RAR-files |
linkedin.learning.learning.security.metrics-xqzt.rar |
50,000,000 |
859457A7 |
linkedin.learning.learning.security.metrics-xqzt.r00 |
50,000,000 |
5E7F4A6F |
linkedin.learning.learning.security.metrics-xqzt.r01 |
50,000,000 |
04FEAAC6 |
linkedin.learning.learning.security.metrics-xqzt.r02 |
50,000,000 |
6DE9291F |
linkedin.learning.learning.security.metrics-xqzt.r03 |
50,000,000 |
C4E5CABA |
linkedin.learning.learning.security.metrics-xqzt.r04 |
50,000,000 |
E7FFDF71 |
linkedin.learning.learning.security.metrics-xqzt.r05 |
6,037,368 |
9D016264 |
|
Total size: |
306,037,368 |
|
|
Archived
files |
01.01-why_are_security_metrics_important.mkv
[e256cc55466356d7]
|
14,127,240 |
FD639E5A |
02.01-cybersecurity_is_hard_to_measure.mkv
[b5ea3d72ea07b06b]
|
23,071,402 |
7D551DA7 |
02.02-cybersecurity_investment.mkv
[5209fbe3c30e1d05]
|
27,346,411 |
9E6FEAD0 |
02.03-define_success_for_a_cybersecurity_program.mkv
[db0765cb4cabd5dd]
|
21,140,475 |
421CE512 |
02.04-cybersecurity_program_maturity.mkv
[849f1307e12b0e14]
|
20,103,552 |
06198084 |
03.01-the_executive_mindset.mkv
[7be0886045248596]
|
26,274,163 |
A71AB82A |
03.02-the_business_mindset.mkv
[b1a2f8ec879e052d]
|
13,841,286 |
5FD0DD5C |
03.03-the_technical_leadership_mindset.mkv
[57c37ce15ab40083]
|
27,623,481 |
2B29C702 |
04.01-defining_a_risk_management_objective.mkv
[e4b3b3401b32a76a]
|
27,896,855 |
DC953A41 |
04.02-how_to_use_a_risk_management_objective.mkv
[965eb26e06da397]
|
13,874,847 |
721D2CA4 |
04.03-examples_of_risk_management_objectives.mkv
[f554090345df080a]
|
26,701,659 |
F4451837 |
05.01-incidents_detected_internally_vs._externally.mkv
[10c08cbe3ca34c60]
|
25,119,152 |
97C192C3 |
05.02-security_nps.mkv
[7fbe1f0208721558]
|
15,791,999 |
E213684F |
05.03-fixes_implemented_within_sla.mkv
[65c00985ebfa4224]
|
10,114,413 |
50BE5C1B |
06.01-apply_security_metrics.mkv
[3d915ff926a8672c]
|
12,945,199 |
9948F09A |
Ex_Files_Learning_Security_Metrics.zip |
63,251 |
147FB82A |
|
Total size: |
306,035,385 |
|
|