[Coursera] Designing and Executing Information Security Strategies
Movies Preview
Share or Embed This Item
movies
[Coursera] Designing and Executing Information Security Strategies
This course provides you with opportunities to integrate and apply your information security knowledge. Following the case-study approach, you will be introduced to current, real-world cases developed and presented by the practitioner community. You will design and execute information assurance strategies to solve these cases.
- Academictorrents_collection
- video-lectures
- Addeddate
- 2018-08-12 18:53:13
- External-identifier
- urn:academictorrents:55284a002672598923af36bc55f3205b42c93b00
- Identifier
- academictorrents_55284a002672598923af36bc55f3205b42c93b00
- Scanner
- Internet Archive Python library 1.8.1
- Source
-
http://academictorrents.com/details/55284a002672598923af36bc55f3205b42c93b00
torrent:urn:sha1:55284a002672598923af36bc55f3205b42c93b00
- Year
- 2014
comment
Reviews
There are no reviews yet. Be the first one to
write a review.
638 Views
2 Favorites
DOWNLOAD OPTIONS
CASCADING STYLE SHEET
Uplevel BACK
166.0B
course.css download
29.5K
hg.css download
14.1K
shim.css download
276.7K
spark.main.css download
166.0B
course.css download
29.5K
hg.css download
14.1K
shim.css download
276.7K
spark.main.css download
166.0B
course.css download
29.5K
hg.css download
14.1K
shim.css download
276.7K
spark.main.css download
MPEG4
Uplevel BACK
17.0M
Designing and Executing Information Security Strategies 0.5 Part 6 - Case 1 (1108).mp4 download
21.0M
Designing and Executing Information Security Strategies 2.0 Part 1 - Compliance (1438).mp4 download
12.3M
Designing and Executing Information Security Strategies 2.1 Part 2 - Penalties (828).mp4 download
16.1M
Designing and Executing Information Security Strategies 2.3 Part 4 - Compliance (1109).mp4 download
10.8M
Designing and Executing Information Security Strategies 2.4 Part 5 - Your Case (711).mp4 download
8.8M
Designing and Executing Information Security Strategies 4.0 Part 1 - Your Case (548).mp4 download
15.4M
Designing and Executing Information Security Strategies 4.5 Part 6 - Glitter.com (1042).mp4 download
5.7M
Designing and Executing Information Security Strategies 5.1 Part 2 - Go Native (407).mp4 download
22.0M
Designing and Executing Information Security Strategies 5.4 Part 5 - How Not To (1505).mp4 download
8.7M
Designing and Executing Information Security Strategies 7.5 Part 6 - TJ Maxx (607).mp4 download
OGG VIDEO
Uplevel BACK
47.7M
Designing and Executing Information Security Strategies 0.5 Part 6 - Case 1 (1108).ogv download
61.1M
Designing and Executing Information Security Strategies 2.0 Part 1 - Compliance (1438).ogv download
35.8M
Designing and Executing Information Security Strategies 2.1 Part 2 - Penalties (828).ogv download
47.5M
Designing and Executing Information Security Strategies 2.3 Part 4 - Compliance (1109).ogv download
30.8M
Designing and Executing Information Security Strategies 2.4 Part 5 - Your Case (711).ogv download
24.9M
Designing and Executing Information Security Strategies 4.0 Part 1 - Your Case (548).ogv download
45.6M
Designing and Executing Information Security Strategies 4.5 Part 6 - Glitter.com (1042).ogv download
16.6M
Designing and Executing Information Security Strategies 5.1 Part 2 - Go Native (407).ogv download
64.5M
Designing and Executing Information Security Strategies 5.4 Part 5 - How Not To (1505).ogv download
26.0M
Designing and Executing Information Security Strategies 7.5 Part 6 - TJ Maxx (607).ogv download
IN COLLECTIONS
Uploaded by arkiver2 on