Magnetic link has been copied to the cutting board

Name [ DevCourseWeb.com ] Udemy - IT Cyber Security NIST Risk Management Framework

File Type video

Size 1.84GB

UpdateDate 2024-9-15

hash *****9605DC589B4074A920952E94B2AF39072F

Hot 92

Files Get Bonus Downloads Here.url | 182B ~Get Your Files Here !/1. Introduction/1. What You will learn in this course.mp4 | 32.25MB ~Get Your Files Here !/1. Introduction/1. What You will learn in this course.srt | 4.51KB ~Get Your Files Here !/1. Introduction/1.2 IT Cyber Security NIST Risk Management Framework.pdf | 2.10MB ~Get Your Files Here !/1. Introduction/1.3 My published Book on Amazon Store.html | 97B ~Get Your Files Here !/1. Introduction/2. Introduction.mp4 | 76.61MB ~Get Your Files Here !/1. Introduction/2. Introduction.srt | 6.46KB ~Get Your Files Here !/1. Introduction/3. Integrating Cybersecurity and ERM.mp4 | 31.70MB ~Get Your Files Here !/1. Introduction/3. Integrating Cybersecurity and ERM.srt | 3.95KB ~Get Your Files Here !/1. Introduction/Exercise Files/CIS_Controls_v8_Mapping_to_NIST_SP_800_53_Rev_5_Low_Baseline_06_21_20.xlsx | 416.62KB ~Get Your Files Here !/1. Introduction/Exercise Files/Controlled Unclassified Information (CUI) -SSP-Template-final.docx | 69.65KB ~Get Your Files Here !/1. Introduction/Exercise Files/Copy of SSP-A13-FedRAMP-Integrated-Inventory-Workbook-Template.xlsx | 292.01KB ~Get Your Files Here !/1. Introduction/Exercise Files/IC-Security-Gap-Analysis-9197.xlsx | 75.27KB ~Get Your Files Here !/1. Introduction/Exercise Files/NIST_CSF_Risk_template_DL.xlsx | 48.67KB ~Get Your Files Here !/1. Introduction/Exercise Files/POAM_example_DL.xlsx | 11.97KB ~Get Your Files Here !/1. Introduction/Exercise Files/SSP A13 FedRAMP Integrated Inventory Template.xlsx | 292.11KB ~Get Your Files Here !/1. Introduction/Exercise Files/SSP Template.docx | 61.46KB ~Get Your Files Here !/1. Introduction/Exercise Files/business-impact-analysis-worksheet.pdf | 37.42KB ~Get Your Files Here !/1. Introduction/Exercise Files/business_risk-assessment-table.pdf | 106.42KB ~Get Your Files Here !/1. Introduction/NIST.IR.8286.pdf | 2.18MB ~Get Your Files Here !/1. Introduction/NIST.IR.8286A.pdf | 2.75MB ~Get Your Files Here !/1. Introduction/NIST.SP.800-171r2.pdf | 1.25MB ~Get Your Files Here !/1. Introduction/NIST.SP.800-37r2.pdf | 2.18MB ~Get Your Files Here !/1. Introduction/NIST.SP.800-53Ar5-draft.pdf | 4.97MB ~Get Your Files Here !/1. Introduction/NIST.SP.800-53B.pdf | 1.55MB ~Get Your Files Here !/1. Introduction/NIST.SP.800-53r5.pdf | 5.79MB ~Get Your Files Here !/1. Introduction/nistspecialpublication800-30r1.pdf | 807.52KB ~Get Your Files Here !/10. RMF Authorize Information System step 6/1. RMF Authorization.mp4 | 34.14MB ~Get Your Files Here !/10. RMF Authorize Information System step 6/1. RMF Authorization.srt | 4.57KB ~Get Your Files Here !/11. RMF Monitor Security Controls step 7/1. NIST RMF Monitoring.mp4 | 65.07MB ~Get Your Files Here !/11. RMF Monitor Security Controls step 7/1. NIST RMF Monitoring.srt | 7.84KB ~Get Your Files Here !/11. RMF Monitor Security Controls step 7/2. Monitoring is an Ongoing Process.mp4 | 61.28MB ~Get Your Files Here !/11. RMF Monitor Security Controls step 7/2. Monitoring is an Ongoing Process.srt | 9.28KB ~Get Your Files Here !/12. NIST RMF Knowledge Resources and Best Practices/1. Tips For Streamlining RMF Implementation.mp4 | 16.71MB ~Get Your Files Here !