FileMood

Download CBR44893

CBR44893

Name

CBR44893

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

1.0 GB

Total Files

51

Hash

4E0133A58F3EFD4E76A9DF08AAEB6AD68EC53DDA

/

0 Introduction -- 0 Introduction.mp4

11.9 MB

0 Introduction -- 1 Introduction to the CIS Top 20 Critical Security Controls.mp4

28.2 MB

1 Control 1: Inventory and Control of Hardware Assets -- 0 Overview of Control 1.mp4

20.7 MB

1 Control 1: Inventory and Control of Hardware Assets -- 1 Control 1 Mapping to the NIST Cybersecurity Framework.mp4

16.0 MB

1 Control 1: Inventory and Control of Hardware Assets -- 2 Run a Network Scan Using Nmap Lab Part 1.mp4

41.6 MB

1 Control 1: Inventory and Control of Hardware Assets -- 3 Run a Network Scan Using Nmap Lab Part 2.mp4

11.8 MB

10 Control 10: Data Recovery Capabilities -- 0 Overview of Control 10.mp4

21.8 MB

10 Control 10: Data Recovery Capabilities -- 1 Control 10 Mapping to the NIST Cybersecurity Framework.mp4

9.0 MB

10 Control 10: Data Recovery Capabilities -- 2 Data Backup and Recovery Lab.mp4

24.6 MB

11 Control 11: Secure Configuration for Network Devices, Such as Firewalls, Routers, and Switches -- 0 Overview of Control 11.mp4

24.3 MB

11 Control 11: Secure Configuration for Network Devices, Such as Firewalls, Routers, and Switches -- 1 Control 11 Mapping to the Cybersecurity Framework.mp4

11.2 MB

11 Control 11: Secure Configuration for Network Devices, Such as Firewalls, Routers, and Switches -- 2 Firewall Setup and Configuration Lab.mp4

9.8 MB

12 Control 12: Boundary Defense -- 0 Overview of Control 12.mp4

26.1 MB

12 Control 12: Boundary Defense -- 1 Control 12 Mapping to the NIST Cybersecurity Framework.mp4

17.1 MB

13 Control 13: Data Protection -- 0 Overview of Control 13.mp4

22.6 MB

13 Control 13: Data Protection -- 1 Control 13 Mapping to the NIST Cybersecurity Framework.mp4

16.9 MB

14 Control 14: Controlled Access Based on the Need to Know -- 0 Overview of Control 14.mp4

21.9 MB

14 Control 14: Controlled Access Based on the Need to Know -- 1 Control 14 Mapping to the NIST Cybersecurity Framework.mp4

15.2 MB

15 Control 15: Wireless Access Control -- 0 Overview of Control 15.mp4

19.9 MB

15 Control 15: Wireless Access Control -- 1 Control 15 Mapping to the NIST Cybersecurity Framework.mp4

16.3 MB

16 Control 16: Account Monitoring and Control -- 0 Overview of Control 16.mp4

32.5 MB

16 Control 16: Account Monitoring and Control -- 1 Control 16 Mapping to the NIST Cybersecurity Framework.mp4

25.4 MB

17 Control 17: Implement a Security Awareness and Training Program -- 0 Overview of Control 17.mp4

15.8 MB

17 Control 17: Implement a Security Awareness and Training Program -- 1 Control 17 Mapping to the NIST Cybersecurity Framework.mp4

26.6 MB

18 Control 18: Application Software Security -- 0 Overview of Control 18.mp4

24.3 MB

18 Control 18: Application Software Security -- 1 Control 18 Mapping to the NIST Cybersecurity Framework.mp4

16.2 MB

19 Control 19: Incident Response and Management -- 0 Overview of Control 19.mp4

21.5 MB

19 Control 19: Incident Response and Management -- 1 Control 19 Mapping to the NIST Cybersecurity Framework.mp4

14.8 MB

19 Control 19: Incident Response and Management -- 2 Performing an Initial Attack Analysis Lab.mp4

12.2 MB

19 Control 19: Incident Response and Management -- 4 Performing Incident Response in a Windows Environment Lab.mp4

14.3 MB

2 Control 2: Inventory and Control of Software Assets -- 0 Overview of Control 2.mp4

21.4 MB

2 Control 2: Inventory and Control of Software Assets -- 1 Control 2 Mapping to the NIST Cybersecurity Framework.mp4

15.8 MB

20 Control 20: Penetration Tests and Red Team Exercises -- 0 Overview of Control 20.mp4

20.0 MB

20 Control 20: Penetration Tests and Red Team Exercises -- 1 Control 20 Mapping to the NIST Cybersecurity Framework.mp4

14.2 MB

21 What Small and Medium Enterprises (SME) Need to Know about the CIS Controls -- 0 What SME_s Need to Know About CIS.mp4

34.9 MB

22 Conclusion -- 0 Conclusion.mp4

4.8 MB

3 Control 3: Continuous Vulnerability Management -- 0 Overview of Control 3.mp4

24.2 MB

3 Control 3: Continuous Vulnerability Management -- 1 Control 3 Mapping to the Cybersecurity Framework.mp4

13.2 MB

4 Control 4: Controlled Use of Administrative Privileges -- 0 Overview of Control 4.mp4

30.4 MB

4 Control 4: Controlled Use of Administrative Privileges -- 1 Control 4 Mapping to the NIST Cybersecurity Framework.mp4

19.1 MB

5 Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers -- 0 Overview of Control 5.mp4

19.5 MB

5 Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers -- 1 Control 5 Mapping to the NIST Cybersecurity Framework.mp4

11.4 MB

6 Control 6: Maintenance, Monitoring, and Analysis of Audit Logs -- 0 Overview of Control 6.mp4

18.1 MB

6 Control 6: Maintenance, Monitoring, and Analysis of Audit Logs -- 1 Control 6 Mapping to the NIST Cybersecurity Framework.mp4

16.5 MB

7 Control 7: Email and Web Browser Protections -- 0 Overview of Control 7.mp4

25.6 MB

7 Control 7: Email and Web Browser Protections -- 1 Control 7 Mapping to the NIST Cybersecurity Framework.mp4

19.7 MB

8 Control 8: Malware Defenses -- 0 Overview of Control 8.mp4

23.2 MB

8 Control 8: Malware Defenses -- 1 Control 8 Mapping to the NIST CSF.mp4

16.4 MB

8 Control 8: Malware Defenses -- 2 Analyze and Classify Malware Lab.mp4

44.9 MB

9 Control 9: Limitation and Control of Network Ports, Protocols, and Services -- 0 Overview of Control 9.mp4

17.8 MB

9 Control 9: Limitation and Control of Network Ports, Protocols, and Services -- 1 Control 9 Mapping to the NIST Cybersecurity Framework.mp4

8.4 MB

 

Total files 51


Copyright © 2025 FileMood.com