[ DevCourseWeb.com ] AKYLADE Cyber Risk Management Practitioner RMP-001 (A - CRMP) Cert Prep
File List
- ~Get Your Files Here !/06 - 5. Risk Management Framework/01 - Risk management.mp4 83.5 MB
- ~Get Your Files Here !/03 - 2. Risk Identification and Analysis/02 - Assess and analyze common threats and vulnerabilities.mp4 51.1 MB
- ~Get Your Files Here !/03 - 2. Risk Identification and Analysis/01 - Strategies to identify threats and vulnerabilities.mp4 49.9 MB
- ~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/04 - Risk mitigation measures and controls.mp4 36.0 MB
- ~Get Your Files Here !/01 - Introduction/01 - Introduction.mp4 32.1 MB
- ~Get Your Files Here !/02 - 1. Leading Risk Management/01 - Creation, development, and leadership of cross-functional teams.mp4 21.8 MB
- ~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/01 - Risk acceptance response.mp4 21.0 MB
- ~Get Your Files Here !/05 - 4. Compliance and Authorization/01 - Gap assessment.mp4 20.0 MB
- ~Get Your Files Here !/05 - 4. Compliance and Authorization/04 - Authorization of systems and processes.mp4 19.3 MB
- ~Get Your Files Here !/03 - 2. Risk Identification and Analysis/04 - Analyze and prioritize security risks.mp4 18.6 MB
- ~Get Your Files Here !/03 - 2. Risk Identification and Analysis/03 - Continuous risk assessment process.mp4 18.5 MB
- ~Get Your Files Here !/03 - 2. Risk Identification and Analysis/06 - Create a risk register.mp4 18.5 MB
- ~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/06 - Routine risk, security, or compliance audit.mp4 17.6 MB
- ~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/03 - Risk transference response.mp4 17.4 MB
- ~Get Your Files Here !/02 - 1. Leading Risk Management/03 - Regulations, standards, and guidelines.mp4 17.2 MB
- ~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/05 - Cost effectiveness of proposed measure or security control.mp4 16.2 MB
- ~Get Your Files Here !/02 - 1. Leading Risk Management/06 - Policies, guidelines, processes, and procedures.mp4 13.4 MB
- ~Get Your Files Here !/07 - Conclusion/01 - Course review.mp4 13.1 MB
- ~Get Your Files Here !/03 - 2. Risk Identification and Analysis/05 - Assess new and existing systems.mp4 11.6 MB
- ~Get Your Files Here !/05 - 4. Compliance and Authorization/02 - Compliance considerations.mp4 11.1 MB
- ~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/02 - Risk avoidance strategy.mp4 9.2 MB
- ~Get Your Files Here !/02 - 1. Leading Risk Management/02 - Governance structures.mp4 8.3 MB
- ~Get Your Files Here !/05 - 4. Compliance and Authorization/03 - Internal and external auditing procedures.mp4 8.2 MB
- ~Get Your Files Here !/02 - 1. Leading Risk Management/04 - Communicate, collaborate, and engage stakeholders.mp4 6.7 MB
- ~Get Your Files Here !/02 - 1. Leading Risk Management/05 - Cybersecurity training and exercises.mp4 6.0 MB
- ~Get Your Files Here !/06 - 5. Risk Management Framework/01 - Risk management.srt 48.7 KB
- ~Get Your Files Here !/03 - 2. Risk Identification and Analysis/02 - Assess and analyze common threats and vulnerabilities.srt 38.1 KB
- ~Get Your Files Here !/03 - 2. Risk Identification and Analysis/01 - Strategies to identify threats and vulnerabilities.srt 34.1 KB
- ~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/04 - Risk mitigation measures and controls.srt 26.2 KB
- ~Get Your Files Here !/03 - 2. Risk Identification and Analysis/04 - Analyze and prioritize security risks.srt 15.5 KB
- ~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/01 - Risk acceptance response.srt 15.4 KB
- ~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/03 - Risk transference response.srt 15.3 KB
- ~Get Your Files Here !/05 - 4. Compliance and Authorization/04 - Authorization of systems and processes.srt 14.9 KB
- ~Get Your Files Here !/03 - 2. Risk Identification and Analysis/06 - Create a risk register.srt 14.8 KB
- ~Get Your Files Here !/02 - 1. Leading Risk Management/01 - Creation, development, and leadership of cross-functional teams.srt 14.1 KB
- ~Get Your Files Here !/01 - Introduction/01 - Introduction.srt 14.0 KB
- ~Get Your Files Here !/03 - 2. Risk Identification and Analysis/03 - Continuous risk assessment process.srt 12.2 KB
- ~Get Your Files Here !/05 - 4. Compliance and Authorization/01 - Gap assessment.srt 11.9 KB
- ~Get Your Files Here !/02 - 1. Leading Risk Management/03 - Regulations, standards, and guidelines.srt 11.8 KB
- ~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/06 - Routine risk, security, or compliance audit.srt 11.4 KB
- ~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/05 - Cost effectiveness of proposed measure or security control.srt 11.1 KB
- ~Get Your Files Here !/03 - 2. Risk Identification and Analysis/05 - Assess new and existing systems.srt 9.2 KB
- ~Get Your Files Here !/05 - 4. Compliance and Authorization/02 - Compliance considerations.srt 9.2 KB
- ~Get Your Files Here !/02 - 1. Leading Risk Management/06 - Policies, guidelines, processes, and procedures.srt 8.9 KB
- ~Get Your Files Here !/05 - 4. Compliance and Authorization/03 - Internal and external auditing procedures.srt 8.2 KB
- ~Get Your Files Here !/07 - Conclusion/01 - Course review.srt 7.8 KB
- ~Get Your Files Here !/04 - 3. Risk Responses, Measures, and Controls/02 - Risk avoidance strategy.srt 6.9 KB
- ~Get Your Files Here !/02 - 1. Leading Risk Management/02 - Governance structures.srt 6.8 KB
- ~Get Your Files Here !/02 - 1. Leading Risk Management/04 - Communicate, collaborate, and engage stakeholders.srt 5.8 KB
- ~Get Your Files Here !/02 - 1. Leading Risk Management/05 - Cybersecurity training and exercises.srt 5.1 KB
- Get Bonus Downloads Here.url 182 bytes
- ~Get Your Files Here !/Bonus Resources.txt 70 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.