Corporate Security Policies by Infosec

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 1.5 GB
  • Uploaded By freecoursewb
  • Downloads 136
  • Last checked 4 days ago
  • Date uploaded 7 months ago
  • Seeders 4
  • Leechers 3

Infohash : 57926780CBAF38EB2D6F37F549DEB709A76DDDBA



Corporate Security Policies by Infosec

https://WebToolTip.com

Released: 06/2025
Duration: 12h 35m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 1.53 GB
Level: Intermediate | Genre: eLearning | Language: English

Policies, procedures and other governance documents are an essential part of managing an organization and employees, and especially for cybersecurity programs. In this course, the cybersecurity training experts at Infosec Institute explain the characteristics of good governance documents and how to review, update and implement them. Effective governance documents can help build efficiency, reduce error, improve security, and reduce legal liability risks.
This course was created by Infosec Institute. We are pleased to host this training in our library.

Files:

[ WebToolTip.com ] Corporate Security Policies by Infosec
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 01 - A Framework for Better Corporate Security Policy Foundations
    • 01 - Introduction to corporate security policies.mp4 (29.7 MB)
    • 01 - Introduction to corporate security policies.srt (18.0 KB)
    • 02 - What are security policies, and why do we need them.mp4 (25.0 MB)
    • 02 - What are security policies, and why do we need them.srt (21.5 KB)
    • 03 - Rules introduced Let’s talk about what they are in general.mp4 (24.9 MB)
    • 03 - Rules introduced Let’s talk about what they are in general.srt (21.0 KB)
    • 04 - Internal rules Organization policies, procedures, and more.mp4 (22.8 MB)
    • 04 - Internal rules Organization policies, procedures, and more.srt (18.1 KB)
    • 05 - Rethinking the rules pyramid as a platform.mp4 (28.1 MB)
    • 05 - Rethinking the rules pyramid as a platform.srt (21.6 KB)
    • 06 - Three platforms plus a fourth to build your policies.mp4 (18.9 MB)
    • 06 - Three platforms plus a fourth to build your policies.srt (15.3 KB)
    • 07 - Planning policies and internal rules conceptually.mp4 (20.2 MB)
    • 07 - Planning policies and internal rules conceptually.srt (16.1 KB)
    • 08 - Building internal rules conceptually.mp4 (31.8 MB)
    • 08 - Building internal rules conceptually.srt (24.1 KB)
    • 09 - Effective governance documents look like this.mp4 (32.3 MB)
    • 09 - Effective governance documents look like this.srt (25.3 KB)
    • 10 - The people who write, read, and approve security policies.mp4 (30.7 MB)
    • 10 - The people who write, read, and approve security policies.srt (27.8 KB)
    • 11 - Policy knowledge and skills introduced.mp4 (13.7 MB)
    • 11 - Policy knowledge and skills introduced.srt (11.9 KB)
    • 12 - Summary.mp4 (12.1 MB)
    • 12 - Summary.srt (9.5 KB)
    02 - 1. Business Needs for Security Policies
    • 01 - Introduction to business needs for policies.mp4 (21.5 MB)
    • 01 - Introduction to business needs for policies.srt (13.6 KB)
    • 02 - The business mission is always first.mp4 (37.8 MB)
    • 02 - The business mission is always first.srt (27.4 KB)
    • 03 - Knowing your organization's mission, business, and culture.mp4 (27.8 MB)
    • 03 - Knowing your organization's mission, business, and culture.srt (20.9 KB)
    • 04 - Ethics, business, security, and policies.mp4 (59.5 MB)
    • 04 - Ethics, business, security, and policies.srt (40.4 KB)
    • 05 - Good internal rules help the business achieve its mission.mp4 (11.9 MB)
    • 05 - Good internal rules help the business achieve its mission.srt (9.0 KB)
    • 06 - Synchronizing business needs and priorities.mp4 (33.3 MB)
    • 06 - Synchronizing business needs and priorities.srt (25.8 KB)
    • 07 - Summary.mp4 (24.8 MB)
    • 07 - Summary.srt (11.6 KB)
    03 - 2. Incorporating Legal Requirements into Security Policies
    • 01 - Introduction to external laws and rules.mp4 (19.5 MB)
    • 01 - Introduction to external laws and rules.srt (12.5 KB)
    • 02 - Legal implications of policies and procedures.mp4 (24.2 MB)
    • 02 - Legal implications of policies and procedures.srt (17.0 KB)
    • 03 - Introduction to law and regulation.mp4 (50.9 MB)
    • 03 - Introduction to law and regulation.srt (40.3 KB)
    • 04 - Introducing laws as external rules to inform policies.mp4 (27.2 MB)
    • 04 - Introducing laws as external rules to inform policies.srt (18.9 KB)
    • 05 - Cybersecurity laws and regulations, part 1.mp4 (40.9 MB)
    • 05 - Cybersecurity laws and regulations, part 1.srt (32.3 KB)
    • 06 - Cybersecurity laws and regulations, part 2.mp4 (31.5 MB)
    • 06 - Cybersecurity laws and regulations, part 2.srt (22.6 KB)
    • 07 - When and how to seek legal review.mp4 (41.9 MB)
