filmov
tv
Все публикации
0:05:57
Security Operations 6-5: Discovering Application Vulnerabilities
0:07:24
Security Operations 6-4: Discovering Vulnerabilities
0:12:09
Security Operations 6-3: Common Vulnerability Scoring System (CVSS)
0:03:42
Security Operations 6-2: Common Vulnerabilities and Exposures (CVE)
0:13:47
Security Operations 6-1: Vulnerability Management
0:04:42
Security Operations 6-0: Module Intro
0:07:14
Security Operations 5-5: Decommissioning and Disposal
0:04:45
Security Operations 5-4: Monitoring and Asset tracking
0:02:55
Security Operations 5-3: Assignment and Accounting
0:07:57
Security Operations 5-2: Acquisition and Procurement
0:10:36
Security Operations 5-1: Asset Management
0:02:18
Security Operations 5-0: Module Intro
0:07:14
Security Operations 4-23: Planning and Prioritization
0:03:39
Security Operations 4-22: DEMO: ROI Worksheet
0:09:40
Security Operations 4-21: Calculating Return On Investment (ROI)
0:09:53
Security Operations 4-20: Cost-Benefit Analysis (CBA) Example
0:10:36
Security Operations 4-19: Trade-Off Analysis
0:01:37
Security Operations 4-18: Inherent and Residual Risk
0:05:30
Security Operations 4-17: Risk Mitigation and Controls
0:05:27
Security Operations 4-16: Risk Management Strategies
0:03:38
Security Operations 4-14: Annualized Loss Expectancy (ALE) and Annual Rate of Occurrence (ARO)
0:05:22
Security Operations 4-13: Single-Loss Expectancy (SLE) and Exposure Factor (EF)
0:03:16
Security Operations 4-10: DEMO: Risk Register and Analysis
0:06:01
Security Operations 4-9: Qualitative Risk Analysis
Назад
Вперёд