. Cyber Security Risk Metrics Indicators/1. Cyber Security Risk Metrics and Performance indicators.mp4
57.7 MB
~Get Your Files Here !/14. Cyber Security Risk Metrics Indicators/1. Cyber Security Risk Metrics and Performance indicators.srt
7.65 KB
~Get Your Files Here !/15. NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs)/1. NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs).mp4
23.97 MB
~Get Your Files Here !/15. NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs)/1. NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs).srt
2.54 KB
~Get Your Files Here !/15. NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs)/1.1 15 NIST RMF Quick Start Guide.docx
25.27 KB
~Get Your Files Here !/16. Conclusions/1. Conclusions.mp4
37.43 MB
~Get Your Files Here !/16. Conclusions/1. Conclusions.srt
3.61 KB
~Get Your Files Here !/2. The Course case study/1. Target Cloud Inc. Case Study.mp4
57.66 MB
~Get Your Files Here !/2. The Course case study/1. Target Cloud Inc. Case Study.srt
4.21 KB
~Get Your Files Here !/2. The Course case study/1.1 Target Cloud Inc Case Study.docx
56.02 KB
~Get Your Files Here !/3. IT Cyber Security Risk/1. What is Risk .mp4
115.22 MB
~Get Your Files Here !/3. IT Cyber Security Risk/1. What is Risk .srt
9.49 KB
~Get Your Files Here !/3. IT Cyber Security Risk/10. Risk Analysis Methods.mp4
75.77 MB
~Get Your Files Here !/3. IT Cyber Security Risk/10. Risk Analysis Methods.srt
7.6 KB
~Get Your Files Here !/3. IT Cyber Security Risk/2. Assets, threats, and vulnerabilities.mp4
41.24 MB
~Get Your Files Here !/3. IT Cyber Security Risk/2. Assets, threats, and vulnerabilities.srt
5.39 KB
~Get Your Files Here !/3. IT Cyber Security Risk/2.1 Cobalt Penetration Testing.html
92 B
~Get Your Files Here !/3. IT Cyber Security Risk/3. Organization’s crown jewels.mp4
64.01 MB
~Get Your Files Here !/3. IT Cyber Security Risk/3. Organization’s crown jewels.srt
7.39 KB
~Get Your Files Here !/3. IT Cyber Security Risk/4. The Risk-Based Security Approach.mp4
57.49 MB
~Get Your Files Here !/3. IT Cyber Security Risk/4. The Risk-Based Security Approach.srt
6.79 KB
~Get Your Files Here !/3. IT Cyber Security Risk/5. The Need For Risk Assessment.mp4
63.17 MB
~Get Your Files Here !/3. IT Cyber Security Risk/5. The Need For Risk Assessment.srt
6.17 KB
~Get Your Files Here !/3. IT Cyber Security Risk/6. Conducting an IT Risk Assessment.mp4
100.87 MB
~Get Your Files Here !/3. IT Cyber Security Risk/6. Conducting an IT Risk Assessment.srt
16.32 KB
~Get Your Files Here !/3. IT Cyber Security Risk/6.1 Conducting an IT Risk Assessment .docx
37.36 KB
~Get Your Files Here !/3. IT Cyber Security Risk/7. Business Impact Analysis (BIA).mp4
49.15 MB
~Get Your Files Here !/3. IT Cyber Security Risk/7. Business Impact Analysis (BIA).srt
8.47 KB
~Get Your Files Here !/3. IT Cyber Security Risk/8. A Risk Cost-Benefit Analysis.mp4
20.45 MB
~Get Your Files Here !/3. IT Cyber Security Risk/8. A Risk Cost-Benefit Analysis.srt
3.12 KB
~Get Your Files Here !/3. IT Cyber Security Risk/9. Enterprise Risk Management Strategy.mp4
94.8 MB
~Get Your Files Here !/3. IT Cyber Security Risk/9. Enterprise Risk Management Strategy.srt
10.27 KB
~Get Your Files Here !/4. NIST 800-37 R2 Risk Management Framework/1. NIST Risk Management Framework for Information Systems and Organization.mp4
73.66 MB
~Get Your Files Here !/4. NIST 800-37 R2 Risk Management Framework/1. NIST Risk Management Framework for Information Systems and Organization.srt
9.93 KB
~Get Your Files Here !/5. RMF Preparation Step 1/1. NIST Risk Management Preparation Strategy.mp4
46.57 MB
~Get Your Files Here !/5. RMF Preparation Step 1/1. NIST Risk Management Preparation Strategy.srt
7.3 KB
~Get Your Files Here !/6. RMF Categorize Information Systems Step 2/1. Define System Categorization, Scope, and Authorization Boundaries.mp4
65.94 MB
~Get Your Files Here !/6. RMF Categorize Information Systems Step 2/1. Define System Categorization, Scope, and Authorization Boundaries.srt
8.37 KB
~Get Your Files Here !/7. RMF Select Security Controls Step 3/1. Introduction to NIST Security Controls.mp4
40.27 MB
~Get Your Files Here !/7. RMF Select Security Controls Step 3/1. Introduction to NIST Security Controls.srt
6.07 KB
~Get Your Files Here !/7. RMF Select Security Controls Step 3/2. High Water Mark Concept and the Security Control Baseline.mp4
39.86 MB
~Get Your Files Here !/7. RMF Select Security Controls Step 3/2. High Water Mark Concept and the Security Control Baseline.srt
5.68 KB
~Get Your Files Here !/7. RMF Select Security Controls Step 3/3. Selecting NIST Security Controls.mp4
46.55 MB
~Get Your Files Here !/7. RMF Select Security Controls Step 3/3. Selecting NIST Security Controls.srt
6.79 KB
~Get Your Files Here !/8. RMF Implement NIST Security Controls step 4/1. NIST Security Controls Implementation.mp4
44.53 MB
~Get Your Files Here !/8. RMF Implement NIST Security Controls step 4/1. NIST Security Controls Implementation.srt
5.34 KB
~Get Your Files Here !/8. RMF Implement NIST Security Controls step 4/2. Tailoring NIST Control Baselines.mp4
34.28 MB
~Get Your Files Here !/8. RMF Implement NIST Security Controls step 4/2. Tailoring NIST Control Baselines.srt
3.92 KB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/1. Assigning NIST RMF Assessment Objectives.mp4
41.1 MB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/1. Assigning NIST RMF Assessment Objectives.srt
5.57 KB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/2. NIST Security Controls Assessment.mp4
67.13 MB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/2. NIST Security Controls Assessment.srt
8.35 KB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/3. Penetration Testing.mp4
25.86 MB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/3. Penetration Testing.srt
4.02 KB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/4. NIST RMF Assessment Results.mp4
75.32 MB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/4. NIST RMF Assessment Results.srt
9.4 KB
~Get Your Files Here !/Bonus Resources.txt
386 B

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。