https://img100.pixhost.to/images/404/537368816_que-es-udemy-analisis-opiniones.jpg
2.87 GB | 8min 14s | mp4 | 1280X720  | 16:9
Genre:eLearning |Language:English


Files Included :
1 -About Course.mp4 (51.56 MB)
2 -Meet Course Designer and Training Architect.mp4 (33.2 MB)
3 -Why GIAC Certifications.mp4 (11.83 MB)
4 -Do you need SANS or GIAC-affiliated training.mp4 (10.14 MB)
5 -Pre-requisite for this course.mp4 (13.21 MB)
1 -Human Risk Factors and Cultural Transformation.mp4 (71.72 MB)
2 -Security Negotiation Strategies for Influence.mp4 (50.96 MB)
3 -Vendor and Product Analysis Using AHP.mp4 (34.61 MB)
4 -Project Management for Security Initiatives.mp4 (49.38 MB)
5 -Leading High-Performance Security Teams.mp4 (46.7 MB)
1 -Logging, Monitoring, and Visibility Fundamentals.mp4 (87.61 MB)
2 -SIEM Deployment and Optimization Best Practices.mp4 (59.76 MB)
3 -Security Operations Center Models and Functions.mp4 (61.79 MB)
4 -Tiered vs  Tierless SOC Structures.mp4 (23.9 MB)
1 -Incident Response Lifecycle Using PICERL.mp4 (37.82 MB)
2 -Business Continuity Planning (BCP) Fundamentals.mp4 (47.66 MB)
3 -Disaster Recovery (DR) Strategies and Testing.mp4 (71.55 MB)
4 -Physical Security Controls and Risk Examples.mp4 (63.83 MB)
1 -Key Takeaway for You as a Security Leader.mp4 (16.77 MB)
2 -Continued learning resources.mp4 (41.79 MB)
3 -Certification Guidance and Format.mp4 (26.02 MB)
4 -Course Feedback and closing remarks.mp4 (14.19 MB)
1 -Role of a Modern Security Leader.mp4 (25.42 MB)
2 -Cybersecurity Frameworks Control, Program, and Risk Models.mp4 (20.75 MB)
3 -Risk Fundamentals and Calibration for Managers.mp4 (22.32 MB)
4 -Practical Risk Assessment and Risk Management Techniques.mp4 (49.66 MB)
1 -Developing Effective and Actionable Security Policies.mp4 (39.81 MB)
2 -Planning and Managing the Policy Lifecycle.mp4 (34.94 MB)
3 -Structuring a Security Program Governance and Reporting Lines.mp4 (22.76 MB)
4 -Understanding the Three Lines of Defense.mp4 (23.81 MB)
5 -Roles, Responsibilities, and Security Functions.mp4 (25.57 MB)
1 -Security Architecture Principles, Models, Trends and Frameworks.mp4 (60.58 MB)
2 -Cyber Defense Matrix Mapping Controls to Function.mp4 (26.02 MB)
3 -Layered Network Security (Layer 1 to Application Layer).mp4 (31 MB)
4 -Network Security Layer 1 and 2 Overview and attacks.mp4 (40.73 MB)
5 -Network Security Layer 3 VPNs and IPSec.mp4 (28.66 MB)
6 -Network Security Layer 4 TCP and UDP.mp4 (31.63 MB)
7 -Network Security Application Layer Proxies, NGFW, IDSIPS, NSM.mp4 (51.29 MB)
8 -Host security Malware and Attack Examples.mp4 (39.42 MB)
9 -Host Security Controls EPP, EDR, HIDSHIPS, FIM, Allowlisting, Sandboxing.mp4 (31.28 MB)
1 -Cloud Security Fundamentals.mp4 (49.43 MB)
2 -MicrosoftAWS Security Reference Architecture.mp4 (92.21 MB)
3 -Cloud Security Attack Examples and Controls.mp4 (31.85 MB)
4 -Cloud Security Tools CSPM, CWPP, CASB.mp4 (26.64 MB)
5 -Cloud Security Models CSA, CAF, Well-Architected Framework.mp4 (38.72 MB)
6 -IAM Overview Authentication Factors & Access Risks, IAM Security Capabilities.mp4 (34.56 MB)
7 -Zero Trust Principles and Best Practices, ZTNA and Variable Trust.mp4 (63.28 MB)
1 -Introduction to Security Engineering.mp4 (35.17 MB)
2 -Cryptography Essentials CIA, Non-repudiation, Hashing, Digital Signatures.mp4 (46.85 MB)
3 -Symmetric vs  Asymmetric Encryption and Key Exchange.mp4 (44.39 MB)
4 -Applied Encryption TLS, PKI, Blockchain, Quantum.mp4 (65.46 MB)
5 -Privacy vs  Security Concepts and Legal Foundations.mp4 (39.64 MB)
6 -Privacy Engineering and Compliance Controls.mp4 (58.73 MB)
1 -Secure Application Development SDLC and Threats.mp4 (46.85 MB)
2 -Application Attacks OWASP Top 10.mp4 (42.03 MB)
3 -Application Security Application Security Testing Tools.mp4 (41.26 MB)
4 -DevSecOps, Toolchains and CICD Pipeline.mp4 (71.22 MB)
5 -Infrastructure as Code (IaC).mp4 (33.33 MB)
6 -Container Security.mp4 (31.44 MB)
1 -Introduction to GenAI and Transformer Architectures.mp4 (36.25 MB)
2 -Security Risks in LLMs OWASP Top 10 for LLMs, MITRE ATLAS, Key Threats.mp4 (77.56 MB)
3 -GenAI Risk Mitigations and NIST AI RMF Controls.mp4 (36.9 MB)
4 -Building Secure AI Policies.mp4 (46.02 MB)
5 -AI Security Tools and Mitigations.mp4 (46.98 MB)
1 -Security Leadership in Action Traits and Mindsets.mp4 (33.48 MB)
2 -Vulnerability Management Lifecycle and PIACT Process.mp4 (43.13 MB)
3 -Prioritizing Vulnerabilities with CVSS and Context.mp4 (48.87 MB)
4 -Finding, Fixing and Communicating Vulnerabilities.mp4 (62.33 MB)
5 -Security Awareness Program Maturity Model.mp4 (39.67 MB)]
Screenshot
https://images2.imgbox.com/cd/a7/1nU6anGu_o.jpg



NitroFlare

Код:
https://nitroflare.com/view/55CCC23B59966D4/
https://nitroflare.com/view/55120B4FF9CD521/
https://nitroflare.com/view/0F74F5648A490A9/