资源详情

返回首页 | 相关搜索
[ WebToolTip.com ] CBTNuggets - ISACA CISM - Certified Information Security Manager 2025
大小 1.81 GB
文件数 101
Info Hash: 6819F87F2F4DAEEA7F85085FCC058416C394D88B
收录时间 2026-01-18 23:45:51
更新时间 2026-01-18 23:45:51
文件列表 (101)
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1. Creating An Information Security Program/1. Organizational Culture.mp4
13.61 MB
~Get Your Files Here !/1. Creating An Information Security Program/2. Security Governance 1.mp4
19.38 MB
~Get Your Files Here !/1. Creating An Information Security Program/3. Security Governance 2.mp4
15.31 MB
~Get Your Files Here !/1. Creating An Information Security Program/4. The Importance of Strategy 1.mp4
16.81 MB
~Get Your Files Here !/1. Creating An Information Security Program/5. The Importance of Strategy 2.mp4
13.72 MB
~Get Your Files Here !/1. Creating An Information Security Program/6. Information Security Frameworks.mp4
14.27 MB
~Get Your Files Here !/1. Creating An Information Security Program/7. Strategic Objectives.mp4
18.07 MB
~Get Your Files Here !/1. Creating An Information Security Program/8. Business Model for Information Security (BMIS).mp4
12.61 MB
~Get Your Files Here !/10. Information Security Operations/1. Security Operations Centers (SOCs) 1.mp4
22.81 MB
~Get Your Files Here !/10. Information Security Operations/2. Security Operations Centers (SOCs) 2.mp4
17.01 MB
~Get Your Files Here !/10. Information Security Operations/3. Vulnerability and Patch Management.mp4
10.38 MB
~Get Your Files Here !/10. Information Security Operations/4. Protecting Networks Pt.1.mp4
28.4 MB
~Get Your Files Here !/10. Information Security Operations/5. Protecting Networks Pt.2.mp4
33.8 MB
~Get Your Files Here !/10. Information Security Operations/6. Content Filtering Solutions.mp4
20.7 MB
~Get Your Files Here !/10. Information Security Operations/7. Endpoint Protection and Management.mp4
16.65 MB
~Get Your Files Here !/11. Managing An Information Security Program/1. Secure Software Development.mp4
14.33 MB
~Get Your Files Here !/11. Managing An Information Security Program/2. Identity & Access Management (IAM) 1.mp4
29.25 MB
~Get Your Files Here !/11. Managing An Information Security Program/3. Identity & Access Management (IAM) 2.mp4
11.94 MB
~Get Your Files Here !/11. Managing An Information Security Program/4. Security Awareness Training and MSSPs.mp4
23.64 MB
~Get Your Files Here !/11. Managing An Information Security Program/5. Data Backup and Recovery.mp4
31.74 MB
~Get Your Files Here !/11. Managing An Information Security Program/6. Financial and Capacity Management.mp4
21.31 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/1. Security Controls.mp4
16.3 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/2. Categories Of Security Controls.mp4
13.78 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/3. Security Control Functions.mp4
10.6 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/4. Testing Security Controls.mp4
16.63 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/5. Security Control Objectives and Frameworks.mp4
14.74 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/6. Designing Security Controls.mp4
10.87 MB
~Get Your Files Here !/12. Implementing and Managing Security Controls/7. Key Performance Indicators (KPIs).mp4
16.69 MB
~Get Your Files Here !/13. The Incident Response Process/1. Phases Of Incident Response.mp4
15.67 MB
~Get Your Files Here !/13. The Incident Response Process/2. Incident Response Preparation.mp4
18.79 MB
~Get Your Files Here !/13. The Incident Response Process/3. Incident Response Planning.mp4
18.96 MB
~Get Your Files Here !/13. The Incident Response Process/4. Detection, Initiation and Evaluation Of Incidents.mp4
17.06 MB
~Get Your Files Here !/13. The Incident Response Process/5. Containment, Eradication and Recovery.mp4
11.14 MB
~Get Your Files Here !/13. The Incident Response Process/6. Post Incident Activities.mp4
11.24 MB
~Get Your Files Here !/13. The Incident Response Process/7. Incident Response Resources.mp4
12.66 MB
~Get Your Files Here !/14. BCDR Planning and Standards/1. BC and DR Planning (BCDR).mp4
8.64 MB
~Get Your Files Here !/14. BCDR Planning and Standards/2. The BCDR Planning Process.mp4
16.71 MB
~Get Your Files Here !/14. BCDR Planning and Standards/3. Creating a BC Plan.mp4
12.58 MB
~Get Your Files Here !/14. BCDR Planning and Standards/4. DR Planning.mp4
26.31 MB
~Get Your Files Here !/14. BCDR Planning and Standards/5. Resiliency Technologies.mp4
19.37 MB
~Get Your Files Here !/14. BCDR Planning and Standards/6. BCDR Testing.mp4
8.44 MB
~Get Your Files Here !/14. BCDR Planning and Standards/7. BCDR Resources.mp4
17.12 MB
~Get Your Files Here !/2. IS Program Resources/1. The P3 Policies, Processes and Procedures.mp4
22.07 MB
~Get Your Files Here !/2. IS Program Resources/2. Standards, Guidelines and Architecture.mp4
23.76 MB
~Get Your Files Here !/2. IS Program Resources/3. Controls, Metrics and Assets.mp4
19.9 MB
~Get Your Files Here !/2. IS Program Resources/4. Risk Ledgers, Vulnerability Assessments and Insurance.mp4
14.55 MB
~Get Your Files Here !/2. IS Program Resources/5. Critical Data, BIA's and BCDR Planning.mp4
22.65 MB
~Get Your Files Here !/2. IS Program Resources/6. Incident Logs and Audits.mp4
10.92 MB
~Get Your Files Here !/2. IS Program Resources/7. Information Security Training, 3rd Party Risk and LCR Requirements.mp4
