Archived
files |
Information Security Manager - Information Risk Management\9.Monitoring Risk\66.Developing and Using KRIs.mp4
[ccf48948d3060cec]
|
2,260,851 |
CEA7BAC0 |
Information Security Manager - Information Risk Management\9.Monitoring Risk\64.Scenario - Risk Metrics at Globomantics.mp4
[1c4a0c4cb01b8da8]
|
2,888,755 |
F76E7B00 |
Information Security Manager - Information Risk Management\9.Monitoring Risk\70.Summary.mp4
[d28dc668d0fc8c2d]
|
909,692 |
DEE676F0 |
Information Security Manager - Information Risk Management\9.Monitoring Risk\65.Developing and Using KPIs.mp4
[e82f2441342dbf24]
|
3,369,545 |
04BC1BD0 |
Information Security Manager - Information Risk Management\9.Monitoring Risk\68.Monitoring Risk Factors.mp4
[2dd5a0c876fadf72]
|
4,579,376 |
9957B2F9 |
Information Security Manager - Information Risk Management\9.Monitoring Risk\62.Risk Factors.mp4
[b7d2c2a3d96eec96]
|
10,673,890 |
8368B13B |
Information Security Manager - Information Risk Management\9.Monitoring Risk\63.Risk Metrics.mp4
[f4a514abdd4f4fcb]
|
10,967,806 |
C3EE5311 |
Information Security Manager - Information Risk Management\9.Monitoring Risk\69.Risk Indicators at Globomantics.mp4
[a8b88c33f20c6c79]
|
6,360,237 |
2F8D7979 |
Information Security Manager - Information Risk Management\9.Monitoring Risk\67.Developing and Using KGIs.mp4
[8db740b148717ad2]
|
6,757,004 |
966CEFA4 |
Information Security Manager - Information Risk Management\5.Conducting Risk Assessments\34.Risk Assessments Using NIST RMF.mp4
[357fe09ec0c2e508]
|
6,079,772 |
EF0D3EA3 |
Information Security Manager - Information Risk Management\5.Conducting Risk Assessments\39.Scenario - Risk Assessments at Globomantics.mp4
[7ee60af235885388]
|
6,229,340 |
F0ED704B |
Information Security Manager - Information Risk Management\5.Conducting Risk Assessments\40.Summary.mp4
[e661357b0bebda06]
|
4,539,059 |
D35FE22D |
Information Security Manager - Information Risk Management\5.Conducting Risk Assessments\38.Reassessing Risk.mp4
[8cef42be3333c3e1]
|
4,623,912 |
31532C4C |
Information Security Manager - Information Risk Management\5.Conducting Risk Assessments\33.Risk Assessments.mp4
[efce55674c1c1715]
|
7,155,505 |
8B5A0706 |
Information Security Manager - Information Risk Management\5.Conducting Risk Assessments\30.Internal and External Risk Factors.mp4
[d94a02c0055fe5a6]
|
12,080,546 |
691DADB4 |
Information Security Manager - Information Risk Management\5.Conducting Risk Assessments\35.Conducting the NIST Assessment.mp4
[39dd7cbd9b5c6b8e]
|
8,372,890 |
EF6FD6C4 |
Information Security Manager - Information Risk Management\5.Conducting Risk Assessments\36.Quantitative and Qualitative Risk Analysis.mp4
[9cf25075f55d025c]
|
7,565,376 |
D4DDF330 |
Information Security Manager - Information Risk Management\5.Conducting Risk Assessments\32.Risk Scenarios.mp4
[2e5f54923290adbf]
|
7,054,130 |
E8D4ADA2 |
Information Security Manager - Information Risk Management\5.Conducting Risk Assessments\37.Calculating Risk.mp4
[52aea192e7c0973e]
|
5,964,089 |
3C6E3A8C |
Information Security Manager - Information Risk Management\5.Conducting Risk Assessments\31.Scenario - Internal and External Influences on Risk at Globomantics.mp4
[fb8895177e7bc271]
|
6,765,577 |
1BEEEEE2 |
Information Security Manager - Information Risk Management\8.Integrating Information Risk into Business and IT \56.Business Risk.mp4
[afe4bcf868ff357f]
|
13,218,576 |
74BC8616 |
Information Security Manager - Information Risk Management\8.Integrating Information Risk into Business and IT \58.IT Risk.mp4
