Videos Files :
01.01 protecting through growth and innovation.mkv (3.68 MB)
01.02 why you need a scalable cybersecurity program.mkv (5.07 MB)
01.03 helping engineers scale cybersecurity.mkv (5.09 MB)
02.01 why risk identification is critical.mkv (5.24 MB)
02.02 how to implement asset management.mkv (5.7 MB)
02.03 compliance and governance as risk identtification.mkv (6.08 MB)
02.04 manda security due diligence and integration.mkv (6.41 MB)
02.05 risk analysis.mkv (6.74 MB)
02.06 third party risk management.mkv (5.67 MB)
03.01 identity management and access control.mkv (6.19 MB)
03.02 awareness and training.mkv (5.94 MB)
03.03 data privacy.mkv (6.01 MB)
03.04 security architecture design.mkv (4.24 MB)
03.05 vulnerability management.mkv (4.52 MB)
03.06 patch management.mkv (5.72 MB)
03.07 product security.mkv (7.24 MB)
03.08 cloud security.mkv (6.65 MB)
03.09 infrastructure security.mkv (6.28 MB)
04.01 threat intelligence and hunting.mkv (6.6 MB)
04.02 continuous security monitoring.mkv (5.77 MB)
04.03 insider threat.mkv (5.81 MB)
05.01 red team.mkv (4.97 MB)
05.02 incident response and management.mkv (5.56 MB)
05.03 business continuity and recovery.mkv (4.87 MB)
06.01 a shifting target.mkv (4.7 MB)
[Only registered and activated users can see links. ] [Only registered and activated users can see links. ] [Only registered and activated users can see links. ]