FileMood

Download coursera-designing-and-executing-information-security-strategies

Coursera designing and executing information security strategies

Name

coursera-designing-and-executing-information-security-strategies

 DOWNLOAD Copy Link

Total Size

1.0 GB

Total Files

164

Last Seen

2024-11-13 23:20

Hash

55284A002672598923AF36BC55F3205B42C93B00

/assignments/

assignment_1.html

51.1 KB

assignment_2.html

52.8 KB

assignment_3.html

57.8 KB

/assignments/assignment_1_files/

204.js

6.3 KB

400.js

7.8 KB

abUtils.js

2.3 KB

assessApi.js

0.5 KB

catalogApi.js

0.5 KB

course.css

0.2 KB

flexjoinLastChanceModal.html.js

3.4 KB

form-core.js

14.5 KB

ga.js

43.1 KB

government_id.jpg

24.9 KB

header(1).js

0.1 KB

header.html.js

28.9 KB

header.js

2.1 KB

hg.css

30.2 KB

LearnerStoriesCollection.js

0.5 KB

LearnerStoryModel.js

0.2 KB

logo

54.4 KB

MathJax.js

50.4 KB

modernizr-custom.js

9.4 KB

path.js

0.2 KB

readme.js

4.9 KB

require.v2-1-1.js

22.8 KB

ribbon_stripes.png

5.7 KB

routes.js

1.1 MB

shim.css

14.5 KB

sidebar(1).js

0.1 KB

sidebar.html.js

9.2 KB

sidebar.js

4.2 KB

signature_track.js

5.1 KB

signatureTrackLastChanceModal.html.js

4.4 KB

spark.main.css

283.3 KB

university_logo

2.9 KB

webcam_keyboard.jpg

20.8 KB

/assignments/assignment_2_files/

204.js

6.3 KB

400.js

7.8 KB

abUtils.js

2.3 KB

assessApi.js

0.5 KB

catalogApi.js

0.5 KB

course.css

0.2 KB

flexjoinLastChanceModal.html.js

3.4 KB

form-core.js

14.5 KB

ga.js

43.1 KB

government_id.jpg

24.9 KB

header(1).js

0.1 KB

header.html.js

28.9 KB

header.js

2.1 KB

hg.css

30.2 KB

LearnerStoriesCollection.js

0.5 KB

LearnerStoryModel.js

0.2 KB

logo

54.4 KB

MathJax.js

50.4 KB

modernizr-custom.js

9.4 KB

path.js

0.2 KB

readme.js

4.9 KB

require.v2-1-1.js

22.8 KB

ribbon_stripes.png

5.7 KB

routes.js

1.1 MB

shim.css

14.5 KB

sidebar(1).js

0.1 KB

sidebar.html.js

9.2 KB

sidebar.js

4.2 KB

signature_track.js

5.1 KB

signatureTrackLastChanceModal.html.js

4.4 KB

spark.main.css

283.3 KB

university_logo

2.9 KB

webcam_keyboard.jpg

20.8 KB

/assignments/assignment_3_files/

204.js

6.3 KB

400.js

7.8 KB

abUtils.js

2.3 KB

assessApi.js

0.5 KB

catalogApi.js

0.5 KB

course.css

0.2 KB

flexjoinLastChanceModal.html.js

3.4 KB

form-core.js

14.5 KB

ga.js

43.1 KB

government_id.jpg

24.9 KB

header(1).js

0.1 KB

header.html.js

28.9 KB

header.js

2.1 KB

hg.css

30.2 KB

LearnerStoriesCollection.js

0.5 KB

LearnerStoryModel.js

0.2 KB

logo

54.4 KB

MathJax.js

50.4 KB

modernizr-custom.js

9.4 KB

path.js

0.2 KB

readme.js

4.9 KB

require.v2-1-1.js

22.8 KB

ribbon_stripes.png

5.7 KB

routes.js

1.1 MB

shim.css

14.5 KB

sidebar(1).js

0.1 KB

sidebar.html.js

9.2 KB

sidebar.js

4.2 KB

signature_track.js

5.1 KB

signatureTrackLastChanceModal.html.js

4.4 KB

spark.main.css

283.3 KB

university_logo

2.9 KB

webcam_keyboard.jpg

20.8 KB

/lectures/week1/

Designing and Executing Information Security Strategies 0.0 Part 1 - Course Overview (544).mp4

