FileMood

Download CBR8711

CBR8711

Name

CBR8711

 DOWNLOAD Copy Link

Total Size

1.6 GB

Total Files

63

Hash

5B99A0A688D76913002B003875ED3AECDBF15F9A

/

0 Module 1: Welcome and Intro -- 0 1.1 Welcome and Introduction.mp4

21.3 MB

0 Module 1: Welcome and Intro -- 1 1.2 Who is ISACA?.mp4

9.7 MB

0 Module 1: Welcome and Intro -- 2 1.3 Who Should Take the CRISC?.mp4

13.8 MB

0 Module 1: Welcome and Intro -- 3 1.4 The Exam.mp4

13.3 MB

1 Module 2: Preliminary -- 0 2.1 Introduction to Information Security Risks.mp4

14.3 MB

1 Module 2: Preliminary -- 1 2.2 Risk Governance vs. Risk Management.mp4

27.9 MB

1 Module 2: Preliminary -- 2 2.3 Risk Definitions.mp4

46.6 MB

1 Module 2: Preliminary -- 3 2.4 IT Risk Management.mp4

25.1 MB

1 Module 2: Preliminary -- 4 2.5 IT Security Basics.mp4

27.0 MB

1 Module 2: Preliminary -- 5 2.6 Risk Management for IT Projects.mp4

23.2 MB

1 Module 2: Preliminary -- 6 2.7 ISACA_s Framework and Lifecycle.mp4

14.5 MB

1 Module 2: Preliminary -- 7 2.8 Review Questions.mp4

8.4 MB

2 Module 3: Risk Identification -- 0 3.1 Risk Identification Intro.mp4

9.0 MB

2 Module 3: Risk Identification -- 1 3.2 ISO 27005 Framework.mp4

39.3 MB

2 Module 3: Risk Identification -- 10 3.11 Risk Culture.mp4

35.1 MB

2 Module 3: Risk Identification -- 11 3.12 Roles and Responsibilities.mp4

35.6 MB

2 Module 3: Risk Identification -- 12 3.13 The Risk Register.mp4

37.8 MB

2 Module 3: Risk Identification -- 13 3.14 Risk Scenarios.mp4

29.1 MB

2 Module 3: Risk Identification -- 14 3.15 Hardware and Software Risks.mp4

23.8 MB

2 Module 3: Risk Identification -- 15 3.16 Network Risks.mp4

22.0 MB

2 Module 3: Risk Identification -- 16 3.17 Emerging Risks.mp4

13.9 MB

2 Module 3: Risk Identification -- 17 3.18 Third Party Risks.mp4

5.7 MB

2 Module 3: Risk Identification -- 2 3.3 NIST 800-39 Risk Framing.mp4

33.8 MB

2 Module 3: Risk Identification -- 3 3.4 NIST 800-39 Risk Assessment.mp4

3.6 MB

2 Module 3: Risk Identification -- 4 3.5 NIST 800-39 Risk Response.mp4

33.1 MB

2 Module 3: Risk Identification -- 5 3.6 NIST 800-39 Risk Monitoring.mp4

30.3 MB

2 Module 3: Risk Identification -- 6 3.7 NIST 800-30 Intro.mp4

12.9 MB

2 Module 3: Risk Identification -- 7 3.8 NIST 800-30 Risk Assessment Methodology.mp4

25.2 MB

2 Module 3: Risk Identification -- 8 3.9 NIST 800-37 Revision 1 and Revision 2.mp4

31.8 MB

2 Module 3: Risk Identification -- 9 3.10 Alignment with the Business.mp4

58.1 MB

3 Module 4: Risk Assessment -- 0 4.1 Risk Assessment Intro.mp4

8.2 MB

3 Module 4: Risk Assessment -- 1 4.2 Tools and Techniques Part 1.mp4

28.4 MB

3 Module 4: Risk Assessment -- 2 4.3 Tools and Techniques Part 2.mp4

27.2 MB

3 Module 4: Risk Assessment -- 3 4.4 Business Impact Analysis.mp4

35.6 MB

3 Module 4: Risk Assessment -- 4 4.5 Controls Assessment.mp4

6.0 MB

3 Module 4: Risk Assessment -- 5 4.6 Stride Threat Modeling.mp4

8.6 MB

3 Module 4: Risk Assessment -- 6 4.7 Gap Analysis.mp4

27.2 MB

3 Module 4: Risk Assessment -- 7 4.8 Risk Analysis Methodologies.mp4

79.1 MB

3 Module 4: Risk Assessment -- 8 4.9 Risk Assessment Report.mp4

13.8 MB

4 Module 5: Risk Mitigation -- 0 5.1 Risk Mitigation Reduction.mp4

19.1 MB

4 Module 5: Risk Mitigation -- 1 5.2 Risk Mitigation Transference and Acceptance.mp4

23.5 MB

4 Module 5: Risk Mitigation -- 10 5.11 Protecting the Network - Segmentation.mp4

17.7 MB

4 Module 5: Risk Mitigation -- 11 5.12 Protecting the Network - Wireless Security.mp4

17.2 MB

4 Module 5: Risk Mitigation -- 12 5.13 Protecting the Network - Services.mp4

15.3 MB

4 Module 5: Risk Mitigation -- 13 5.14 Protecting the Network Through Detection and Network Access Control.mp4

7.4 MB

4 Module 5: Risk Mitigation -- 14 5.15 Data and Endpoint Security.mp4

20.0 MB

4 Module 5: Risk Mitigation -- 15 5.16 Selecting a Mitigation Strategy.mp4

31.1 MB

4 Module 5: Risk Mitigation -- 16 5.17 Types of Mitigating Controls.mp4

41.4 MB

4 Module 5: Risk Mitigation -- 17 5.18 Identity and Access Management.mp4

16.1 MB

4 Module 5: Risk Mitigation -- 18 5.19 Third Party Governance.mp4

20.8 MB

4 Module 5: Risk Mitigation -- 19 5.20 Policies, Procedures, Standards, and Guidelines.mp4

14.8 MB

4 Module 5: Risk Mitigation -- 2 5.3 Information Security Concepts.mp4

33.8 MB

4 Module 5: Risk Mitigation -- 20 5.21 Certification and Accreditation.mp4

28.7 MB

4 Module 5: Risk Mitigation -- 3 5.4 Security Program Requirements.mp4

24.2 MB

4 Module 5: Risk Mitigation -- 4 5.5 Essential Elements of an Information Security Program.mp4

15.8 MB

4 Module 5: Risk Mitigation -- 5 5.6 Introduction to Information Security Frameworks - ISO 27002.mp4

58.0 MB

4 Module 5: Risk Mitigation -- 6 5.7 Information Security Frameworks.mp4

39.3 MB

4 Module 5: Risk Mitigation -- 7 5.8 Information Security Architecture.mp4

19.1 MB

4 Module 5: Risk Mitigation -- 8 5.9 Security Operations Event Monitoring.mp4

22.4 MB

4 Module 5: Risk Mitigation -- 9 5.10 Secure Engineering and Threat Modeling.mp4

24.9 MB

5 Module 6: Risk Monitoring and Control -- 0 6.1 Risk, Control Monitoring, and Reporting.mp4

29.4 MB

5 Module 6: Risk Monitoring and Control -- 1 6.2 Key Risk Indicators (KRIs).mp4

60.8 MB

5 Module 6: Risk Monitoring and Control -- 2 6.3 Tools for Risk Monitoring.mp4

32.0 MB

 

Total files 63


Copyright © 2024 FileMood.com