:Search:

CBTNuggets ISACA CISM Certified Information Security Manager

Torrent:
Info Hash: 6819F87F2F4DAEEA7F85085FCC058416C394D88B
Similar Posts:
Name Uploaded Size Se Le Upl. by
2025-07-10 1.8 GB 2 3 freecoursewb
2023-06-03 3.7 GB 13 0 BarCraft
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 556
Type: Tutorials
Language: English
Category: Other
Size: 1.8 GB
Added: July 10, 2025, 7 a.m.
Peers: Seeders: 5, Leechers: 0 (Last updated: 5 months, 3 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 0 0
udp://exodus.desync.com:6969/announce 1 0 19
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 3 0 537
udp://tracker.torrent.eu.org:451/announce 0 0 0
udp://explodie.org:6969/announce 1 0 0
udp://tracker.birkenwald.de:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.rarbg.torrentbay.st:6969/announce 0 0 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 1. Organizational Culture.mp4 13.6 MB
  3. 2. Security Governance 1.mp4 19.4 MB
  4. 3. Security Governance 2.mp4 15.3 MB
  5. 4. The Importance of Strategy 1.mp4 16.8 MB
  6. 5. The Importance of Strategy 2.mp4 13.7 MB
  7. 6. Information Security Frameworks.mp4 14.3 MB
  8. 7. Strategic Objectives.mp4 18.1 MB
  9. 8. Business Model for Information Security (BMIS).mp4 12.6 MB
  10. 1. Security Operations Centers (SOCs) 1.mp4 22.8 MB
  11. 2. Security Operations Centers (SOCs) 2.mp4 17.0 MB
  12. 3. Vulnerability and Patch Management.mp4 10.4 MB
  13. 4. Protecting Networks Pt.1.mp4 28.4 MB
  14. 5. Protecting Networks Pt.2.mp4 33.8 MB
  15. 6. Content Filtering Solutions.mp4 20.7 MB
  16. 7. Endpoint Protection and Management.mp4 16.6 MB
  17. 1. Secure Software Development.mp4 14.3 MB
  18. 2. Identity & Access Management (IAM) 1.mp4 29.2 MB
  19. 3. Identity & Access Management (IAM) 2.mp4 11.9 MB
  20. 4. Security Awareness Training and MSSPs.mp4 23.6 MB
  21. 5. Data Backup and Recovery.mp4 31.7 MB
  22. 6. Financial and Capacity Management.mp4 21.3 MB
  23. 1. Security Controls.mp4 16.3 MB
  24. 2. Categories Of Security Controls.mp4 13.8 MB
  25. 3. Security Control Functions.mp4 10.6 MB
  26. 4. Testing Security Controls.mp4 16.6 MB
  27. 5. Security Control Objectives and Frameworks.mp4 14.7 MB
  28. 6. Designing Security Controls.mp4 10.9 MB
  29. 7. Key Performance Indicators (KPIs).mp4 16.7 MB
  30. 1. Phases Of Incident Response.mp4 15.7 MB
  31. 2. Incident Response Preparation.mp4 18.8 MB
  32. 3. Incident Response Planning.mp4 19.0 MB
  33. 4. Detection, Initiation and Evaluation Of Incidents.mp4 17.1 MB
  34. 5. Containment, Eradication and Recovery.mp4 11.1 MB
  35. 6. Post Incident Activities.mp4 11.2 MB
  36. 7. Incident Response Resources.mp4 12.7 MB
  37. 1. BC and DR Planning (BCDR).mp4 8.6 MB
  38. 2. The BCDR Planning Process.mp4 16.7 MB
  39. 3. Creating a BC Plan.mp4 12.6 MB
  40. 4. DR Planning.mp4 26.3 MB
  41. 5. Resiliency Technologies.mp4 19.4 MB
  42. 6. BCDR Testing.mp4 8.4 MB
  43. 7. BCDR Resources.mp4 17.1 MB
  44. 1. The P3 Policies, Processes and Procedures.mp4 22.1 MB
