23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - Cybersecurity Assessment For Small And Mid Size Business
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
What you'll learn Understanding of Cybersecurity Fundamentals: Students would gain a solid foundation in cybersecurity principles, concepts, and terminology. Students would learn how to assess and manage cybersecurity risks within an organizational context. Students would become familiar with a range of security controls, technologies, and best practices. Students would develop an understanding of the ethical and legal dimensions of cybersecurity.
Requirements No experience needed.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4
9 MB
~Get Your Files Here !/1 - Introduction/2 - Frameworks.mp4
22.1 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/3 - Is hardware software maintained internally.mp4
54.3 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/4 - Hardware or software older than 5 years old.mp4
46.9 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/5 - Is there an inventory of all equipment.mp4
63.1 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/6 - Does the company know who report an incident to and the procedure to do so.mp4
47.8 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/6 - Udemy-worksheets.pdf
5.6 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/7 - A possible solution.mp4
10.5 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/7 - Digital-business-card-1.pdf
43.6 KB
~Get Your Files Here !/3 - Mobile Devices BYOD/10 - Is a VPN being used for remote access.mp4
22.7 MB
~Get Your Files Here !/3 - Mobile Devices BYOD/11 - Digital-business-card-1.pdf
43.6 KB
~Get Your Files Here !/3 - Mobile Devices BYOD/11 - VPN solution.mp4
35.4 MB
~Get Your Files Here !/3 - Mobile Devices BYOD/8 - Who owns the mobile devices used within the company.mp4
48 MB
~Get Your Files Here !/3 - Mobile Devices BYOD/9 - Are devices set to auto connect to Bluetooth and WiFi networks.mp4
24 MB
~Get Your Files Here !/4 - Login Password/12 - Can employees reset passwords lock out owners.mp4
61.2 MB
~Get Your Files Here !/4 - Login Password/13 - Does someone monitor login activity.mp4
31.7 MB
~Get Your Files Here !/4 - Login Password/14 - Digital-business-card-1.pdf
43.6 KB
~Get Your Files Here !/4 - Login Password/14 - SEIM solution for SMB.mp4
29.3 MB
~Get Your Files Here !/4 - Login Password/15 - Is there a strict password creation and update policy in place.mp4
34.3 MB
~Get Your Files Here !/5 - Website Social Media/16 - Who has access and authorization to distribute websocial media content.mp4
32.2 MB
~Get Your Files Here !/5 - Website Social Media/17 - Do all employees have web access and is it monitored.mp4
61.2 MB
~Get Your Files Here !/6 - Data Storage Backup/18 - Does the company use cloud based backup services.mp4
32.2 MB
~Get Your Files Here !/6 - Data Storage Backup/19 - Are regulatory guidelines being followed HIPPA DoD PCI.mp4
26.8 MB
~Get Your Files Here !/7 - Analyze the risk/20 - What are the threats you face.mp4
38.4 MB
~Get Your Files Here !/8 - Conclusion whats next/21 - Conclusion.mp4
49.4 MB
~Get Your Files Here !/8 - Conclusion whats next/21 - Digital-business-card-1.pdf
43.6 KB
~Get Your Files Here !/8 - Conclusion whats next/21 - risk-assessment.png