elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
BIA Activity/ -
Case Study/ -
Markdown Files for Learner Notes/ -
Other Materials/ -
1. Course Overview.mp4 81M
12. NIST Core Review and Protect Function Overview.mp4 91M
54. Risk Response.mp4 118M
37. The RMF Categorize Step.mp4 122M
27. Mitigation and Improvements.mp4 124M
53. System Authorization.mp4 125M
31. NIST RMF Overview _ Preparation.mp4 131M
30. Virtualization and the Cloud.mp4 132M
50. Analyzing Assessment Results.mp4 143M
38. Categorization Risk Analysis.mp4 144M
39. Selecting Security Controls.mp4 149M
18. Maintenance.mp4 152M
13. Awareness _ Training.mp4 160M
5. NIST CSF Core, Tiers, and Profiles.mp4 163M
33. The RMF Preparation Step.mp4 166M
19. Personnel and Physical Security.mp4 166M
47. NIST RMF Assessment Step and Process.mp4 169M
34. System Security Plan (SSP).mp4 169M
55. Monitoring Controls Step.mp4 170M
56. Change Management and Configuration Control.mp4 171M
57. System Disposal (EOL).mp4 171M
35. Categorizing Information Systems.mp4 171M
32. A Risk-Based Approach to Security.mp4 172M
7. NIST Frameworks _ Standards Case Study.mp4 176M
14. Access Control.mp4 181M
8. NIST Core Review and Identify Function Overview.mp4 186M
45. Common Controls.mp4 188M
49. Conducting the Assessment.mp4 190M
11. Security Policies and Procedures.mp4 191M
41. Setting and Tailoring Control Baselines.mp4 192M
16. Protective Technology - Systems.mp4 192M
28. Continuity of Operations Plan.mp4 193M
52. Risk Remediation.mp4 193M
17. Data Security and Encryption.mp4 195M
4. NIST CSF _ RMF Overview.mp4 199M
48. Assessment Plan.mp4 202M
15. Protective Technology - Network.mp4 207M
51. Assessment Documentation.mp4 209M
25. Digital Forensics.mp4 209M
6. The Vocabulary of Risk.mp4 212M
3. NIST Relationships.mp4 212M
44. Security Control Implementation.mp4 215M
36. Establishing Scope.mp4 217M
40. NIST Control Documents.mp4 220M
10. Business Impact Assessment.mp4 221M
42. Control Allocation and Monitoring.mp4 223M
22. Assessments.mp4 228M
21. Monitoring and Alerting.mp4 228M
46. Documenting Controls.mp4 235M
9. Inventory of Critical Assets.mp4 236M
29. Backup and Recovery.mp4 240M
23. Response Planning.mp4 244M
20. System Auditing and Logging.mp4 247M
43. Documentation and Approval.mp4 265M
24. Incident Response Plan Examples.mp4 266M
26. Response Training and Testing.mp4 275M
2. NIST Cybersecurity and Publications.mp4 284M