coursera-designing-and-e-16lyT
- assignments\\assignment_1_files\\/routes.js1.04MB
- assignments\\assignment_1_files\\/spark.in.css276.65KB
- assignments\\assignment_2_files\\/routes.js1.04MB
- assignments\\assignment_2_files\\/spark.in.css276.65KB
- assignments\\assignment_3_files\\/routes.js1.04MB
- assignments\\assignment_3_files\\/spark.in.css276.65KB
- lectures\\week1\\/Designing and Executing Infortion Security Strategies 0.0 Part 1 - Course Overview (544).mp48.31MB
- lectures\\week1\\/Designing and Executing Infortion Security Strategies 0.1 Part 2 - HackMeCo Basics (1623).mp423.40MB
- lectures\\week1\\/Designing and Executing Infortion Security Strategies 0.2 Part 3 - Case 1 Background Part 1 of 2 (1655).mp424.17MB
- lectures\\week1\\/Designing and Executing Infortion Security Strategies 0.3 Part 4 - Case 1 Background Part 2 of 2 (1241).mp419.02MB
- lectures\\week1\\/Designing and Executing Infortion Security Strategies 0.4 Part 5 - Controls Review (914).mp413.82MB
- lectures\\week1\\/Designing and Executing Infortion Security Strategies 0.5 Part 6 - Case 1 (1108).mp416.96MB
- lectures\\week10\\/Designing and Executing Infortion Security Strategies 9.0 Part 1 - Sources and Uses for Threat Information (705).mp49.83MB
- lectures\\week10\\/Designing and Executing Infortion Security Strategies 9.1 Part 2 - Sources of Threats Part 1 of 3 (935).mp413.58MB
- lectures\\week10\\/Designing and Executing Infortion Security Strategies 9.2 Part 3 - Sources of Threats Part 2 of 3 (958).mp413.85MB
- lectures\\week10\\/Designing and Executing Infortion Security Strategies 9.3 Part 4 - Sources of Threats Part 3 of 3 (815).mp411.31MB
- lectures\\week10\\/Designing and Executing Infortion Security Strategies 9.4 Part 5 - Why What and Who (756).mp410.88MB
- lectures\\week10\\/Designing and Executing Infortion Security Strategies 9.5 Part 6 - What to do With What You Find (758).mp411.05MB
- lectures\\week10\\/Designing and Executing Infortion Security Strategies 9.6 Bonus Lecture Part 1 of 2 (1232).mp449.76MB
- lectures\\week10\\/Designing and Executing Infortion Security Strategies 9.7 Bonus Lecture Part 2 of 2 (1233).mp453.68MB
- lectures\\week2\\/Designing and Executing Infortion Security Strategies 1.0 Part 1 - Week 1 Review (617).mp49.31MB
- lectures\\week2\\/Designing and Executing Infortion Security Strategies 1.1 Part 2 - Incident Response Part 1 of 2 (1408).mp420.21MB
- lectures\\week2\\/Designing and Executing Infortion Security Strategies 1.2 Part 3 - Incident Response Part 2 of 2 (1401).mp420.07MB
- lectures\\week2\\/Designing and Executing Infortion Security Strategies 1.3 Part 4 - My Monday Part 1 of 2 (1528).mp422.39MB
- lectures\\week2\\/Designing and Executing Infortion Security Strategies 1.4 Part 5 - My Monday Part 2 of 2 (1508).mp422.08MB
- lectures\\week3\\/Designing and Executing Infortion Security Strategies 2.0 Part 1 - Compliance (1438).mp420.98MB
- lectures\\week3\\/Designing and Executing Infortion Security Strategies 2.1 Part 2 - Penalties (828).mp412.25MB
- lectures\\week3\\/Designing and Executing Infortion Security Strategies 2.2 Part 3 - Complicated Landscape (607).mp49.08MB
