Chapter 04 Security Operations/010. 4.9 - Given a scenario, use data sources to support an investigation.en.srt
8.35 KB
Chapter 04 Security Operations/010. 4.9 - Given a scenario, use data sources to support an investigation.mp4
16.97 MB
Chapter 05 Security Program Management and Oversight/001. 5.1 - Summarize elements of effective security governance.en.srt
11.88 KB
Chapter 05 Security Program Management and Oversight/001. 5.1 - Summarize elements of effective security governance.mp4
23.44 MB
Chapter 05 Security Program Management and Oversight/002. 5.2 - Explain elements of the risk management process.en.srt
11.53 KB
Chapter 05 Security Program Management and Oversight/002. 5.2 - Explain elements of the risk management process.mp4
24.04 MB
Chapter 05 Security Program Management and Oversight/003. 5.3 - Explain the processes associated with third-party risk assessment and management.en.srt
6.09 KB
Chapter 05 Security Program Management and Oversight/003. 5.3 - Explain the processes associated with third-party risk assessment and management.mp4
12.86 MB
Chapter 05 Security Program Management and Oversight/004. 5.4 - Summarize elements of effective security compliance.en.srt
6.71 KB
Chapter 05 Security Program Management and Oversight/004. 5.4 - Summarize elements of effective security compliance.mp4
12.91 MB
Chapter 05 Security Program Management and Oversight/005. 5.5 - Explain types and purposes of audits and assessments.en.srt
5.57 KB
Chapter 05 Security Program Management and Oversight/005. 5.5 - Explain types and purposes of audits and assessments.mp4
11.25 MB
Chapter 05 Security Program Management and Oversight/006. 5.6 - Given a scenario, implement security awareness practices.en.srt
11.78 KB
Chapter 05 Security Program Management and Oversight/006. 5.6 - Given a scenario, implement security awareness practices.mp4