New Folder


File Information

File Size:   2.15 GB
Creat Time:   2014-12-24
Active Degree:   263
Last Active:   2024-11-12
Magnet Link:    Magnet LinkMagnet Link
Tags:    New Folder
Statement:   This site does not provide download links, only text displays, and does not contain any infringement.

File List

  1. 8 - 12 - Business Continuity and Disaster Recovery Michael Ness Part 5 - QA Comments Concerns (2306).mp4 89.46 MB
  2. 4 - 9 - Analyzing Policy and Capability Maturity Model Mike Simon (1740).mp4 74.39 MB
  3. 4 - 8 - Elements of a Good Policy Mike Simon (1704).mp4 70.76 MB
  4. 2 - 7 - CISO Kirk Bailey and Ernie Hayden Part 6 - Security Events Example and Priority Response List.mp4 55.25 MB
  5. 8 - 17 - Business Continuity and Disaster Recovery Ivan Orton Part 4 - Changes in Law Future Trends Part C (1219).mp4 51.45 MB
  6. 6 - 17 - Technologies Mr. Gregory Part 4 Security Models (1742).mp4 51.01 MB
  7. 6 - 9 - Technologies Dr. Koblitz Part 4 RSA vs. ECC (1628).mp4 50.40 MB
  8. 8 - 16 - Business Continuity and Disaster Recovery Ivan Orton Part 3 - Changes in Law Future Trends Part B (1148).mp4 49.66 MB
  9. 8 - 8 - Business Continuity and Disaster Recovery Michael Ness Part 1 - Leadership Selling Your Ideas (1542).mp4 46.77 MB
  10. 5 - 13 - Planning QA and Conclusion Jim Poland (1307).mp4 44.98 MB
  11. 8 - 19 - Business Continuity and Disaster Recovery Ivan Orton Part 6 - Capetown Rio Case (1416).mp4 43.02 MB
  12. 8 - 9 - Business Continuity and Disaster Recovery Michael Ness Part 2 - Your Presentation (1143).mp4 42.24 MB
  13. 9 - 6 - Risk Assessment Part 3 Seth Shapiro - Procedure for Risk Analysis Part B (1531).mp4 41.31 MB
  14. 9 - 10 - Risk Assessment Part 7 Seth Shapiro - Risk Identification Part B (1404).mp4 40.23 MB
  15. 8 - 18 - Business Continuity and Disaster Recovery Ivan Orton Part 5 - Changes in Law Future Trends Part D (951).mp4 39.54 MB
  16. 6 - 8 - Technologies Dr. Koblitz Part 3 Elliptic Curve Cryptography (1302).mp4 38.40 MB
  17. 4 - 7 - Introduction to Policy Mike Simon (956).mp4 37.65 MB
  18. 8 - 3 - After a Breach Dr. Endicott-Popovsky Part 2 - Business Continuity Planning (2153).mp4 36.81 MB
  19. 9 - 8 - Risk Assessment Part 5 Seth Shapiro - Methods for Risk Analysis Part B (1628).mp4 36.61 MB
  20. 6 - 16 - Technologies Mr. Gregory Part 3 Security Architecture (1356).mp4 35.36 MB
  21. 6 - 7 - Technologies Dr. Koblitz Part 2 Public Key Cryptography (1214).mp4 35.26 MB
  22. 9 - 11 - Risk Assessment Part 8 Seth Shapiro - Risk Acceptance (1250).mp4 35.12 MB
  23. 8 - 14 - Business Continuity and Disaster Recovery Ivan Orton Part 1 - Four Players in Breach Legal Liability (1003).mp4 33.51 MB
  24. 5 - 9 - Planning Protection Mechanisms Part 2 Jim Poland (1705).mp4 33.43 MB
  25. 9 - 9 - Risk Assessment Part 6 Seth Shapiro - Risk Identification Part A (1147).mp4 32.95 MB
  26. 9 - 1 - Welcome to Week 8 Information Assurance Audit Dr. Endicott-Popovsky (1849).mp4 32.09 MB
  27. 9 - 4 - Risk Assessment Part 1 Seth Shapiro - Overview What is Risk (1349).mp4 31.97 MB
  28. 7 - 12 - Human Factors Mr. Opaki Part 6 - Managing Human Factors (1012).mp4 30.42 MB
  29. 8 - 5 - After a Breach Dr. Endicott-Popovsky Part 4 - Incident Response (1705).mp4 29.39 MB
  30. 7 - 8 - Human Factors Mr. Opaki Part 2 - Psychology (1025).mp4 27.12 MB
  31. 9 - 12 - Risk Assessment Part 9 Seth Shapiro - Discussion and QA (646).mp4 26.75 MB
  32. 6 - 4 - Technologies Dr. Endicott-Popovsky Part 3 (1522).mp4 26.32 MB
  33. 6 - 2 - Technologies Dr. Endicott-Popovsky Part 1 (1518).mp4 26.28 MB
  34. 2 - 9 - CISO Mike Hamilton - Types of Jobs in Information Security.mp4 24.96 MB
  35. 4 - 5 - Digital Forensics (1413).mp4 24.54 MB
  36. 5 - 11 - Planning Security Models Jim Poland (731).mp4 24.17 MB
  37. 2 - 4 - CISO Kirk Bailey and Ernie Hayden Part 3 - CISO CISSP and CISM.mp4 24.17 MB
  38. 2 - 3 - CISO Kirk Bailey and Ernie Hayden Part 2 - Background of Industry.mp4 23.80 MB
  39. 2 - 5 - CISO Kirk Bailey and Ernie Hayden Part 4 - CISSP.mp4 22.69 MB
  40. 5 - 10 - Planning Assurance in the Security System Jim Poland (1157).mp4 22.17 MB
  41. 9 - 3 - Penetration Testing Part 2 Dr. Endicott-Popovsky (1212).mp4 21.64 MB
  42. 6 - 10 - Technologies Dr. Koblitz Part 5 Xedni Calculus (640).mp4 21.35 MB
  43. 3 - 4 - What Does All This Mean.mp4 20.33 MB
  44. 9 - 2 - Penetration Testing Part 1 Dr. Endicott-Popovsky (1212).mp4 20.30 MB
  45. 5 - 2 - Basics of IA Planning Dr. Endicott-Popovsky (1212).mp4 20.15 MB
  46. 6 - 3 - Technologies Dr. Endicott-Popovsky Part 2 (1116).mp4 19.37 MB
  47. 8 - 6 - After a Breach Dr. Endicott-Popovsky Part 5 - Digital Forensics (1045).mp4 18.51 MB
  48. 6 - 18 - Technologies Mr. Gregory Part 5 Evaluation Criteria (910).mp4 18.28 MB
  49. 6 - 15 - Technologies Mr. Gregory Part 2 Computer Architecture (837).mp4 17.24 MB
  50. 5 - 8 - Planning Protection Mechanisms Part 1 Jim Poland (426).mp4 17.21 MB