    • 07 - When and how to seek legal review.srt (30.6 KB)
    • 08 - Summary.mp4 (21.5 MB)
    • 08 - Summary.srt (11.6 KB)
    04 - 3. External Guidance to Assist with Security Policies
    • 01 - External guidance to assist with security policies overview.mp4 (16.8 MB)
    • 01 - External guidance to assist with security policies overview.srt (14.5 KB)
    • 02 - Government regulatory guidance.mp4 (32.3 MB)
    • 02 - Government regulatory guidance.srt (22.9 KB)
    • 03 - Finding good sample infosec policies from the internet.mp4 (22.1 MB)
    • 03 - Finding good sample infosec policies from the internet.srt (17.3 KB)
    • 04 - Cybersecurity frameworks.mp4 (54.3 MB)
    • 04 - Cybersecurity frameworks.srt (38.7 KB)
    • 05 - Books, articles, and other resources.mp4 (17.3 MB)
    • 05 - Books, articles, and other resources.srt (13.5 KB)
    • 06 - Tools to assist with creating and managing policies.mp4 (36.2 MB)
    • 06 - Tools to assist with creating and managing policies.srt (28.4 KB)
    • 07 - Summary.mp4 (19.9 MB)
    • 07 - Summary.srt (13.1 KB)
    05 - 4. Planning the Security Document Project
    • 01 - Introduction to planning the policy project.mp4 (26.0 MB)
    • 01 - Introduction to planning the policy project.srt (22.1 KB)
    • 02 - Planning for when you don't have time to plan.mp4 (21.2 MB)
    • 02 - Planning for when you don't have time to plan.srt (17.4 KB)
    • 03 - Planning, scoping, and selling (evangelizing) the project.mp4 (32.4 MB)
    • 03 - Planning, scoping, and selling (evangelizing) the project.srt (28.9 KB)
    • 04 - Where are we now, and where do we want to go.mp4 (33.0 MB)
    • 04 - Where are we now, and where do we want to go.srt (27.9 KB)
    • 05 - Who should be on your team, and who else should be involved.mp4 (15.4 MB)
    • 05 - Who should be on your team, and who else should be involved.srt (12.5 KB)
    • 06 - Summary.mp4 (12.4 MB)
    • 06 - Summary.srt (6.9 KB)
    06 - 5. Managing and Executing the Security Document Project
    • 01 - Overview of project management and execution.mp4 (19.6 MB)
    • 01 - Overview of project management and execution.srt (12.5 KB)
    • 02 - Project management basics.mp4 (39.5 MB)
    • 02 - Project management basics.srt (33.1 KB)
    • 03 - Overview of all steps and phases.mp4 (36.7 MB)
    • 03 - Overview of all steps and phases.srt (32.5 KB)
    • 04 - Review your project's scope and avoid scope creep.mp4 (32.4 MB)
    • 04 - Review your project's scope and avoid scope creep.srt (26.9 KB)
    • 05 - Starting the project Project kickoff.mp4 (13.1 MB)
    • 05 - Starting the project Project kickoff.srt (10.1 KB)
    • 06 - Review relevant existing internal rules.mp4 (8.1 MB)
    • 06 - Review relevant existing internal rules.srt (6.9 KB)
    • 07 - People skills for managing and communicating in your project.mp4 (27.2 MB)
    • 07 - People skills for managing and communicating in your project.srt (24.0 KB)
    • 08 - Resolving differences of opinion.mp4 (36.2 MB)
    • 08 - Resolving differences of opinion.srt (29.5 KB)
    • 09 - Reading, writing, technical writing, and editing.mp4 (54.2 MB)
    • 09 - Reading, writing, technical writing, and editing.srt (38.2 KB)
    • 10 - Tracking changes within documents and version control.mp4 (50.7 MB)
    • 10 - Tracking changes within documents and version control.srt (35.2 KB)
    • 11 - Security and technical decisions.mp4 (12.1 MB)
    • 11 - Security and technical decisions.srt (9.6 KB)
    • 12 - Gaining approval and finalizing the documents.mp4 (27.5 MB)
    • 12 - Gaining approval and finalizing the documents.srt (22.5 KB)
    • 13 - Publication, training, and implementing phases.mp4 (24.1 MB)
    • 13 - Publication, training, and implementing phases.srt (20.4 KB)
    • 14 - Summary.mp4 (5.9 MB)
    • 14 - Summary.srt (3.9 KB)
    07 - 6. Using and Maintaining Your New Policies
    • 01 - Post-project.mp4 (19.3 MB)
    • 01 - Post-project.srt (12.5 KB)
    • 02 - Document usage and the maintenance phase.mp4 (19.6 MB)
    • 02 - Document usage and the maintenance phase.srt (15.8 KB)
    • 03 - When to start a new document project.mp4 (25.0 MB)
    • 03 - When to start a new document project.srt (20.7 KB)
    • 04 - Summary.mp4 (8.7 MB)
    • 04 - Summary.srt (6.4 KB)
    • Bonus Resources.txt (0.1 KB)
    • Ex_Files_Corporate_Security_Policies Exercise Files
      • Course 1 Handout Policies.pdf (3.9 MB)
      • Course 2 Knowledge Check.pdf (166.4 KB)
      • Course 3 Knowledge Check.pdf (186.3 KB)
      • Course 4 Knowledge Check.pdf (170.3 KB)
      • Course 5 Knowledge Check.pdf (199.4 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce
GDRIVE-CACHE πŸ“ GD (hit) | ID: 1waqigE0__... πŸ“„ torrent πŸ• 26 Jan 2026, 06:32:28 am IST ⏰ 20 Feb 2026, 06:32:28 am IST ⚠️ Expired 4d 5h ago πŸ”„ Refresh Cache