- lectures\\week3\\/Designing and Executing Infortion Security Strategies 2.3 Part 4 - Compliance (1109).mp416.07MB
- lectures\\week3\\/Designing and Executing Infortion Security Strategies 2.4 Part 5 - Your Case (711).mp410.80MB
- lectures\\week4\\/Designing and Executing Infortion Security Strategies 3.0 Part 1 - Approach to Lesson 3 (328).mp45.00MB
- lectures\\week4\\/Designing and Executing Infortion Security Strategies 3.1 Part 2 - Organizational Risk (1100).mp415.79MB
- lectures\\week4\\/Designing and Executing Infortion Security Strategies 3.2 Part 3 - Context - Who is Right (846).mp413.15MB
- lectures\\week4\\/Designing and Executing Infortion Security Strategies 3.3 Part 4 - Mini Assignment (144).mp42.56MB
- lectures\\week4\\/Designing and Executing Infortion Security Strategies 3.4 Part 5 - Information Assurance and Progress (757).mp412.22MB
- lectures\\week4\\/Designing and Executing Infortion Security Strategies 3.5 Part 6 - Enabling Information Assurance (1113).mp416.70MB
- lectures\\week5\\/Designing and Executing Infortion Security Strategies 4.0 Part 1 - Your Case (548).mp48.77MB
- lectures\\week5\\/Designing and Executing Infortion Security Strategies 4.1 Part 2 - Week 4 Review (1054).mp415.43MB
- lectures\\week5\\/Designing and Executing Infortion Security Strategies 4.2 Part 3 - Liability Scenarios Part 1 of 3 (1221).mp417.79MB
- lectures\\week5\\/Designing and Executing Infortion Security Strategies 4.3 Part 4 - Liability Scenarios Part 2 of 3 (1110).mp415.99MB
- lectures\\week5\\/Designing and Executing Infortion Security Strategies 4.4 Part 5 - Liability Scenarios Part 3 of 3 (1413).mp420.95MB
- lectures\\week5\\/Designing (1042).mp415.44MB
- lectures\\week6\\/Designing and Executing Infortion Security Strategies 5.0 Part 1 - Water and Rats (721).mp410.37MB
- lectures\\week6\\/Designing and Executing Infortion Security Strategies 5.1 Part 2 - Go Native (407).mp45.73MB
- lectures\\week6\\/Designing and Executing Infortion Security Strategies 5.2 Part 3 - The CISO Part 1 of 2 (930).mp413.44MB
- lectures\\week6\\/Designing and Executing Infortion Security Strategies 5.3 Part 4 - The CISO Part 2 of 2 (915).mp413.12MB
- lectures\\week6\\/Designing and Executing Infortion Security Strategies 5.4 Part 5 - How Not To (1505).mp421.96MB
- lectures\\week6\\/Designing and Executing Infortion Security Strategies 5.5 Part 6 - Understanding Differences - Working with Them (1444).mp420.90MB
- lectures\\week7\\/Designing and Executing Infortion Security Strategies 6.0 Part 1 - The Cloud Risks (437).mp46.44MB
- lectures\\week7\\/Designing and Executing Infortion Security Strategies 6.1 Part 2 - System Characterization Inputs (1101).mp415.45MB
- lectures\\week7\\/Designing and Executing Infortion Security Strategies 6.2 Part 3 - System Characterization Outputs (853).mp412.52MB
- lectures\\week7\\/Designing and Executing Infortion Security Strategies 6.3 Part 4 - Sensitivity Levels (0).mp49.60MB
- lectures\\week7\\/Designing and Executing Infortion Security Strategies 6.4 Part 5 - Threat Identification (801).mp411.42MB
- lectures\\week7\\/Designing and Executing Infortion Security Strategies 6.5 Part 6 - Vulnerability Identification (637).mp49.71MB
