~Get Your Files Here !/3. IT Cyber Security Risk/1. What is Risk .mp4 120.8 MB
~Get Your Files Here !/3. IT Cyber Security Risk/6. Conducting an IT Risk Assessment.mp4 105.8 MB
~Get Your Files Here !/3. IT Cyber Security Risk/9. Enterprise Risk Management Strategy.mp4 99.4 MB
~Get Your Files Here !/1. Introduction/2. Introduction.mp4 80.3 MB
~Get Your Files Here !/3. IT Cyber Security Risk/10. Risk Analysis Methods.mp4 79.5 MB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/4. NIST RMF Assessment Results.mp4 79.0 MB
~Get Your Files Here !/4. NIST 800-37 R2 Risk Management Framework/1. NIST Risk Management Framework for Information Systems and Organization.mp4 77.2 MB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/2. NIST Security Controls Assessment.mp4 70.4 MB
~Get Your Files Here !/6. RMF Categorize Information Systems Step 2/1. Define System Categorization, Scope, and Authorization Boundaries.mp4 69.1 MB
~Get Your Files Here !/11. RMF Monitor Security Controls step 7/1. NIST RMF Monitoring.mp4 68.2 MB
~Get Your Files Here !/3. IT Cyber Security Risk/3. Organization’s crown jewels.mp4 67.1 MB
~Get Your Files Here !/3. IT Cyber Security Risk/5. The Need For Risk Assessment.mp4 66.2 MB
~Get Your Files Here !/11. RMF Monitor Security Controls step 7/2. Monitoring is an Ongoing Process.mp4 64.3 MB
~Get Your Files Here !/14. Cyber Security Risk Metrics Indicators/1. Cyber Security Risk Metrics and Performance indicators.mp4 60.5 MB
~Get Your Files Here !/2. The Course case study/1. Target Cloud Inc. Case Study.mp4 60.5 MB
~Get Your Files Here !/3. IT Cyber Security Risk/4. The Risk-Based Security Approach.mp4 60.3 MB
~Get Your Files Here !/3. IT Cyber Security Risk/7. Business Impact Analysis (BIA).mp4 51.5 MB
~Get Your Files Here !/12. NIST RMF Knowledge Resources and Best Practices/2. NIST RMF Best practices and Knowledge Resources.mp4 51.0 MB
~Get Your Files Here !/5. RMF Preparation Step 1/1. NIST Risk Management Preparation Strategy.mp4 48.8 MB
~Get Your Files Here !/7. RMF Select Security Controls Step 3/3. Selecting NIST Security Controls.mp4 48.8 MB
~Get Your Files Here !/8. RMF Implement NIST Security Controls step 4/1. NIST Security Controls Implementation.mp4 46.7 MB
~Get Your Files Here !/3. IT Cyber Security Risk/2. Assets, threats, and vulnerabilities.mp4 43.2 MB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/1. Assigning NIST RMF Assessment Objectives.mp4 43.1 MB
~Get Your Files Here !/7. RMF Select Security Controls Step 3/1. Introduction to NIST Security Controls.mp4 42.2 MB
~Get Your Files Here !/7. RMF Select Security Controls Step 3/2. High Water Mark Concept and the Security Control Baseline.mp4 41.8 MB
~Get Your Files Here !/16. Conclusions/1. Conclusions.mp4 39.3 MB
~Get Your Files Here !/8. RMF Implement NIST Security Controls step 4/2. Tailoring NIST Control Baselines.mp4 35.9 MB
~Get Your Files Here !/10. RMF Authorize Information System step 6/1. RMF Authorization.mp4 35.8 MB
~Get Your Files Here !/13. CMMI maturity model and NIST RMF/1. NIST CMMI Maturity Model.mp4 35.6 MB
~Get Your Files Here !/1. Introduction/1. What You will learn in this course.mp4 33.8 MB
~Get Your Files Here !/1. Introduction/3. Integrating Cybersecurity and ERM.mp4 33.2 MB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/3. Penetration Testing.mp4 27.1 MB
~Get Your Files Here !/3. IT Cyber Security Risk/6. Conducting an IT Risk Assessment.srt 16.7 kB
~Get Your Files Here !/1. Introduction/Exercise Files/POAM_example_DL.xlsx 12.3 kB
