https://img100.pixhost.to/images/404/537368816_que-es-udemy-analisis-opiniones.jpg
2.87 GB | 8min 14s | mp4 | 1280X720  | 16:9
Genre:eLearning |Language:English


Files Included :
01-About Course.mp4 (51.56 MB)
02-Meet Course Designer & Training Architect.mp4 (33.2 MB)
03-Why GIAC Certifications.mp4 (11.83 MB)
04-Do You Need SANS or GIAC-Affiliated Training.mp4 (10.14 MB)
05-Pre-Requisites For This Course.mp4 (13.21 MB)
06-Role of a Modern Security Leader.mp4 (25.42 MB)
07-Cybersecurity Frameworks Control, Program, & Risk Models.mp4 (21.73 MB)
08-Risk Fundamentals & Calibration for Managers.mp4 (22.32 MB)
09-Practical Risk Assessment & Risk Management Techniques.mp4 (49.66 MB)
10-Developing Effective & Actionable Security Policies.mp4 (39.81 MB)
11-Planning & Managing the Policy Lifecycle.mp4 (34.94 MB)
12-Structuring a Security Program Governance & Reporting Lines.mp4 (22.76 MB)
13-Understanding the Three Lines of Defense.mp4 (23.81 MB)
14-Roles, Responsibilities, & Security Functions.mp4 (25.57 MB)
15-Security Architecture Principles, Models, Trends & Frameworks.mp4 (60.58 MB)
16-Cyber Defense Matrix Mapping Controls to Function.mp4 (26.02 MB)
17-Layered Network Security (Layer 1 to Application Layer).mp4 (31 MB)
18-Network Security Layer 1 & 2 Overview & Attacks.mp4 (40.73 MB)
19-Network Security Layer 3 VPNs & IPSec.mp4 (28.66 MB)
20-Network Security Layer 4 TCP & UDP.mp4 (31.63 MB)
21-Network Security Application Layer Proxies, NGFW, IDSIPS, NSM.mp4 (51.29 MB)
22-Host Security Malware & Attack Examples.mp4 (39.42 MB)
23-Host Security Controls-EPP, EDR, HIDS-HIPS, FIM, Allowlisting, & Sandboxing.mp4 (31.28 MB)
24-Cloud Security Fundamentals.mp4 (49.43 MB)
25-Microsoft AWS Security Reference Architecture.mp4 (92.21 MB)
26-Cloud Security Attack Examples & Controls.mp4 (31.85 MB)
27-Cloud Security Tools-CSPM, CWPP, & CASB.mp4 (26.64 MB)
28-Cloud Security Models-CSA, CAF, & Well-Architected Framework.mp4 (38.72 MB)
29-IAM Overview-Authentication Factors & Access Risks & IAM Security Capabilities.mp4 (34.56 MB)
30-Zero Trust Principles & Best Practices, ZTNA & Variable Trust.mp4 (63.28 MB)
31-Introduction to Security Engineering.mp4 (35.17 MB)
32-Cryptography Essentials-CIA, Non-Repudiation, Hashing & Digital Signatures.mp4 (46.85 MB)
33-Symmetric Vs  Asymmetric Encryption & Key Exchange.mp4 (44.39 MB)
34-Applied Encryption-TLS, PKI, Blockchain, & Quantum.mp4 (65.46 MB)
35-Privacy Vs  Security Concepts & Legal Foundations.mp4 (39.64 MB)
36-Privacy Engineering & Compliance Controls.mp4 (58.73 MB)
37-Secure Application Development-SDLC & Threats.mp4 (46.85 MB)
38-Application Attacks-OWASP Top 10.mp4 (42.03 MB)
39-Application Security-Application Security Testing Tools.mp4 (41.26 MB)
40-DevSecOps, Toolchains & CICD Pipeline.mp4 (71.22 MB)
41-Infrastructure as Code (IaC).mp4 (33.33 MB)
42-Container Security.mp4 (31.44 MB)
43-Introduction to GenAI & Transformer Architectures.mp4 (36.25 MB)
44-Security Risks in LLMs-OWASP Top 10 for LLMs, MITRE ATLAS, & Key Threats.mp4 (77.56 MB)
45-GenAI Risk Mitigations & NIST AI RMF Controls.mp4 (36.9 MB)
46-Building Secure AI Policies.mp4 (46.02 MB)
47-AI Security Tools & Mitigations.mp4 (46.98 MB)
48-Security Leadership in Action-Traits & Mindsets.mp4 (33.48 MB)
49-Vulnerability Management Lifecycle & PIACT Process.mp4 (43.13 MB)
50-Prioritizing Vulnerabilities with CVSS & Context.mp4 (48.87 MB)
51-Finding, Fixing & Communicating Vulnerabilities.mp4 (62.33 MB)
52-Security Awareness Program-Maturity Model.mp4 (39.67 MB)
53-Human Risk Factors & Cultural Transformation.mp4 (71.72 MB)
54-Security Negotiation Strategies for Influence.mp4 (50.96 MB)
55-Vendor & Product Analysis Using AHP.mp4 (34.61 MB)
56-Project Management for Security Initiatives.mp4 (49.38 MB)
57-Leading High-Performance Security Teams.mp4 (46.7 MB)
58-Logging, Monitoring, & Visibility Fundamentals.mp4 (87.61 MB)
59-SIEM Deployment & Optimization Best Practices.mp4 (59.76 MB)
60-Security Operations Center Models & Functions.mp4 (61.79 MB)
61-Tiered Vs  Tierless SOC Structures.mp4 (23.9 MB)
62-Incident Response Lifecycle Using PICERL.mp4 (37.82 MB)
63-Business Continuity Planning (BCP) Fundamentals.mp4 (47.66 MB)
64-Disaster Recovery (DR) Strategies & Testing.mp4 (71.55 MB)
65-Physical Security Controls & Risk Examples.mp4 (63.83 MB)
66-Key Takeaway for You as a Security Leader.mp4 (16.77 MB)
67-Continued Learning Resources.mp4 (41.79 MB)
68-Certification Guidance & Format.mp4 (26.02 MB)
69-Course Feedback & Closing Remarks.mp4 (14.19 MB)]
Screenshot
https://images2.imgbox.com/35/f3/R4ORKTpK_o.jpg


Код:
https://rapidgator.net/file/90d9d78efb12830a119d5e5cbcbdd204/
https://rapidgator.net/file/4c84328cbfd69c40366b08e19[цензура]42fb/
https://rapidgator.net/file/cac8a019f53a8786fca0ff0e3a932c0f/

NitroFlare

Код:
https://nitroflare.com/view/8E7A7FE0C185827/
https://nitroflare.com/view/E17A932C9A4710D/
https://nitroflare.com/view/437B88959569912/

UsersDrive

Код:
https://usersdrive.com/q6aakar0z1nj
https://usersdrive.com/t8eu8q2uuyb1
https://usersdrive.com/g9t3jinczbgi