[ WebToolTip.com ] Udemy - Mastering NIST and ISO Cybersecurity Governance in 16 Steps
File List
- ~Get Your Files Here !/5 - Risk Identification and Prioritization/2 -Conduct ISONIST Risk Analysis.mp4 106.8 MB
- ~Get Your Files Here !/8 - Continuity & Recovery Planning/3 -Designing Continuity Plans.mp4 99.2 MB
- ~Get Your Files Here !/7 - Cloud and Privacy Integration/2 -Assess Privacy Gaps.mp4 99.0 MB
- ~Get Your Files Here !/4 - Leadership Engagement & Role Assignment/1 -Establish Sponsorship Channels.mp4 95.4 MB
- ~Get Your Files Here !/3 - Scoping and Context Definition/1 -Process Mapping for ISMS Scope.mp4 88.2 MB
- ~Get Your Files Here !/2 - Purpose-Driven Governance/2 -Define ISMS Success Criteria.mp4 85.8 MB
- ~Get Your Files Here !/2 - Purpose-Driven Governance/3 -Map Strategic Goals to NIST CSF.mp4 85.1 MB
- ~Get Your Files Here !/13 - Governance Automation & Optimization/2 -Template Reuse & Control Sync.mp4 83.4 MB
- ~Get Your Files Here !/3 - Scoping and Context Definition/3 -Contextualize Governance Risks.mp4 81.3 MB
- ~Get Your Files Here !/9 - Technical & Awareness Controls/1 -Technical Control Deployment.mp4 80.5 MB
- ~Get Your Files Here !/11 - Incident Response Readiness/2 -ISONIST IR Playbooks.mp4 79.3 MB
- ~Get Your Files Here !/13 - Governance Automation & Optimization/1 -AI-Powered Monitoring.mp4 77.3 MB
- ~Get Your Files Here !/8 - Continuity & Recovery Planning/2 -ISONIST Recovery Principles.mp4 72.6 MB
- ~Get Your Files Here !/9 - Technical & Awareness Controls/2 -Launch Awareness Training.mp4 70.1 MB
- ~Get Your Files Here !/6 - Control Selection and Mapping/1 -Use Control Mapping Tools.mp4 69.6 MB
- ~Get Your Files Here !/10 - Patch & Vulnerability Management/1 -Patch Methodologies Overview.mp4 69.2 MB
- ~Get Your Files Here !/5 - Risk Identification and Prioritization/3 -Define Risk Acceptance Criteria.mp4 66.7 MB
- ~Get Your Files Here !/6 - Control Selection and Mapping/2 -Tailor Controls to Risk Profile.mp4 63.2 MB
- ~Get Your Files Here !/4 - Leadership Engagement & Role Assignment/2 -Define Roles and RACI.mp4 62.9 MB
- ~Get Your Files Here !/10 - Patch & Vulnerability Management/2 -Automate Patch Monitoring.mp4 62.7 MB
- ~Get Your Files Here !/3 - Scoping and Context Definition/2 -Policy and Boundary Setting.mp4 61.3 MB
- ~Get Your Files Here !/11 - Incident Response Readiness/4 -Simulate IR Drill Planning.mp4 56.3 MB
- ~Get Your Files Here !/7 - Cloud and Privacy Integration/1 -Map Cloud Controls.mp4 52.7 MB
- ~Get Your Files Here !/12 - Performance Monitoring & Auditing/3 -Prepare Audit Evidence Logs.mp4 51.9 MB
- ~Get Your Files Here !/12 - Performance Monitoring & Auditing/2 -Develop Dashboards.mp4 51.1 MB
- ~Get Your Files Here !/2 - Purpose-Driven Governance/4 -Select Governance Tools and Inputs.mp4 44.4 MB
- ~Get Your Files Here !/1 - Course Introduction/1 -Intro Video to Course.mp4 41.0 MB
- ~Get Your Files Here !/12 - Performance Monitoring & Auditing/1 -Define KPIs & Tier Metrics.mp4 38.3 MB
- ~Get Your Files Here !/11 - Incident Response Readiness/3 -Define IR Roles & Teams.mp4 38.3 MB
