Torrent details for "AKYLADE Cyber Risk Management Foundation RMF 001 A CRMF Cert" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
623.7 MB
Info Hash:
90EAF6C62B464C9252BE52028F5532E0C4DD0FAF
Added By:
Added:
April 3, 2025, 1:21 p.m.
Stats:
|
(Last updated: April 26, 2025, 8:38 a.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 183 bytes |
| 01 - Course and exam overview.mp4 | 30.0 MB |
| 01 - Course and exam overview.srt | 14.7 KB |
| 01 - Risk management lifecycles, frameworks, and processes.mp4 | 27.4 MB |
| 01 - Risk management lifecycles, frameworks, and processes.srt | 18.1 KB |
| 02 - Types of risk and risk responses.mp4 | 18.5 MB |
| 02 - Types of risk and risk responses.srt | 14.6 KB |
| 03 - Qualitative, quantitative, and hybrid risk analyses.mp4 | 17.7 MB |
| 03 - Qualitative, quantitative, and hybrid risk analyses.srt | 13.0 KB |
| 04 - Training and awareness programs to mitigate risk.mp4 | 13.4 MB |
| 04 - Training and awareness programs to mitigate risk.srt | 8.8 KB |
| 01 - Common threats and vulnerabilities to an organization's risk posture.mp4 | 35.6 MB |
| 01 - Common threats and vulnerabilities to an organization's risk posture.srt | 22.1 KB |
| 02 - Identify assumptions that affect risk.mp4 | 20.7 MB |
| 02 - Identify assumptions that affect risk.srt | 16.3 KB |
| 03 - Constraints on risk assessment, response, and monitoring.mp4 | 10.2 MB |
| 03 - Constraints on risk assessment, response, and monitoring.srt | 7.1 KB |
| 04 - Identify level of risk tolerance.mp4 | 7.5 MB |
| 04 - Identify level of risk tolerance.srt | 5.7 KB |
| 05 - Priorities and trade-offs when managing risk.mp4 | 7.0 MB |
| 05 - Priorities and trade-offs when managing risk.srt | 3.6 KB |
| 06 - Comprehensive organizational risk management strategy.mp4 | 25.5 MB |
| 06 - Comprehensive organizational risk management strategy.srt | 18.2 KB |
| 01 - Common threats and vulnerabilities to an organization's information systems.mp4 | 34.5 MB |
| 01 - Common threats and vulnerabilities to an organization's information systems.srt | 22.5 KB |
| 02 - Risk to organizational operations, assets, and personnel.mp4 | 19.1 MB |
| 02 - Risk to organizational operations, assets, and personnel.srt | 11.1 KB |
| 03 - Vulnerability assessment and penetration testing.mp4 | 31.3 MB |
| 03 - Vulnerability assessment and penetration testing.srt | 20.2 KB |
| 04 - Analyze and prioritize security risks.mp4 | 31.3 MB |
| 04 - Analyze and prioritize security risks.srt | 21.1 KB |
| 05 - Assessments for new and existing systems.mp4 | 31.2 MB |
| 05 - Assessments for new and existing systems.srt | 22.3 KB |
| 06 - Organizations' data loss prevention strategy and systems.mp4 | 24.6 MB |
| 06 - Organizations' data loss prevention strategy and systems.srt | 16.5 KB |
| 01 - Appropriate risk response.mp4 | 13.8 MB |
| 01 - Appropriate risk response.srt | 10.5 KB |
| 02 - Alternative courses of action to respond to risks.mp4 | 19.9 MB |
| 02 - Alternative courses of action to respond to risks.srt | 15.5 KB |
| 03 - Appropriate measures and controls.mp4 | 17.6 MB |
| 03 - Appropriate measures and controls.srt | 12.6 KB |
| 04 - Implement course of action for a given risk.mp4 | 10.3 MB |
| 04 - Implement course of action for a given risk.srt | 7.4 KB |
| 05 - Incident response, business continuity, and continuity of operations plans.mp4 | 35.3 MB |
| 05 - Incident response, business continuity, and continuity of operations plans.srt | 25.2 KB |
| 06 - Evaluate effectiveness of current risk mitigation measures and controls.mp4 | 20.3 MB |
| 06 - Evaluate effectiveness of current risk mitigation measures and controls.srt | 11.5 KB |
| 01 - Develop a risk monitoring strategy.mp4 | 15.5 MB |
| 01 - Develop a risk monitoring strategy.srt | 10.3 KB |
| 02 - Monitor organizational information systems.mp4 | 16.9 MB |
| 02 - Monitor organizational information systems.srt | 9.5 KB |
| 03 - Clear communication across diverse teams and stakeholders.mp4 | 33.5 MB |
| 03 - Clear communication across diverse teams and stakeholders.srt | 26.5 KB |
| 04 - Prepare for and conduct audits.mp4 | 23.1 MB |
| 04 - Prepare for and conduct audits.srt | 17.7 KB |
| 05 - Risk-based approach to conduct authorization and accreditation process.mp4 | 17.2 MB |
| 05 - Risk-based approach to conduct authorization and accreditation process.srt | 10.5 KB |
| 01 - Course review and practice exam.mp4 | 14.7 MB |
| 01 - Course review and practice exam.srt | 8.8 KB |
| Bonus Resources.txt | 70 bytes |
Name
DL
Uploader
Size
S/L
Added
-
623.7 MB
[19
/
14]
2025-04-03
| Uploaded by freecoursewb | Size 623.7 MB | Health [ 19 /14 ] | Added 2025-04-03 |
-
546.8 MB
[2
/
0]
2025-04-03
| Uploaded by freecoursewb | Size 546.8 MB | Health [ 2 /0 ] | Added 2025-04-03 |
NOTE
SOURCE: AKYLADE Cyber Risk Management Foundation RMF 001 A CRMF Cert
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


