17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
~Get Your Files Here !/1 - Introduction/1 - Christopher Nett.txt
40 B
~Get Your Files Here !/1 - Introduction/1 - LinkedIn.txt
33 B
~Get Your Files Here !/1 - Introduction/1 - Welcome.mp4
6.5 MB
~Get Your Files Here !/1 - Introduction/2 - FAQs.html
716 B
~Get Your Files Here !/1 - Introduction/3 - Course Slides.html
80 B
~Get Your Files Here !/1 - Introduction/3 - NIS2-Slides.pdf
1.5 MB
~Get Your Files Here !/10 - NIS2 CSRM Cyber hygiene and awareness training/52 - NIS2 Requirements for Cyber hygiene and awareness training.mp4
6 MB
~Get Your Files Here !/10 - NIS2 CSRM Cyber hygiene and awareness training/53 - Implementation Plan Cyber hygiene and awareness training.mp4
8.5 MB
~Get Your Files Here !/11 - NIS2 CSRM Cryptography/54 - NIS2 Requirements for Cryptography.mp4
2.9 MB
~Get Your Files Here !/11 - NIS2 CSRM Cryptography/55 - Implementation Plan Cryptography.mp4
8.6 MB
~Get Your Files Here !/12 - NIS2 CSRM Human resource security/56 - NIS2 Requirements for Human resource security.mp4
2.5 MB
~Get Your Files Here !/12 - NIS2 CSRM Human resource security/57 - Implementation Plan Human resource security.mp4
12.9 MB
~Get Your Files Here !/13 - Bonus/58 - Bonus.mp4
7.1 MB
~Get Your Files Here !/13 - Bonus/58 - Christopher Nett.txt
40 B
~Get Your Files Here !/13 - Bonus/58 - LinkedIn.txt
33 B
~Get Your Files Here !/2 - The NIS2 Directive/4 - Cyber Security Challenges.mp4
31.3 MB
~Get Your Files Here !/2 - The NIS2 Directive/5 - What is NIS2.mp4
14.3 MB
~Get Your Files Here !/3 - NIS2 Entities/10 - Member State Responsibilites.mp4
3.3 MB
~Get Your Files Here !/3 - NIS2 Entities/6 - Essential and important entities.mp4
9.1 MB
~Get Your Files Here !/3 - NIS2 Entities/7 - Sectors in scope.mp4
14.5 MB
~Get Your Files Here !/3 - NIS2 Entities/8 - Fines and Liabilities.mp4
16.5 MB
~Get Your Files Here !/3 - NIS2 Entities/9 - The Core Pillars of NIS2.mp4
2.6 MB
~Get Your Files Here !/4 - Cooperation and Information Exchange/11 - Cooperation and Information Exchange.mp4
4 MB
~Get Your Files Here !/4 - Cooperation and Information Exchange/12 - What is a Threat.mp4
4.5 MB
~Get Your Files Here !/4 - Cooperation and Information Exchange/13 - Intelligence Threat Intelligence Cyber Threat Intelligence CTI.mp4
5.5 MB
~Get Your Files Here !/4 - Cooperation and Information Exchange/14 - What is CTI.mp4
6.4 MB
~Get Your Files Here !/4 - Cooperation and Information Exchange/15 - Threat Vulnerability Risk.mp4
3.3 MB
~Get Your Files Here !/4 - Cooperation and Information Exchange/16 - ThreatInformed Defense.mp4
6.9 MB
~Get Your Files Here !/4 - Cooperation and Information Exchange/17 - Tactics Techniques Procedures TTPs.mp4
9.4 MB
~Get Your Files Here !/4 - Cooperation and Information Exchange/18 - IOCs IOAs.mp4
8.3 MB
~Get Your Files Here !/4 - Cooperation and Information Exchange/19 - Pyramid of Pain.mp4
7.7 MB
~Get Your Files Here !/4 - Cooperation and Information Exchange/20 - CTI Sources.mp4
4.5 MB
~Get Your Files Here !/5 - Cyber Security Risk Management CSRM/21 - Risk Management.mp4
9.1 MB
~Get Your Files Here !/5 - Cyber Security Risk Management CSRM/22 - NIS2 Requirements for CSRM.mp4
4 MB
~Get Your Files Here !/5 - Cyber Security Risk Management CSRM/23 - What is Corporate Governance.mp4
4.2 MB
~Get Your Files Here !/5 - Cyber Security Risk Management CSRM/24 - What is Enterprise Risk Management.mp4
9.2 MB
