Udemy - ITAM - Cyber Security Workshop

seeders: 18
leechers: 12
updated:

Download Fast Safe Anonymous
movies, software, shows...

Files

[ DevCourseWeb.com ] Udemy - ITAM - Cyber Security Workshop
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1. Welcome to the Workshop!
    • 1. Welcome to the Workshop!.mp4 (86.9 MB)
    • 2. Terms of Use.html (1.3 KB)
    • 3. Terms of Use.html (0.1 KB)
    • 4. Course Materials.html (0.4 KB)
    • 4.1 Workshop-Mapping-Presentation.pdf (2.1 MB)
    • 4.2 Workshop-Mapping-Textbook.pdf (563.1 KB)
    10. Dispose
    • 1. Dispose.mp4 (23.0 MB)
    11. Moving the ITAM Program Forward
    • 1. Moving the ITAM Program Forward.mp4 (19.7 MB)
    12. Conclusion
    • 1. Conclusion.mp4 (27.7 MB)
    13. How to Get the Most from the Mapping
    • 1. How to Get the Most from the Mapping.mp4 (86.8 MB)
    • 1.1 Workshop-Mapping-Spreadsheet.xlsx (645.0 KB)
    14. The End. Or Is It
    • 1. The End. Or Is It.mp4 (43.4 MB)
    15. Workshop Quiz
    • 1. Quiz.html (0.1 KB)
    16. Workshop Survey
    • 1. Workshop Survey.html (0.1 KB)
    2. Introduction
    • 1. Introduction.mp4 (81.4 MB)
    3. The ITAM Program and Scope
    • 1. The ITAM Program and Scope.mp4 (44.5 MB)
    4. ITAM Tools
    • 1. ITAM Tools.mp4 (37.5 MB)
    5. Policies
    • 1. Policies.mp4 (26.3 MB)
    6. IT Users
    • 1. IT Users.mp4 (34.5 MB)
    7. Vendor Management
    • 1. Vendor Management.mp4 (20.5 MB)
    8. Acquire and Receive Processes
    • 1. Acquire and Receive Processes.mp4 (34.8 MB)
    9. Deploy, In-Use, Recover
    • 1. Deploy, In-Use, Recover.mp4 (30.6 MB)
    • Bonus Resources.txt (0.4 KB)

Description

ITAM / Cyber Security Workshop



https://DevCourseWeb.com

Published 8/2023
Created by Keith Rupnik
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 16 Lectures ( 1h 16m ) | Size: 601 MB

Enhancing NIST Cyber Security Framework and CIS Controls through ITAM

What you'll learn
How the relationship between ITAM and IT security makes IT security’s objectives attainable.
The mapping of ITAM components to both CIS’s and NIST's cybersecurity frameworks.
How to use the mapping to assess the ITAM program’s support for IT security.
How to move the ITAM program forward with IT security.
The reason for managing the IT asset’s lifecycle.
The critical components of the ITAM program.
The value of each lifecycle phase to IT security as well as other departments.

Requirements
Some experience in one or more of the following: ITAM, IT, IT security, or a basic understanding of how IT is used in business.



Download torrent
600.9 MB
seeders:18
leechers:12
Udemy - ITAM - Cyber Security Workshop


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
600.9 MB
seeders:18
leechers:12
Udemy - ITAM - Cyber Security Workshop


Torrent hash: 710FA081CC2A8B3FC38A48EA16899C0A41186356