FileMood

Download [ DevCourseWeb.com ] Udemy - The Cyber Resilience Act (Cra) - A Practical Guide

DevCourseWeb com Udemy The Cyber Resilience Act Cra Practical Guide

Name

[ DevCourseWeb.com ] Udemy - The Cyber Resilience Act (Cra) - A Practical Guide

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

746.9 MB

Total Files

89

Last Seen

2025-04-13 00:48

Hash

E321B1C49FDFA98853F3D503291053A0B27C196A

/

Get Bonus Downloads Here.url

0.2 KB

/1 - Introduction/

1 - Introduction.mp4

37.3 MB

1 - S0-lecture0-Introduction.pdf

922.5 KB

2 - Course structure and supporting material.mp4

40.8 MB

2 - S0-lecture1-Course-Content.pdf

10.6 MB

/.../2 - The European Cyber Resilience Act/

10 - ANNEX I1.mp4

17.1 MB

10 - S1-lecture7-Annex-I.1.pdf

804.9 KB

11 - ANNEX I2.mp4

16.0 MB

11 - S1-lecture8-Annex-I.2.pdf

1.1 MB

12 - ANNEX II.mp4

14.8 MB

12 - S1-lecture9-ANNEX-II.pdf

1.2 MB

13 - Conformity of the Product with Digital Elements Chapter 3.mp4

21.6 MB

13 - S1-lecture10-Conformity-of-the-Product-with-Digital-Elements-Chapter-3.pdf

249.3 KB

14 - ANNEX V.mp4

3.9 MB

14 - S1-lecture11-ANNEX-V.pdf

193.9 KB

15 - ANNEX VI.mp4

1.6 MB

15 - S1-lecture12-ANNEX-VI.pdf

24.3 KB

16 - ANNEX VII.mp4

13.2 MB

16 - S1-lecture12-ANNEX-VII.pdf

396.2 KB

17 - ANNEX VIII.mp4

19.3 MB

17 - S1-lecture12-ANNEX-VIII.pdf

111.4 KB

18 - Notification of Conformity Assessment Bodies Chapter 4.mp4

5.3 MB

18 - S1-lecture13-Notification-of-Conformity-Assessment-Bodies-Chapter-4.pdf

63.8 KB

19 - Notification of Conformity Assessment Bodies Chapter 4 Actions.mp4

1.9 MB

20 - Market Surveillance and Enforcement Chapter 5.mp4

19.1 MB

20 - S1-lecture15-Market-Surveillance-and-Enforcement-Chapter-5.pdf

394.7 KB

21 - Market Surveillance and Enforcement Chapter 5 Actions.mp4

14.2 MB

22 - Delegated Powers and Committee Procedures Chapter 6.mp4

9.5 MB

22 - S1-lecture17-Delegated-Powers-and-Committee-Procedures-Chapter-6.pdf

222.2 KB

23 - Delegated Powers and Committee Procedures Chapter 6 Actions.mp4

9.1 MB

24 - Confidentiality and Penalties Chapter 7.mp4

12.4 MB

24 - S1-lecture19-Confidentiality-and-Penalties-Chapter-7.pdf

550.8 KB

25 - Confidentiality and Penalties Chapter 7 Actions.mp4

8.1 MB

26 - S1-lecture21-Transitional-and-Final-Provisions-Chapter-8.pdf

373.2 KB

26 - Transitional and Final Provisions Chapter 8.mp4

10.9 MB

27 - Transitional and Final Provisions Chapter 8 Actions.mp4

3.6 MB

3 - Introduction to the EU Cyber Resilience Act.mp4

23.1 MB

3 - S1-lecture0-Introduction-to-the-EU-Cyber-Resilience-Act.pdf

171.0 KB

4 - S1-lecture1-Understanding-Cybersecurity-in-the-EU.pdf

803.8 KB

4 - Understanding Cybersecurity in the EU.mp4

20.7 MB

5 - General Provisions Chapter 1.mp4

29.1 MB

5 - S1-lecture2-General-Provisions-Chapter-1.pdf

1.1 MB

6 - General Provisions Chapter 1 Actions.mp4

7.3 MB

7 - ANNEX III and ANNEX IV.mp4

12.2 MB

7 - S1-lecture4-ANNEX-III-and-ANNEX-IV.pdf

239.5 KB

8 - Obligations of Economic Operators Chapter 2.mp4

50.4 MB

8 - S1-lecture5-Obligations-of-Economic-Operators-Chapter-2.pdf

1.4 MB

9 - Obligations of Economic Operators Chapter 2 Actions.mp4

11.9 MB

/.../3 - HandsOn A practical example/

28 - S2-lecture0-Session-Intro.pdf

666.5 KB

28 - Session Intro.mp4

10.1 MB

29 - CRA Practical overview.mp4

20.6 MB

29 - CRA-Practical-overview-Diagram.pdf

125.6 KB

29 - S2-lecture1-CRA-Practical-overview.pdf

178.5 KB

30 - IEC 62443 and CRA.mp4

16.4 MB

30 - S2-lecture2-IEC-62443-and-CRA.pdf

248.5 KB

31 - Process 1 Decide product applicability.mp4

8.4 MB

31 - Process-1-Decide-product-applicability.pdf

71.4 KB

32 - Process 2 Establish economic operator.mp4

28.6 MB

32 - S2-lecture4-Process-2-Stablish-economic-operator.pdf

951.4 KB

33 - Process 3 Define product criticality.mp4

10.0 MB

33 - Process-3-Define-Product-Criticality.pdf

33.3 KB

34 - Outcome 1 Product Registry entry.mp4

11.3 MB

34 - Outcome-1-Product-Registry-Entry.pdf

46.6 KB

35 - Process 4 Security By design.mp4

12.2 MB

35 - S2-lecture7-Process-4-Security-By-design.pdf

102.7 KB

36 - Documented-Security-Context-Threat-Model.pdf

71.4 KB

36 - Outcome 2 Risk assessment Threat Model.mp4

22.0 MB

37 - Outcome 2 Risk assessment Security Analysis for Product Interfaces.mp4

12.8 MB

37 - Security-Analysis-for-Product-Interfaces.pdf

37.9 KB

38 - Outcome 3 Security verification testing and SBOM.mp4

41.6 MB

38 - Security-Verification-and-Validation-Testing.pdf

67.0 KB

39 - Outcome 4 User Documentation.mp4

26.8 MB

39 - Security-User-Documentation.pdf

58.3 KB

40 - Outcome 5 Risk Register.mp4

8.2 MB

40 - Risk-Register.pdf

30.7 KB

41 - Process 5 Vulnerability Handling.mp4

19.2 MB

41 - Vulnerability-Handling.pdf

119.6 KB

42 - Process 6 Conformity Assessment.mp4

8.5 MB

42 - S2-lecture14-Process-6-Conformity-Assessment.pdf

357.3 KB

43 - Outcome 6 Conformity Assessment.mp4

4.5 MB

43 - S2-lecture15-Outcome-6-Conformity-Assessment.pdf

31.1 KB

44 - Incident-Handling-Process.pdf

62.0 KB

44 - Process 7 Incident Handling.mp4

8.9 MB

45 - Process 8 Security Updates.mp4

7.8 MB

45 - Security-Updates.pdf

24.0 KB

46 - S2-lecture18-Session-Conclusion.pdf

177.2 KB

46 - Session Conclusion.mp4

4.7 MB

/4 - Recap/

47 - Recap.mp4

5.5 MB

/~Get Your Files Here !/

Bonus Resources.txt

0.4 KB

 

Total files 89


Copyright © 2025 FileMood.com