8.7 MB

Designing and Executing Information Security Strategies 0.1 Part 2 - HackMeCo Basics (1623).mp4

24.5 MB

Designing and Executing Information Security Strategies 0.2 Part 3 - Case 1 Background Part 1 of 2 (1655).mp4

25.3 MB

Designing and Executing Information Security Strategies 0.3 Part 4 - Case 1 Background Part 2 of 2 (1241).mp4

19.9 MB

Designing and Executing Information Security Strategies 0.4 Part 5 - Controls Review (914).mp4

14.5 MB

Designing and Executing Information Security Strategies 0.5 Part 6 - Case 1 (1108).mp4

17.8 MB

/lectures/week10/

Designing and Executing Information Security Strategies 9.0 Part 1 - Sources and Uses for Threat Information (705).mp4

10.3 MB

Designing and Executing Information Security Strategies 9.1 Part 2 - Sources of Threats Part 1 of 3 (935).mp4

14.2 MB

Designing and Executing Information Security Strategies 9.2 Part 3 - Sources of Threats Part 2 of 3 (958).mp4

14.5 MB

Designing and Executing Information Security Strategies 9.3 Part 4 - Sources of Threats Part 3 of 3 (815).mp4

11.9 MB

Designing and Executing Information Security Strategies 9.4 Part 5 - Why What and Who (756).mp4

11.4 MB

Designing and Executing Information Security Strategies 9.5 Part 6 - What to do With What You Find (758).mp4

11.6 MB

Designing and Executing Information Security Strategies 9.6 Bonus Lecture Part 1 of 2 (1232).mp4

52.2 MB

Designing and Executing Information Security Strategies 9.7 Bonus Lecture Part 2 of 2 (1233).mp4

56.3 MB

/lectures/week2/

Designing and Executing Information Security Strategies 1.0 Part 1 - Week 1 Review (617).mp4

9.8 MB

Designing and Executing Information Security Strategies 1.1 Part 2 - Incident Response Part 1 of 2 (1408).mp4

21.2 MB

Designing and Executing Information Security Strategies 1.2 Part 3 - Incident Response Part 2 of 2 (1401).mp4

21.0 MB

Designing and Executing Information Security Strategies 1.3 Part 4 - My Monday Part 1 of 2 (1528).mp4

23.5 MB

Designing and Executing Information Security Strategies 1.4 Part 5 - My Monday Part 2 of 2 (1508).mp4

23.2 MB

/lectures/week3/

Designing and Executing Information Security Strategies 2.0 Part 1 - Compliance (1438).mp4

22.0 MB

Designing and Executing Information Security Strategies 2.1 Part 2 - Penalties (828).mp4

12.8 MB

Designing and Executing Information Security Strategies 2.2 Part 3 - Complicated Landscape (607).mp4

9.5 MB

Designing and Executing Information Security Strategies 2.3 Part 4 - Compliance (1109).mp4

16.9 MB

Designing and Executing Information Security Strategies 2.4 Part 5 - Your Case (711).mp4

11.3 MB

/lectures/week4/

Designing and Executing Information Security Strategies 3.0 Part 1 - Approach to Lesson 3 (328).mp4

5.2 MB

Designing and Executing Information Security Strategies 3.1 Part 2 - Organizational Risk (1100).mp4

16.6 MB

Designing and Executing Information Security Strategies 3.2 Part 3 - Context - Who is Right (846).mp4

13.8 MB

Designing and Executing Information Security Strategies 3.3 Part 4 - Mini Assignment (144).mp4

2.7 MB

Designing and Executing Information Security Strategies 3.4 Part 5 - Information Assurance and Progress (757).mp4

12.8 MB

Designing and Executing Information Security Strategies 3.5 Part 6 - Enabling Information Assurance (1113).mp4