~Get Your Files Here !/5 - Cyber Security Risk Management CSRM/25 - What is Cyber Security Risk Management.mp4
15.7 MB
~Get Your Files Here !/5 - Cyber Security Risk Management CSRM/26 - Implementation Plan CSRM.mp4
11.5 MB
~Get Your Files Here !/6 - NIS2 CSRM Incident Handling/27 - NIS2 Requirements for Incident Handling Reporting.mp4
8 MB
~Get Your Files Here !/6 - NIS2 CSRM Incident Handling/28 - The NIST Incident Response Process.mp4
3.5 MB
~Get Your Files Here !/6 - NIS2 CSRM Incident Handling/29 - Preparation.mp4
11.5 MB
~Get Your Files Here !/6 - NIS2 CSRM Incident Handling/30 - Detection and Analysis.mp4
8.5 MB
~Get Your Files Here !/6 - NIS2 CSRM Incident Handling/31 - Containment Eradication and Recovery.mp4
10 MB
~Get Your Files Here !/6 - NIS2 CSRM Incident Handling/32 - PostIncident Activity.mp4
7.6 MB
~Get Your Files Here !/6 - NIS2 CSRM Incident Handling/33 - Implementation Plan Incident Handling.mp4
6.5 MB
~Get Your Files Here !/7 - NIS2 CSRM Business Continuity and Crisis Management/34 - NIS2 Requirements for Business Continuity and Crisis Management.mp4
3 MB
~Get Your Files Here !/7 - NIS2 CSRM Business Continuity and Crisis Management/35 - Implementation Plan Business Continuity and Crisis Management.mp4
9.1 MB
~Get Your Files Here !/8 - NIS2 CSRM Supply Chain Security/36 - NIS2 Requirements Supply Chain Security.mp4
2.1 MB
~Get Your Files Here !/8 - NIS2 CSRM Supply Chain Security/37 - Implementation Plan Supply Chain Security.mp4
8.2 MB
~Get Your Files Here !/9 - NIS2 CSRM Security in System acquisition development and maintenance/38 - NIS2 Requirements for System acquisition development and maintenance.mp4
3.5 MB
~Get Your Files Here !/9 - NIS2 CSRM Security in System acquisition development and maintenance/39 - What is a Vulnerability.mp4
4.2 MB
~Get Your Files Here !/9 - NIS2 CSRM Security in System acquisition development and maintenance/40 - Common Vulnerabilities and Exposures CVE.mp4
6.9 MB
~Get Your Files Here !/9 - NIS2 CSRM Security in System acquisition development and maintenance/41 - Common Vulnerability Scoring System CVSS.mp4
14 MB
~Get Your Files Here !/9 - NIS2 CSRM Security in System acquisition development and maintenance/42 - What is Vulnerability Management.mp4
11.8 MB
~Get Your Files Here !/9 - NIS2 CSRM Security in System acquisition development and maintenance/43 - Identification.mp4
10.9 MB
~Get Your Files Here !/9 - NIS2 CSRM Security in System acquisition development and maintenance/44 - Evaluation.mp4
9.7 MB
~Get Your Files Here !/9 - NIS2 CSRM Security in System acquisition development and maintenance/45 - Prioritization.mp4
7.2 MB
~Get Your Files Here !/9 - NIS2 CSRM Security in System acquisition development and maintenance/46 - Remediation.mp4
4.6 MB
~Get Your Files Here !/9 - NIS2 CSRM Security in System acquisition development and maintenance/47 - Reporting.mp4
4.3 MB
~Get Your Files Here !/9 - NIS2 CSRM Security in System acquisition development and maintenance/48 - What is Penetration Testing.mp4
4.8 MB
~Get Your Files Here !/9 - NIS2 CSRM Security in System acquisition development and maintenance/49 - Penetration Testing in Cyber Security.mp4
4.5 MB
~Get Your Files Here !/9 - NIS2 CSRM Security in System acquisition development and maintenance/50 - Red Teaming vs Penetration Testing.mp4
10.5 MB
~Get Your Files Here !/9 - NIS2 CSRM Security in System acquisition development and maintenance/51 - Implementation Plan Security in system acquisition development and maintenance.mp4