[8c63439b017a1e87]
|
4,436,716 |
B1BC8D0B |
Information Security Manager - Information Risk Management\8.Integrating Information Risk into Business and IT \60.Scenario - Integrating Business and Security Risk at Globomantics.mp4
[56648760ba5d6d78]
|
4,402,034 |
67B89F56 |
Information Security Manager - Information Risk Management\8.Integrating Information Risk into Business and IT \61.Summary.mp4
[d2ea3366d22836ec]
|
596,280 |
784F8F54 |
Information Security Manager - Information Risk Management\8.Integrating Information Risk into Business and IT \57.Scenario - Internal and External Influences on Risk at Globomantics.mp4
[1f7a59aa18c1d3d5]
|
4,906,092 |
BD666CE0 |
Information Security Manager - Information Risk Management\8.Integrating Information Risk into Business and IT \59.Integrating Business and IT Risk.mp4
[ee00b3625978f7e0]
|
6,659,782 |
9E0E5000 |
Information Security Manager - Information Risk Management\7.Managing Information Security Controls\55.Summary.mp4
[3b36dfbf48327b2d]
|
1,201,305 |
A35D6CB4 |
Information Security Manager - Information Risk Management\7.Managing Information Security Controls\48.Introduction and Control Types.mp4
[9143d88f71a808e]
|
4,726,023 |
47E03140 |
Information Security Manager - Information Risk Management\7.Managing Information Security Controls\53.Control Analysis.mp4
[eea4465074e6f12]
|
5,320,156 |
3168BAD4 |
Information Security Manager - Information Risk Management\7.Managing Information Security Controls\52.Control Assessment.mp4
[7a374f5ced314a7b]
|
8,292,274 |
FE792AAE |
Information Security Manager - Information Risk Management\7.Managing Information Security Controls\54.Scenario - Control Effectiveness at Globomantics.mp4
[b0411e9b0939e2ed]
|
3,000,066 |
01DCB3B3 |
Information Security Manager - Information Risk Management\7.Managing Information Security Controls\50.Scenario - Security Controls at Globomantics.mp4
[44eebfdf9a129e32]
|
7,446,516 |
F6ABE26A |
Information Security Manager - Information Risk Management\7.Managing Information Security Controls\49.Control Functions.mp4
[f7a3c77f6009ef86]
|
5,019,237 |
5559ABD9 |
Information Security Manager - Information Risk Management\7.Managing Information Security Controls\51.Control Standards.mp4
[ef97a389d045591c]
|
5,846,790 |
8EFCAEA1 |
Information Security Manager - Information Risk Management\4.Elements of Risk\26.Impact.mp4
[a65ecdf1636fe6d7]
|
2,340,473 |
F72421AF |
Information Security Manager - Information Risk Management\4.Elements of Risk\25.Likelihood.mp4
[ee2477c135044294]
|
2,498,130 |
60B1F297 |
Information Security Manager - Information Risk Management\4.Elements of Risk\23.Threats and Threat Actors.mp4
[ed28e268e738ab00]
|
1,988,905 |
138702D5 |
Information Security Manager - Information Risk Management\4.Elements of Risk\28.Scenario - Risk Management at Globomantics.mp4
[4da22e030320cc47]
|
2,728,857 |
B787884F |
Information Security Manager - Information Risk Management\4.Elements of Risk\21.Describing Risk.mp4
[d5f9214881533ab2]
|
4,165,270 |
87142A77 |
Information Security Manager - Information Risk Management\4.Elements of Risk\27.Putting It All Together.mp4
[b01a9ead5636daee]
|
7,079,667 |
6B6CFB72 |
Information Security Manager - Information Risk Management\4.Elements of Risk\29.Summary.mp4
[98a8a34f23374714]
|
1,439,549 |
8E91E326 |
Information Security Manager - Information Risk Management\4.Elements of Risk\22.Risk Strategy.mp4
[3fb51f592c9ad8ec]
|
6,903,000 |
F060C171 |
Information Security Manager - Information Risk Management\4.Elements of Risk\24.Vulnerabilities and Assets.mp4
