Pluralsight - CISSP - Asset Security
File List
- 02. Information and Asset Classification/02_01-Introduction to Information and Asset Classification.mp4 8.8 MB
- 06. Data Security Controls/06_04-Access Control Methodologies.mp4 6.4 MB
- 02. Information and Asset Classification/02_02-Common Classification Levels.mp4 6.3 MB
- 05. Appropriate Retention/05_05-Destruction of Data.mp4 5.7 MB
- Exercise files/cisspassetsecurity.zip 4.9 MB
- 03. Data and System Ownership/03_03-How to Identify Data and System Ownership.mp4 4.1 MB
- 03. Data and System Ownership/03_02-What Is Data and System Ownership.mp4 4.1 MB
- 02. Information and Asset Classification/02_05-Control Decisions Based on Classification.mp4 3.5 MB
- 04. Privacy Protection/04_01-Introduction to Privacy Protection.mp4 2.9 MB
- 04. Privacy Protection/04_03-What Type of Data Is Related to Privacy Protection.mp4 2.7 MB
- 02. Information and Asset Classification/02_03-CMDB and Classification.mp4 2.4 MB
- 02. Information and Asset Classification/02_04-Classification Impacts to Access.mp4 2.3 MB
- 06. Data Security Controls/06_06-Automation Is Your Friend for Data Security Controls.mp4 2.3 MB
- 05. Appropriate Retention/05_01-Introduction to Appropriate Retention.mp4 2.2 MB
- 05. Appropriate Retention/05_02-What Is Appropriate Retention.mp4 2.0 MB
- 06. Data Security Controls/06_03-Classification and Data Security Controls.mp4 2.0 MB
- 04. Privacy Protection/04_04-How Is Privacy Protection Related to Data Classification.mp4 1.9 MB
- 07. Handling Requirements/07_02-What Are Handling Requirements.mp4 1.9 MB
- 06. Data Security Controls/06_02-What Are Data Security Controls.mp4 1.9 MB
- 04. Privacy Protection/04_02-What Is Privacy Protection.mp4 1.9 MB
- 05. Appropriate Retention/05_03-Common Data Retention Requirements.mp4 1.8 MB
- 03. Data and System Ownership/03_04-Structured Is Easier to Determine than Unstructured.mp4 1.8 MB
- 03. Data and System Ownership/03_01-Introduction to Data and System Ownership.mp4 1.7 MB
- 07. Handling Requirements/07_04-Common Handling Requirements.mp4 1.7 MB
- 04. Privacy Protection/04_05-International Privacy Landscape.mp4 1.6 MB
- 06. Data Security Controls/06_05-Cryptography Methods.mp4 1.5 MB
- 05. Appropriate Retention/05_04-Shouldnt I Keep My Data Forever.mp4 1.4 MB
- 06. Data Security Controls/06_01-Introduction to Data Security Controls.mp4 1.4 MB
- 04. Privacy Protection/04_06-CMDB and Privacy Protection.mp4 1.3 MB
- 07. Handling Requirements/07_03-How Does Classification Impact Handling Requirements.mp4 1.2 MB
- 05. Appropriate Retention/05_06-CMDB and Appropriate Retention.mp4 1.1 MB
- 03. Data and System Ownership/03_05-CMDB and Ownership.mp4 1.1 MB
- 07. Handling Requirements/07_01-Introduction to Handling Requirements.mp4 1015.1 KB
- 01. Introduction/01_02-Whats Asset Security and Whats Next.mp4 989.5 KB
- 01. Introduction/01_01-CISSP Asset Security.mp4 986.2 KB
- 07. Handling Requirements/07_05-Conclusion.mp4 935.5 KB
- 05. Appropriate Retention/05_07-Conclusion.mp4 929.5 KB
- 02. Information and Asset Classification/02_06-Conclusion.mp4 856.9 KB
- 04. Privacy Protection/04_07-Conclusion.mp4 798.5 KB
- 06. Data Security Controls/06_07-Conclusion.mp4 687.3 KB
- 03. Data and System Ownership/03_06-Conclusion.mp4 567.3 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.