- ~Get Your Files Here !/4 - Leadership Engagement & Role Assignment/3 -Leadership Approval Process.mp4 37.8 MB
- ~Get Your Files Here !/8 - Continuity & Recovery Planning/4 -Simulating Failover Workflows.mp4 37.6 MB
- ~Get Your Files Here !/13 - Governance Automation & Optimization/3 -Optimize Control Improvements.mp4 36.8 MB
- ~Get Your Files Here !/5 - Risk Identification and Prioritization/4 -Prioritize Control Objectives.mp4 36.3 MB
- ~Get Your Files Here !/10 - Patch & Vulnerability Management/3 -Track Remediation Logs.mp4 32.7 MB
- ~Get Your Files Here !/14 - Course Conclusion/1 -Course Wrap-up Video.mp4 32.6 MB
- ~Get Your Files Here !/7 - Cloud and Privacy Integration/3 -Write Privacy Addendum.mp4 31.6 MB
- ~Get Your Files Here !/6 - Control Selection and Mapping/3 -Document Mapping Justification.mp4 31.2 MB
- ~Get Your Files Here !/9 - Technical & Awareness Controls/3 -Secure Workflow Assignments.mp4 28.6 MB
- ~Get Your Files Here !/2 - Purpose-Driven Governance/1 -Module Introduction.mp4 27.1 MB
- ~Get Your Files Here !/5 - Risk Identification and Prioritization/1 -Module Introduction.mp4 25.6 MB
- ~Get Your Files Here !/8 - Continuity & Recovery Planning/1 -Module Introduction.mp4 24.6 MB
- ~Get Your Files Here !/11 - Incident Response Readiness/1 -Module Introduction.mp4 23.6 MB
- ~Get Your Files Here !/13 - Governance Automation & Optimization/4 -Module 4 HOL.pdf 218.5 KB
- ~Get Your Files Here !/14 - Course Conclusion/2 -Module 4 HOL.pdf 218.5 KB
- ~Get Your Files Here !/7 - Cloud and Privacy Integration/4 -Module 2 HOL.pdf 217.3 KB
- ~Get Your Files Here !/10 - Patch & Vulnerability Management/4 -Module 3 HOL.pdf 216.1 KB
- ~Get Your Files Here !/4 - Leadership Engagement & Role Assignment/4 -Module 1 HOL.pdf 215.3 KB
- ~Get Your Files Here !/4 - Leadership Engagement & Role Assignment/4 - The Role of Leadership in ISO 27001 Compliance.html 879 bytes
- ~Get Your Files Here !/7 - Cloud and Privacy Integration/4 - Introduction to the NIST Privacy Framework.html 821 bytes
- ~Get Your Files Here !/13 - Governance Automation & Optimization/4 - How Generative AI Helps Risk & Compliance.html 799 bytes
- ~Get Your Files Here !/10 - Patch & Vulnerability Management/4 - Patch Management Definition & Best Practices.html 766 bytes
- ~Get Your Files Here !/14 - Course Conclusion/2 - Project Simulate and Respond to a Multi-Layered Breach.html 543 bytes
- ~Get Your Files Here !/7 - Cloud and Privacy Integration/4 - Hands-On-Learning Map Privacy Controls Across ISO 27701 and NIST.html 489 bytes
- ~Get Your Files Here !/13 - Governance Automation & Optimization/4 - Hands-On-Learning Automate Governance Monitoring.html 477 bytes
- ~Get Your Files Here !/4 - Leadership Engagement & Role Assignment/4 - Hands-On-Learning Build a Governance RACI Matrix.html 469 bytes
- ~Get Your Files Here !/10 - Patch & Vulnerability Management/4 - Hands-On-Learning Create a Patch Management SOP.html 452 bytes
- Get Bonus Downloads Here.url 180 bytes
- ~Get Your Files Here !/Bonus Resources.txt 70 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.