[99f5b3840d4c2d]
|
4,999,721 |
6600987E |
Information Security Manager - Information Risk Management\1.Course Overview\01.Course Overview.mp4
[7441928b51ba88d3]
|
3,880,999 |
0D6BD0E1 |
Information Security Manager - Information Risk Management\3.Determining Legal and Regulatory Risk Management Requirements \17.PCI-DSS.mp4
[6ff034221e9eb645]
|
5,933,763 |
4A4D54D7 |
Information Security Manager - Information Risk Management\3.Determining Legal and Regulatory Risk Management Requirements \15.FISMA and NIST.mp4
[c8887697826ee6db]
|
5,470,614 |
EF2898FA |
Information Security Manager - Information Risk Management\3.Determining Legal and Regulatory Risk Management Requirements \16.HIPAA.mp4
[1bf4e7d6d0067d17]
|
6,524,381 |
5F567AEA |
Information Security Manager - Information Risk Management\3.Determining Legal and Regulatory Risk Management Requirements \19.Scenario - Risk Management Governance at Globomantics.mp4
[d8c02ed5a0efd8ac]
|
3,383,530 |
AAC7488C |
Information Security Manager - Information Risk Management\3.Determining Legal and Regulatory Risk Management Requirements \13.Legal Requirements and Risk.mp4
[3bf89e59d69ac4c9]
|
8,848,101 |
0F357CFC |
Information Security Manager - Information Risk Management\3.Determining Legal and Regulatory Risk Management Requirements \18.Other Regulatory Risk Management Requirements.mp4
[bd056d043f2783fc]
|
5,212,906 |
2E14AB3B |
Information Security Manager - Information Risk Management\3.Determining Legal and Regulatory Risk Management Requirements \14.Scenario - Legal Requirements for Risk Management at Globomantics.mp4
[36b2222d3a518edd]
|
2,502,702 |
CF1E1FBD |
Information Security Manager - Information Risk Management\3.Determining Legal and Regulatory Risk Management Requirements \20.Summary.mp4
[96032ee0730b1b0d]
|
1,500,982 |
4F58A84D |
Information Security Manager - Information Risk Management\2.Managing Organizational Information Assets \07.Scenario - Classifying Globomantics’ |
6,871,354 |
D65E69C1 |
Information Security Manager - Information Risk Management\2.Managing Organizational Information Assets \11.Scenario - Asigning Value to Globomantics' Assets.mp4
[2a7db67c8ced886c]
|
10,819,173 |
FA0CF2FA |
Information Security Manager - Information Risk Management\2.Managing Organizational Information Assets \06.Classifying Information Assets.mp4
[6b8440b87c265233]
|
7,574,304 |
9C4FC173 |
Information Security Manager - Information Risk Management\2.Managing Organizational Information Assets \10.Assigning Information Asset Value.mp4
[14e2cd35c2fd88f1]
|
14,359,224 |
E0913AA1 |
Information Security Manager - Information Risk Management\2.Managing Organizational Information Assets \08.Information Asset and Risk Ownership.mp4
[103dd62921591]
|
5,548,989 |
4B06954F |
Information Security Manager - Information Risk Management\2.Managing Organizational Information Assets \03.Scenario - Globomanti |
4,231,400 |
E6EC18A7 |
Information Security Manager - Information Risk Management\2.Managing Organizational Information Assets \04.Understanding Asset Value.mp4
[8000c1f9dcd4916]
|
4,902,639 |
A7C5F048 |
Information Security Manager - Information Risk Management\2.Managing Organizational Information Assets \05.Scenario - Placing Value on Globomantics’ |
5,207,091 |
BDDCD6C2 |
Information Security Manager - Information Risk Management\2.Managing Organizational Information Assets \02.Identifying Information Asset.mp4
[52e20a1ec310c74e]
|
7,169,919 |
0582F2CF |
