![]() |
Coursera Designing and Executing Information Security Strategies - Printable Version +- Krafty Internet Marketing Forum (https://kraftymarketingprofits.com/internetmarketingforum) +-- Forum: Internet Marketing Tips, Tricks, Courses & Bots! (https://kraftymarketingprofits.com/internetmarketingforum/Forum-internet-marketing-tips-tricks-courses-bots--50) +--- Forum: Internet Marketing Special Downloads! (https://kraftymarketingprofits.com/internetmarketingforum/Forum-internet-marketing-special-downloads--53) +--- Thread: Coursera Designing and Executing Information Security Strategies (/Thread-coursera-designing-and-executing-information-security-strategies--29324) |
Coursera Designing and Executing Information Security Strategies - aretr - 08-13-2019 ![]() Coursera - Designing and Executing Information Security Strategies (University of Washington) WEBRip | English | MP4 | 960 x 540 | AVC ~59.1 kbps | 29.970 fps AAC | 128 Kbps | 44.1 KHz | 2 channels | 10:05:53 | 960 MB Genre: eLearning Video / Information Technology, Computer Science, Security This course provides you with opportunities to integrate and apply your information security knowledge. Following the case-study approach, you will be introduced to current, real-world cases developed and presented by the practitioner community. You will design and execute information assurance strategies to solve these cases. Many of you will be aware of the Massive Open Online Course (MOOC) platform Coursera and the great content they offer. Among many other interesting online courses they occasionally run courses relevant to Information Security and while not all of them are worthwhile i'd like to highlight one in particular. The 'Designing and Executing Information Security Strategies' course led by Mike Simon (University of Washington) provides a great no nonsense, non technical glimpse into the real world of Information Security practitioners. It does not get hung up on theoretical issues but focuses on real challenges and scenarios from Mike's experience in the field. Obviously it is not 'Zero to Hero' Information Security professional course but it is a good introduction particularly to those who are not overly familiar with Information Security and like to know what all the fuss is about. Financial Services ASP, provides credit clearance software services for 20 large banks worldwide We provide the platform and the software, their (the banks) people operate the system Our DBAs have access to the banks databases for support reasons Network security, database security, application security are all ours All of our customers audit us, using whatever standard they see fit ISO 27002, BS 7799, SS 627799, etc What's important to our customers Information in the database includes Names Date of birth Financial details (income, savings, net worth) Credit Card info SSN They want to know that every person with access to the data meets certain criteria Background checked Qualified for the work Authorized specifically for access to their data Important, Part 2 They want to know that there is distinct separation of duties for adding authenticated access to the database They want to know exactly how network (not authenticated) access to web servers, application servers and database servers is protected They want to know who has access to what, and they want to audit these accesses. General Complete name : Designing and Executing Information Security Strategies 9.2 Part 3 - Sources of Threats Part 2 of 3 (958).mp4 Format : MPEG-4 Format profile : Base Media Codec ID : isom File size : 13.9 MiB Duration : 9mn 58s Overall bit rate : 194 Kbps Encoded date : UTC 1970-01-01 00:00:00 Tagged date : UTC 1970-01-01 00:00:00 Writing application : Lavf53.29.100 Video ID : 1 Format : AVC Format/Info : Advanced Video Codec Format profile : Format settings, CABAC : Yes Format settings, ReFrames : 4 frames Codec ID : avc1 Codec ID/Info : Advanced Video Coding Duration : 9mn 58s Bit rate : 59.1 Kbps Width : 960 pixels Height : 540 pixels Display aspect ratio : 16:9 Frame rate mode : Constant Frame rate : 29.970 fps Color space : YUV Chroma subsampling : 4:2:0 Bit depth : 8 bits Scan type : Progressive Bits/(Pixel*Frame) : 0.004 Stream size : 4.22 MiB (30%) Writing library : x264 core 120 r2120 0c7dab9 Encoding settings : cabac=1 / ref=3 / deblock=1:0:0 / analyse=0x3:0x113 / me=hex / subme=7 / psy=1 / psy_rd=1.00:0.00 / mixed_ref=1 / me_range=16 / chroma_me=1 / trellis=1 / 8x8dct=1 / cqm=0 / deadzone=21,11 / fast_pskip=1 / chroma_qp_offset=-2 / threads=12 / sliced_threads=0 / nr=0 / decimate=1 / interlaced=0 / bluray_compat=0 / constrained_intra=0 / bframes=3 / b_pyramid=2 / b_adapt=1 / b_bias=0 / direct=1 / weightb=1 / open_gop=0 / weightp=2 / keyint=250 / keyint_min=25 / scenecut=40 / intra_refresh=0 / rc_lookahead=40 / rc=crf / mbtree=1 / crf=28.0 / qcomp=0.60 / qpmin=0 / qpmax=69 / qpstep=4 / ip_ratio=1.40 / aq=1:1.00 Encoded date : UTC 1970-01-01 00:00:00 Tagged date : UTC 1970-01-01 00:00:00 Audio ID : 2 Format : AAC Format/Info : Advanced Audio Codec Format profile : LC Codec ID : 40 Duration : 9mn 58s Bit rate mode : Constant Bit rate : 128 Kbps Channel(s) : 2 channels Channel positions : Front: L R Sampling rate : 44.1 KHz Compression mode : Lossy Stream size : 9.12 MiB (66%) Encoded date : UTC 1970-01-01 00:00:00 Tagged date : UTC 1970-01-01 00:00:00 Screenshots ![]() ![]() ![]() DOWNLOAD Code: http://nitroflare.com/view/39C5839C2C2A638/yldwq.Coursera..Designing.and.Executing.Information.Security.Strategies.part01.rar Code: https://rapidgator.net/file/8baf0ae33f3292701d3b765907138bad/yldwq.Coursera..Designing.and.Executing.Information.Security.Strategies.part01.rar |