/12. NIST RMF Knowledge Resources and Best Practices/1. Tips For Streamlining RMF Implementation.srt | 2.74KB ~Get Your Files Here !/12. NIST RMF Knowledge Resources and Best Practices/2. NIST RMF Best practices and Knowledge Resources.mp4 | 48.63MB ~Get Your Files Here !/12. NIST RMF Knowledge Resources and Best Practices/2. NIST RMF Best practices and Knowledge Resources.srt | 6.62KB ~Get Your Files Here !/13. CMMI maturity model and NIST RMF/1. NIST CMMI Maturity Model.mp4 | 33.94MB ~Get Your Files Here !/13. CMMI maturity model and NIST RMF/1. NIST CMMI Maturity Model.srt | 4.27KB ~Get Your Files Here !/14. Cyber Security Risk Metrics Indicators/1. Cyber Security Risk Metrics and Performance indicators.mp4 | 57.70MB ~Get Your Files Here !/14. Cyber Security Risk Metrics Indicators/1. Cyber Security Risk Metrics and Performance indicators.srt | 7.65KB ~Get Your Files Here !/15. NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs)/1. NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs).mp4 | 23.97MB ~Get Your Files Here !/15. NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs)/1. NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs).srt | 2.54KB ~Get Your Files Here !/15. NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs)/1.1 15 NIST RMF Quick Start Guide.docx | 25.27KB ~Get Your Files Here !/16. Conclusions/1. Conclusions.mp4 | 37.43MB ~Get Your Files Here !/16. Conclusions/1. Conclusions.srt | 3.61KB ~Get Your Files Here !/2. The Course case study/1. Target Cloud Inc. Case Study.mp4 | 57.66MB ~Get Your Files Here !/2. The Course case study/1. Target Cloud Inc. Case Study.srt | 4.21KB ~Get Your Files Here !/2. The Course case study/1.1 Target Cloud Inc Case Study.docx | 56.02KB ~Get Your Files Here !/3. IT Cyber Security Risk/1. What is Risk .mp4 | 115.22MB ~Get Your Files Here !/3. IT Cyber Security Risk/1. What is Risk .srt | 9.49KB ~Get Your Files Here !/3. IT Cyber Security Risk/10. Risk Analysis Methods.mp4 | 75.77MB ~Get Your Files Here !/3. IT Cyber Security Risk/10. Risk Analysis Methods.srt | 7.60KB ~Get Your Files Here !/3. IT Cyber Security Risk/2. Assets, threats, and vulnerabilities.mp4 | 41.24MB ~Get Your Files Here !/3. IT Cyber Security Risk/2. Assets, threats, and vulnerabilities.srt | 5.39KB ~Get Your Files Here !/3. IT Cyber Security Risk/2.1 Cobalt Penetration Testing.html | 92B ~Get Your Files Here !/3. IT Cyber Security Risk/3. Organization’s crown jewels.mp4 | 64.01MB ~Get Your Files Here !/3. IT Cyber Security Risk/3. Organization’s crown jewels.srt | 7.39KB ~Get Your Files Here !/3. IT Cyber Security Risk/4. The Risk-Based Security Approach.mp4 | 57.49MB ~Get Your Files Here !/3. IT Cyber Security Risk/4. The Risk-Based Security Approach.srt | 6.79KB ~Get Your Files Here !/3. IT Cyber Security Risk/5. The Need For Risk Assessment.mp4 | 63.17MB ~Get Your Files Here !/3. IT Cyber Security Risk/5. The Need For Risk Assessment.srt | 6.17KB ~Get Your Files Here !/3. IT Cyber Security Risk/6. Conducting an IT Risk Assessment.mp4 | 100.87MB ~Get Your Files Here !/3. IT Cyber Security Risk/6. Conducting an IT Risk Assessment.srt | 16.32KB ~Get Your Files Here !/3. IT Cyber Security Risk/6.1 Conducting an IT Risk Assessment .docx | 37.36KB ~Get Your Files Here !/3. IT Cyber Security Risk/7. Business Impact Analysis (BIA).mp4 | 49.15MB ~Get Your Files Here !/3. IT Cyber Security Risk/7. Business Impact Analysis (BIA).srt | 8.47KB ~Get Your Files Here !