  45. 2. Standards, Guidelines and Architecture.mp4 23.8 MB
  46. 3. Controls, Metrics and Assets.mp4 19.9 MB
  47. 4. Risk Ledgers, Vulnerability Assessments and Insurance.mp4 14.5 MB
  48. 5. Critical Data, BIA's and BCDR Planning.mp4 22.7 MB
  49. 6. Incident Logs and Audits.mp4 10.9 MB
  50. 7. Information Security Training, 3rd Party Risk and LCR Requirements.mp4 19.8 MB
  51. 1. Creating A Business Case 1.mp4 22.6 MB
  52. 2. Creating A Business Case 2.mp4 8.7 MB
  53. 3. Communications and Reporting.mp4 22.0 MB
  54. 4. How To Communicate Technical Information.mp4 15.7 MB
  55. 5. Commitment From Management.mp4 34.9 MB
  56. 6. End User Information Security Training.mp4 23.2 MB
  57. 7. Causes Of Failure To Avoid.mp4 23.1 MB
  58. 1. Organization Level Roles.mp4 29.0 MB
  59. 2. Roles Pertaining To Our Data.mp4 9.6 MB
  60. 3. The World of Metrics.mp4 11.0 MB
  61. 4. Metrics Scenario 1.mp4 17.9 MB
  62. 5. Metrics Scenario 2.mp4 17.0 MB
  63. 6. Have We Achieved Success.mp4 11.1 MB
  64. 7. DAD Triad.mp4 5.0 MB
  65. 1. The Role of Risk Managent.mp4 18.0 MB
  66. 2. Risk Management Frameworks.mp4 24.7 MB
  67. 3. Risk Management Strategy 1.mp4 21.4 MB
  68. 4. Risk Management Strategy 2.mp4 14.6 MB
  69. 5. Analyzing Risk 1.mp4 27.6 MB
  70. 6. Analyzing Risk 2.mp4 13.8 MB
  71. 7. Risk Analysis Techniques.mp4 16.1 MB
  72. 8. Dealing With Risk.mp4 30.1 MB
  73. 1. Risk Management Activities.mp4 19.8 MB
  74. 2. NIST SP 800-39 Managing Information Security Risk.mp4 30.2 MB
  75. 3. NIST SP 800-30 Guide For Conducting Risk Assessments.mp4 22.6 MB
  76. 4. ISOIEC 27005 Guidance On Managing IS Risk.mp4 21.1 MB
  77. 5. Factor Analysis of Information Risk (FAIR).mp4 19.3 MB
  78. 6. Risk Management Walk-Through.mp4 17.0 MB
  79. 1. Hardware, Software and Information Assets.mp4 27.3 MB
  80. 2. Cloud and Virtual Assets.mp4 25.7 MB
  81. 3. Asset Information and Classification 1.mp4 18.1 MB
  82. 4. Asset Information and Classification 2.mp4 12.0 MB
  83. 5. Identifying Threats To Assets 1.mp4 18.6 MB
  84. 6. Identifying Threats To Assets 2.mp4 16.0 MB
  85. 7. Identifying Asset Vulnerabilities.mp4 19.4 MB
  86. 8. Bonus Nugget Nessus Vulnerability Scanner.mp4 33.8 MB
  87. 1. Risk Management Objectives Pt.1.mp4 24.7 MB
  88. 2. Risk Management Objectives Pt.2.mp4 25.9 MB
  89. 3. Third Party Risk Management Pt.1.mp4 30.0 MB
  90. 4. Third Party Risk Management Pt.2.mp4 19.8 MB
  91. 5. The Risk Register.mp4 12.5 MB
  92. 6. Integrating Risk Management Into Other Processes.mp4 20.4 MB
  93. 7. Risk Monitoring and Reporting.mp4 22.2 MB
  94. 1. Building Blocks Of An Information Security Program.mp4 15.8 MB
  95. 2. Information Security Program Details.mp4 16.2 MB
  96. 3. Information Security Architecture.mp4 21.0 MB
  97. 4. Security Program Management 1.mp4 21.9 MB
  98. 5. Security Program Management 2.mp4 15.9 MB
  99. 6. Security Policies.mp4 10.8 MB
  100. 7. Working With Resources.mp4 22.5 MB
  101. Bonus Resources.txt 70 bytes

Discussion