Information Security Manager - Information Risk Management\2.Managing Organizational Information Assets \09.Scenario - Information Asset and Risk Ownership at Globomantics.mp4
[3cc7335441e8b0a1]
|
9,023,899 |
AEF956A9 |
Information Security Manager - Information Risk Management\2.Managing Organizational Information Assets \12.Summary.mp4
[944dd52286c99ea8]
|
1,635,774 |
B0FA61E8 |
Information Security Manager - Information Risk Management\6.Implementing Risk Treatment and Response\43.Cost_benefit Analysis.mp4
[47d4b9ec281f7009]
|
9,838,869 |
01723E83 |
Information Security Manager - Information Risk Management\6.Implementing Risk Treatment and Response\45.Responding to Risk.mp4
[5a529616a6a97e20]
|
7,591,074 |
BC473E25 |
Information Security Manager - Information Risk Management\6.Implementing Risk Treatment and Response\47.Summary.mp4
[1a9ea4e6e9001f8c]
|
1,344,208 |
6E093E81 |
Information Security Manager - Information Risk Management\6.Implementing Risk Treatment and Response\44.Prioritizing Risk Response Options.mp4
[760342e379ef3cd8]
|
2,719,625 |
EB6A8339 |
Information Security Manager - Information Risk Management\6.Implementing Risk Treatment and Response\41.Implementing Risk Response.mp4
[be5058dad56ad618]
|
1,797,390 |
799D4C23 |
Information Security Manager - Information Risk Management\6.Implementing Risk Treatment and Response\42.Risk Response Options.mp4
[18b061f5d85da942]
|
10,275,547 |
4C32F281 |
Information Security Manager - Information Risk Management\6.Implementing Risk Treatment and Response\46.Scenario - Risk Assessments at Globomantics.mp4
[44b88e7064184c9d]
|
2,852,661 |
F791728F |
Information Security Manager - Information Risk Management\10.Reporting Risk \75.Summary.mp4
[c167cd0f9e2d1101]
|
1,012,699 |
9C1FEFE3 |
Information Security Manager - Information Risk Management\10.Reporting Risk \74.Risk Reports and Practices.mp4
[994b12728fb8cf62]
|
6,737,835 |
962E5E62 |
Information Security Manager - Information Risk Management\10.Reporting Risk \71.Reporting Compliance vs. Risk.mp4
[7390d9a441389900]
|
7,595,001 |
4520F3D9 |
Information Security Manager - Information Risk Management\10.Reporting Risk \73.Translating IT Risk to Business Risk.mp4
[ed772c03461b0263]
|
10,438,797 |
7DF6E0C9 |
Information Security Manager - Information Risk Management\10.Reporting Risk \72.Reporting Likelihood and Impact.mp4
[dc5cb7d2f0ce949f]
|
3,128,998 |
3D05CACB |
Information Security Manager - Information Risk Management\9.Monitoring Risk |
0 |
00000000 |
Information Security Manager - Information Risk Management\5.Conducting Risk Assessments |
0 |
00000000 |
Information Security Manager - Information Risk Management\8.Integrating Information Risk into Business and IT |
0 |
00000000 |
Information Security Manager - Information Risk Management\7.Managing Information Security Controls |
0 |
00000000 |
Information Security Manager - Information Risk Management\4.Elements of Risk |
0 |
00000000 |
Information Security Manager - Information Risk Management\1.Course Overview |
0 |
00000000 |
Information Security Manager - Information Risk Management\3.Determining Legal and Regulatory Risk Management Requirements |
0 |
00000000 |
Information Security Manager - Information Risk Management\2.Managing Organizational Information Assets |
0 |
00000000 |
Information Security Manager - Information Risk Management\6.Implementing Risk Treatment and Response |
0 |
00000000 |
Information Security Manager - Information Risk Management\10.Reporting Risk |
0 |
00000000 |
Information Security Manager - Information Risk Management |
0 |
00000000 |
|
Total size: |
420,347,219 |
|
|