/3. IT Cyber Security Risk/8. A Risk Cost-Benefit Analysis.mp4 | 20.45MB ~Get Your Files Here !/3. IT Cyber Security Risk/8. A Risk Cost-Benefit Analysis.srt | 3.12KB ~Get Your Files Here !/3. IT Cyber Security Risk/9. Enterprise Risk Management Strategy.mp4 | 94.80MB ~Get Your Files Here !/3. IT Cyber Security Risk/9. Enterprise Risk Management Strategy.srt | 10.27KB ~Get Your Files Here !/4. NIST 800-37 R2 Risk Management Framework/1. NIST Risk Management Framework for Information Systems and Organization.mp4 | 73.66MB ~Get Your Files Here !/4. NIST 800-37 R2 Risk Management Framework/1. NIST Risk Management Framework for Information Systems and Organization.srt | 9.93KB ~Get Your Files Here !/5. RMF Preparation Step 1/1. NIST Risk Management Preparation Strategy.mp4 | 46.57MB ~Get Your Files Here !/5. RMF Preparation Step 1/1. NIST Risk Management Preparation Strategy.srt | 7.30KB ~Get Your Files Here !/6. RMF Categorize Information Systems Step 2/1. Define System Categorization, Scope, and Authorization Boundaries.mp4 | 65.94MB ~Get Your Files Here !/6. RMF Categorize Information Systems Step 2/1. Define System Categorization, Scope, and Authorization Boundaries.srt | 8.37KB ~Get Your Files Here !/7. RMF Select Security Controls Step 3/1. Introduction to NIST Security Controls.mp4 | 40.27MB ~Get Your Files Here !/7. RMF Select Security Controls Step 3/1. Introduction to NIST Security Controls.srt | 6.07KB ~Get Your Files Here !/7. RMF Select Security Controls Step 3/2. High Water Mark Concept and the Security Control Baseline.mp4 | 39.86MB ~Get Your Files Here !/7. RMF Select Security Controls Step 3/2. High Water Mark Concept and the Security Control Baseline.srt | 5.68KB ~Get Your Files Here !/7. RMF Select Security Controls Step 3/3. Selecting NIST Security Controls.mp4 | 46.55MB ~Get Your Files Here !/7. RMF Select Security Controls Step 3/3. Selecting NIST Security Controls.srt | 6.79KB ~Get Your Files Here !/8. RMF Implement NIST Security Controls step 4/1. NIST Security Controls Implementation.mp4 | 44.53MB ~Get Your Files Here !/8. RMF Implement NIST Security Controls step 4/1. NIST Security Controls Implementation.srt | 5.34KB ~Get Your Files Here !/8. RMF Implement NIST Security Controls step 4/2. Tailoring NIST Control Baselines.mp4 | 34.28MB ~Get Your Files Here !/8. RMF Implement NIST Security Controls step 4/2. Tailoring NIST Control Baselines.srt | 3.92KB ~Get Your Files Here !/9. RMF Assess Security Controls step 5/1. Assigning NIST RMF Assessment Objectives.mp4 | 41.10MB ~Get Your Files Here !/9. RMF Assess Security Controls step 5/1. Assigning NIST RMF Assessment Objectives.srt | 5.57KB ~Get Your Files Here !/9. RMF Assess Security Controls step 5/2. NIST Security Controls Assessment.mp4 | 67.13MB ~Get Your Files Here !/9. RMF Assess Security Controls step 5/2. NIST Security Controls Assessment.srt | 8.35KB ~Get Your Files Here !/9. RMF Assess Security Controls step 5/3. Penetration Testing.mp4 | 25.86MB ~Get Your Files Here !/9. RMF Assess Security Controls step 5/3. Penetration Testing.srt | 4.02KB ~Get Your Files Here !/9. RMF Assess Security Controls step 5/4. NIST RMF Assessment Results.mp4 | 75.32MB ~Get Your Files Here !/9. RMF Assess Security Controls step 5/4. NIST RMF Assessment Results.srt | 9.40KB ~Get Your Files Here !/Bonus Resources.txt | 386B

Recommend

Magnetic link has been copied to the cutting board