17.5 MB

/lectures/week5/

Designing and Executing Information Security Strategies 4.0 Part 1 - Your Case (548).mp4

9.2 MB

Designing and Executing Information Security Strategies 4.1 Part 2 - Week 4 Review (1054).mp4

16.2 MB

Designing and Executing Information Security Strategies 4.2 Part 3 - Liability Scenarios Part 1 of 3 (1221).mp4

18.7 MB

Designing and Executing Information Security Strategies 4.3 Part 4 - Liability Scenarios Part 2 of 3 (1110).mp4

16.8 MB

Designing and Executing Information Security Strategies 4.4 Part 5 - Liability Scenarios Part 3 of 3 (1413).mp4

22.0 MB

Designing and Executing Information Security Strategies 4.5 Part 6 - Glitter.com (1042).mp4

16.2 MB

/lectures/week6/

Designing and Executing Information Security Strategies 5.0 Part 1 - Water and Rats (721).mp4

10.9 MB

Designing and Executing Information Security Strategies 5.1 Part 2 - Go Native (407).mp4

6.0 MB

Designing and Executing Information Security Strategies 5.2 Part 3 - The CISO Part 1 of 2 (930).mp4

14.1 MB

Designing and Executing Information Security Strategies 5.3 Part 4 - The CISO Part 2 of 2 (915).mp4

13.8 MB

Designing and Executing Information Security Strategies 5.4 Part 5 - How Not To (1505).mp4

23.0 MB

Designing and Executing Information Security Strategies 5.5 Part 6 - Understanding Differences - Working with Them (1444).mp4

21.9 MB

/lectures/week7/

Designing and Executing Information Security Strategies 6.0 Part 1 - The Cloud Risks (437).mp4

6.8 MB

Designing and Executing Information Security Strategies 6.1 Part 2 - System Characterization Inputs (1101).mp4

16.2 MB

Designing and Executing Information Security Strategies 6.2 Part 3 - System Characterization Outputs (853).mp4

13.1 MB

Designing and Executing Information Security Strategies 6.3 Part 4 - Sensitivity Levels (640).mp4

10.1 MB

Designing and Executing Information Security Strategies 6.4 Part 5 - Threat Identification (801).mp4

12.0 MB

Designing and Executing Information Security Strategies 6.5 Part 6 - Vulnerability Identification (637).mp4

10.2 MB

Designing and Executing Information Security Strategies 6.6 Part 7 - Control Analysis (1117).mp4

16.4 MB

Designing and Executing Information Security Strategies 6.7 Part 8 - Compare the Cloud (647).mp4

10.2 MB

/lectures/week8/

Designing and Executing Information Security Strategies 7.0 Part 1 - Budget Decisions (1019).mp4

15.3 MB

Designing and Executing Information Security Strategies 7.1 Part 2 - Heartland Example (1123).mp4

17.1 MB

Designing and Executing Information Security Strategies 7.2 Part 3 - Accounting vs. Economics (825).mp4

12.8 MB

Designing and Executing Information Security Strategies 7.3 Part 4 - Financial Justification (1215).mp4

18.9 MB

Designing and Executing Information Security Strategies 7.4 Part 5 - Finance and Real Numbers (1311).mp4

20.0 MB

Designing and Executing Information Security Strategies 7.5 Part 6 - TJ Maxx (607).mp4

9.1 MB

/lectures/week9/

Designing and Executing Information Security Strategies 8.0 Part 1 - Privacy and Security Introduction (851).mp4

13.2 MB

Designing and Executing Information Security Strategies 8.1 Part 2 - Private Information (1022).mp4

15.4 MB

Designing and Executing Information Security Strategies 8.2 Part 3 - History of Privacy (858).mp4

13.4 MB

Designing and Executing Information Security Strategies 8.3 Part 4 - Scientific Methods Data (809).mp4

12.2 MB

Designing and Executing Information Security Strategies 8.4 Part 5 - Examples (1043).mp4

16.2 MB

Designing and Executing Information Security Strategies 8.5 Part 6 - Privacy Value and Concerns (1421).mp4

21.8 MB

 

Total files 164


Copyright © 2024 FileMood.com