19.76 MB
~Get Your Files Here !/3. Creating A Successful IS Program/1. Creating A Business Case 1.mp4
22.63 MB
~Get Your Files Here !/3. Creating A Successful IS Program/2. Creating A Business Case 2.mp4
8.65 MB
~Get Your Files Here !/3. Creating A Successful IS Program/3. Communications and Reporting.mp4
22.02 MB
~Get Your Files Here !/3. Creating A Successful IS Program/4. How To Communicate Technical Information.mp4
15.67 MB
~Get Your Files Here !/3. Creating A Successful IS Program/5. Commitment From Management.mp4
34.94 MB
~Get Your Files Here !/3. Creating A Successful IS Program/6. End User Information Security Training.mp4
23.18 MB
~Get Your Files Here !/3. Creating A Successful IS Program/7. Causes Of Failure To Avoid.mp4
23.14 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/1. Organization Level Roles.mp4
28.97 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/2. Roles Pertaining To Our Data.mp4
9.63 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/3. The World of Metrics.mp4
11.01 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/4. Metrics Scenario 1.mp4
17.94 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/5. Metrics Scenario 2.mp4
17.03 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/6. Have We Achieved Success.mp4
11.12 MB
~Get Your Files Here !/4. Organizational Roles and Using Metrics/7. DAD Triad.mp4
4.99 MB
~Get Your Files Here !/5. Introduction To Risk Management/1. The Role of Risk Managent.mp4
18.04 MB
~Get Your Files Here !/5. Introduction To Risk Management/2. Risk Management Frameworks.mp4
24.65 MB
~Get Your Files Here !/5. Introduction To Risk Management/3. Risk Management Strategy 1.mp4
21.45 MB
~Get Your Files Here !/5. Introduction To Risk Management/4. Risk Management Strategy 2.mp4
14.56 MB
~Get Your Files Here !/5. Introduction To Risk Management/5. Analyzing Risk 1.mp4
27.57 MB
~Get Your Files Here !/5. Introduction To Risk Management/6. Analyzing Risk 2.mp4
13.8 MB
~Get Your Files Here !/5. Introduction To Risk Management/7. Risk Analysis Techniques.mp4
16.09 MB
~Get Your Files Here !/5. Introduction To Risk Management/8. Dealing With Risk.mp4
30.12 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/1. Risk Management Activities.mp4
19.85 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/2. NIST SP 800-39 Managing Information Security Risk.mp4
30.21 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/3. NIST SP 800-30 Guide For Conducting Risk Assessments.mp4
22.58 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/4. ISOIEC 27005 Guidance On Managing IS Risk.mp4
21.07 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/5. Factor Analysis of Information Risk (FAIR).mp4
19.28 MB
~Get Your Files Here !/6. Risk Management Frameworks and Processes/6. Risk Management Walk-Through.mp4
16.99 MB
~Get Your Files Here !/7. Managing Assets and Threats/1. Hardware, Software and Information Assets.mp4
27.27 MB
~Get Your Files Here !/7. Managing Assets and Threats/2. Cloud and Virtual Assets.mp4
25.72 MB
~Get Your Files Here !/7. Managing Assets and Threats/3. Asset Information and Classification 1.mp4
18.15 MB
~Get Your Files Here !/7. Managing Assets and Threats/4. Asset Information and Classification 2.mp4
12.04 MB
~Get Your Files Here !/7. Managing Assets and Threats/5. Identifying Threats To Assets 1.mp4
18.62 MB
~Get Your Files Here !/7. Managing Assets and Threats/6. Identifying Threats To Assets 2.mp4
15.99 MB
~Get Your Files Here !/7. Managing Assets and Threats/7. Identifying Asset Vulnerabilities.mp4
19.36 MB
~Get Your Files Here !/7. Managing Assets and Threats/8. Bonus Nugget Nessus Vulnerability Scanner.mp4
33.76 MB
~Get Your Files Here !/8. Information Security Risk Management/1. Risk Management Objectives Pt.1.mp4
24.74 MB
~Get Your Files Here !/8. Information Security Risk Management/2. Risk Management Objectives Pt.2.mp4
25.91 MB
~Get Your Files Here !/8. Information Security Risk Management/3. Third Party Risk Management Pt.1.mp4
30.04 MB
~Get Your Files Here !/8. Information Security Risk Management/4. Third Party Risk Management Pt.2.mp4
19.8 MB
~Get Your Files Here !/8. Information Security Risk Management/5. The Risk Register.mp4
12.54 MB
~Get Your Files Here !/8. Information Security Risk Management/6. Integrating Risk Management Into Other Processes.mp4
20.38 MB
~Get Your Files Here !/8. Information Security Risk Management/7. Risk Monitoring and Reporting.mp4
22.2 MB
~Get Your Files Here !/9. Creating An Information Security Program/1. Building Blocks Of An Information Security Program.mp4
15.79 MB
~Get Your Files Here !/9. Creating An Information Security Program/2. Information Security Program Details.mp4
16.22 MB
~Get Your Files Here !/9. Creating An Information Security Program/3. Information Security Architecture.mp4
21 MB
~Get Your Files Here !/9. Creating An Information Security Program/4. Security Program Management 1.mp4
21.88 MB
~Get Your Files Here !/9. Creating An Information Security Program/5. Security Program Management 2.mp4
15.92 MB
~Get Your Files Here !/9. Creating An Information Security Program/6. Security Policies.mp4
10.75 MB
~Get Your Files Here !/9. Creating An Information Security Program/7. Working With Resources.mp4
22.48 MB
~Get Your Files Here !/Bonus Resources.txt
70 B

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。