Udemy - Cybersecurity Management For New Managers

Torrent Details

Udemy - Cybersecurity Management for New ManagersUdemy - Cybersecurity Management for New Managers

NAME
Udemy - Cybersecurity Management for New Managers.torrent
CATEGORY
Other
INFOHASH
5a16f77b5b89fb11832a7324529d61de02767089
SIZE
937 MB in 45 files
ADDED
Uploaded on 16-11-2023 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Cybersecurity Management for New Managers

https://DevCourseWeb.com

Published 11/2023
Created by Sharon Knowles
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 31 Lectures ( 1h 30m ) | Size: 936 MB

A Comprehensive Course

What you'll learn
Understand the importance of Cybersecurity Management
Develop skills in Scenario Planning for effective Cybersecurity Management
Develop skills in developing Cybersecurity Management Strategy
Learn the NIST and NICE Cybersecurity Workforce Framework and how to use it

Requirements
Basic Understanding of Cybersecurity
Non-technical
Just an aspiration to one day be a CISO

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/1. Understanding the importance of cybersecurity management.mp445.7 MB
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/2. Roles and responsibilities of a cybersecurity manager.mp431.6 MB
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/3. NIST and NICE frameworks overview.mp427.9 MB
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/3.1 4.png376.1 KB
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/3.2 5.png583.7 KB
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/4. Data Breaches.mp449.2 MB
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/5. Cyber Incident & Data Breach Response planning ( Video from IT Web Conference ).mp4355.5 MB
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/6. Knowledge Test.html156 B
~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/1. Introduction to the NIST CSF.html164 B
~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/1.1 4.png376.1 KB
~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/2. Core functions Identify, Protect, Detect, Respond, and Recover.mp417.9 MB
~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/3. Tiers and profiles.mp431.1 MB
~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/4. Implementing the NIST CSF in your organisation.mp469 MB
~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/5. Challenges of Implementing the NIST Framework.mp421.4 MB
~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/6. Knowledge Assessment Module 2.html156 B
~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/1. Introduction to the NICE Framework.html877 B
~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/1.1 5.png583.7 KB
~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/2. Workforce categories and specialty areas.mp414.9 MB
~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/3. Knowledge, skills, and abilities (KSAs).mp432.6 MB
~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/4. Integrating the NICE Framework into workforce development and management.mp417.5 MB
~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/5. Knowledge Quiz.html156 B
~Get Your Files Here !/4. Module 4 Scenario Planning and Strategy/1. Introduction to scenario planning.html596 B
~Get Your Files Here !/4. Module 4 Scenario Planning and Strategy/2. Identifying threats and vulnerabilities.mp440.3 MB
~Get Your Files Here !/4. Module 4 Scenario Planning and Strategy/3. Developing and analysing scenarios.html595 B
~Get Your Files Here !/4. Module 4 Scenario Planning and Strategy/4. Knowledge Quiz.html156 B
~Get Your Files Here !/5. Module 5 Incident Response and Recovery/1. Creating cybersecurity strategies and action plans.mp449.8 MB
~Get Your Files Here !/5. Module 5 Incident Response and Recovery/2. Incident Response Planning.mp438.2 MB
~Get Your Files Here !/5. Module 5 Incident Response and Recovery/3. Incident detection and analysis.mp446 MB
~Get Your Files Here !/5. Module 5 Incident Response and Recovery/4. Containment, eradication, and recovery.html614 B
~Get Your Files Here !/5. Module 5 Incident Response and Recovery/5. Post Incident Activities and Lessons learned.mp413.5 MB
~Get Your Files Here !/5. Module 5 Incident Response and Recovery/6. Knowledge Test.html156 B
~Get Your Files Here !/6. Module 6 Cybersecurity Metrics and Reporting/1. Selecting meaningful cybersecurity metrics.mp49.1 MB
~Get Your Files Here !/6. Module 6 Cybersecurity Metrics and Reporting/2. Establishing a cybersecurity metrics program.html670 B
~Get Your Files Here !/6. Module 6 Cybersecurity Metrics and Reporting/3. Reporting and communicating cybersecurity performance.html152 B
~Get Your Files Here !/6. Module 6 Cybersecurity Metrics and Reporting/3.1 Example Cybersecurity Performance Report.pdf45.4 KB
~Get Your Files Here !/6. Module 6 Cybersecurity Metrics and Reporting/4. Knowledge Quiz.html156 B
~Get Your Files Here !/7. Module 7 Assessing and Improving Cybersecurity Management/1. Conducting cybersecurity risk assessments.html141 B
~Get Your Files Here !/7. Module 7 Assessing and Improving Cybersecurity Management/2. Auditing and evaluating cybersecurity management practices.html141 B
~Get Your Files Here !/7. Module 7 Assessing and Improving Cybersecurity Management/3. Continuous improvement and staying current with industry trends.mp46.7 MB
~Get Your Files Here !/7. Module 7 Assessing and Improving Cybersecurity Management/4. Knowledge Quiz.html156 B
~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/1. Review of key concepts and frameworks.mp49.5 MB
~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/2. Developing a personal action plan for implementing cyber management practices.mp47.4 MB
~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/3. Resources for ongoing learning and professional development.html679 B
~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/4. Knowledge Check.html156 B
~Get Your Files Here !/Bonus Resources.txt386 B

Alternative Torrents for 'Udemy Cybersecurity Management for Managers'.

There are no alternative torrents found.