- lectures\\week7\\/Designing and Executing Infortion Security Strategies 6.6 Part 7 - Control Analysis (1117).mp415.68MB
- lectures\\week7\\/Designing and Executing Infortion Security Strategies 6.7 Part 8 - Compare the Cloud (7).mp49.69MB
- lectures\\week8\\/Designing and Executing Infortion Security Strategies 7.0 Part 1 - Budget Decisions (1019).mp414.64MB
- lectures\\week8\\/Designing and Executing Infortion Security Strategies 7.1 Part 2 - Heartland Example (1123).mp416.28MB
- lectures\\week8\\/Designing and Executing Infortion Security Strategies 7.2 Part 3 - Accounting vs. Economics (825).mp412.18MB
- lectures\\week8\\/Designing and Executing Infortion Security Strategies 7.3 Part 4 - Financial Justification (1215).mp417.98MB
- lectures\\week8\\/Designing and Executing Infortion Security Strategies 7.4 Part 5 - Finance and Real Numbers (1311).mp419.09MB
- lectures\\week8\\/Designing and Executing Infortion Security Strategies 7.5 Part 6 - TJ Maxx (607).mp48.69MB
- lectures\\week9\\/Designing and Executing Infortion Security Strategies 8.0 Part 1 - Privacy and Security Introduction (851).mp412.58MB
- lectures\\week9\\/Designing and Executing Infortion Security Strategies 8.1 Part 2 - Private Information (1022).mp414.71MB
- lectures\\week9\\/Designing and Executing Infortion Security Strategies 8.2 Part 3 - History of Privacy (858).mp412.75MB
- lectures\\week9\\/Designing and Executing Infortion Security Strategies 8.3 Part 4 - Scientific Methods Data (809).mp411.67MB
- lectures\\week9\\/Designing and Executing Infortion Security Strategies 8.4 Part 5 - Examples (1043).mp415.44MB
- lectures\\week9\\/Designing and Executing Infortion Security Strategies 8.5 Part 6 - Privacy Value and Concerns (1421).mp420.80MB
- CreateTime2021-01-04
- UpdateTime2021-01-06
- FileTotalCount164
- TotalSize1.87GBHotTimes5ViewTimes10DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.MXSPS-180 2.MXGS-146 3.PSD-406 4.DJSR-003 5.CWM-128 6.GEN-053 7.JUC-631 8.DMBA-126 9.YOZ-209 10.MBYD-125 11.ATAD-069 12.CRC-031 13.MKCK-060 14.ONED-102 15.JUC-004 16.PSSD-216 17.NSPS-074 18.MXPE-004 19.DJSF-018 20.SEYG-015 21.ALD-597 22.ID-19026 23.MIBD-514 24.MKCK-066 25.ONSD-636 26.XV-242 27.MIBD-463 28.HDV-068 29.XV-1141 30.MIBD-528 31.SVOMN-047 32.ONSD-566 33.SOE-632 34.HYA-04 35.CMC-033 36.SGMS-090 37.TYWD-004 38.RKI-140 39.MSYG-006 40.SVDVD-113 41.SGSR-056 42.MGDV-023 43.MIBD-760 44.BNDV-00644 45.BLK-066 46.MSYG-007 47.JKS-018 48.AGEMIX-162 49.GG-093 50.SMA-684 51.MIBD-751 52.WANZ-046 53.ONSD-706 54.EE-008 55.SEED-65 56.YRZ-053 57.VNDS-2932 58.SWE-001 59.NYKD-43 60.HTHD-67 61.SWF-143 62.HE-055 63.SMOW-004 64.MG-050 65.PCHB-003 66.MVF-046D 67.T28-254 68.IDB-035 69.PFB-001 70.PDZ-005 71.209 72.083 73.043 74.092 75.555 76.070 77.253 78.001 79.280 80.04 81.104 82.210 83.034 84.002 85.003 86.103 87.003 88.417 89.003 90.103 91.166 92.098 93.582 94.225 95.051 96.177 97.620 98.018 99.07 100.001 101.116 102.624 103.197 104.013 105.120 106.059 107.439 108.011 109.027 110.020 111.087 112.13 113.130 114.301 115.019 116.124 117.157 118.204 119.857 120.348 121.08 122.659 123.044 124.014 125.006 126.016 127.1010 128.005 129.010 130.021 131.012 132.100302 133.001 134.146 135.011 136.004 137.5091 138.600041 139.118 140.185D