~Get Your Files Here !/3. IT Cyber Security Risk/9. Enterprise Risk Management Strategy.srt 10.5 kB
~Get Your Files Here !/4. NIST 800-37 R2 Risk Management Framework/1. NIST Risk Management Framework for Information Systems and Organization.srt 10.2 kB
~Get Your Files Here !/3. IT Cyber Security Risk/1. What is Risk .srt 9.7 kB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/4. NIST RMF Assessment Results.srt 9.6 kB
~Get Your Files Here !/11. RMF Monitor Security Controls step 7/2. Monitoring is an Ongoing Process.srt 9.5 kB
~Get Your Files Here !/3. IT Cyber Security Risk/7. Business Impact Analysis (BIA).srt 8.7 kB
~Get Your Files Here !/6. RMF Categorize Information Systems Step 2/1. Define System Categorization, Scope, and Authorization Boundaries.srt 8.6 kB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/2. NIST Security Controls Assessment.srt 8.6 kB
~Get Your Files Here !/11. RMF Monitor Security Controls step 7/1. NIST RMF Monitoring.srt 8.0 kB
~Get Your Files Here !/14. Cyber Security Risk Metrics Indicators/1. Cyber Security Risk Metrics and Performance indicators.srt 7.8 kB
~Get Your Files Here !/3. IT Cyber Security Risk/10. Risk Analysis Methods.srt 7.8 kB
~Get Your Files Here !/3. IT Cyber Security Risk/3. Organization’s crown jewels.srt 7.6 kB
~Get Your Files Here !/5. RMF Preparation Step 1/1. NIST Risk Management Preparation Strategy.srt 7.5 kB
~Get Your Files Here !/7. RMF Select Security Controls Step 3/3. Selecting NIST Security Controls.srt 7.0 kB
~Get Your Files Here !/3. IT Cyber Security Risk/4. The Risk-Based Security Approach.srt 7.0 kB
~Get Your Files Here !/12. NIST RMF Knowledge Resources and Best Practices/2. NIST RMF Best practices and Knowledge Resources.srt 6.8 kB
~Get Your Files Here !/1. Introduction/2. Introduction.srt 6.6 kB
~Get Your Files Here !/3. IT Cyber Security Risk/5. The Need For Risk Assessment.srt 6.3 kB
~Get Your Files Here !/7. RMF Select Security Controls Step 3/1. Introduction to NIST Security Controls.srt 6.2 kB
~Get Your Files Here !/7. RMF Select Security Controls Step 3/2. High Water Mark Concept and the Security Control Baseline.srt 5.8 kB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/1. Assigning NIST RMF Assessment Objectives.srt 5.7 kB
~Get Your Files Here !/3. IT Cyber Security Risk/2. Assets, threats, and vulnerabilities.srt 5.5 kB
~Get Your Files Here !/8. RMF Implement NIST Security Controls step 4/1. NIST Security Controls Implementation.srt 5.5 kB
~Get Your Files Here !/10. RMF Authorize Information System step 6/1. RMF Authorization.srt 4.7 kB
~Get Your Files Here !/1. Introduction/1. What You will learn in this course.srt 4.6 kB
~Get Your Files Here !/13. CMMI maturity model and NIST RMF/1. NIST CMMI Maturity Model.srt 4.4 kB
~Get Your Files Here !/2. The Course case study/1. Target Cloud Inc. Case Study.srt 4.3 kB
~Get Your Files Here !/9. RMF Assess Security Controls step 5/3. Penetration Testing.srt 4.1 kB
~Get Your Files Here !/1. Introduction/3. Integrating Cybersecurity and ERM.srt 4.0 kB
~Get Your Files Here !/8. RMF Implement NIST Security Controls step 4/2. Tailoring NIST Control Baselines.srt 4.0 kB
~Get Your Files Here !/16. Conclusions/1. Conclusions.srt 3.7 kB
~Get Your Files Here !/3. IT Cyber Security Risk/8. A Risk Cost-Benefit Analysis.srt 3.2 kB
~Get Your Files Here !/12. NIST RMF Knowledge Resources and Best Practices/1. Tips For Streamlining RMF Implementation.srt 2.8 kB