Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Coursera - Designing and Executing Information Security Strategies

    Posted By: ParRus
    Coursera - Designing and Executing Information Security Strategies

    Coursera - Designing and Executing Information Security Strategies (University of Washington)
    WEBRip | English | MP4 | 960 x 540 | AVC ~59.1 kbps | 29.970 fps
    AAC | 128 Kbps | 44.1 KHz | 2 channels | 10:05:53 | 960 MB
    Genre: eLearning Video / Information Technology, Computer Science, Security

    This course provides you with opportunities to integrate and apply your information security knowledge. Following the case-study approach, you will be introduced to current, real-world cases developed and presented by the practitioner community. You will design and execute information assurance strategies to solve these cases.
    Many of you will be aware of the Massive Open Online Course (MOOC) platform Coursera and the great content they offer. Among many other interesting online courses they occasionally run courses relevant to Information Security and while not all of them are worthwhile i’d like to highlight one in particular.

    The ‘Designing and Executing Information Security Strategies’ course led by Mike Simon (University of Washington) provides a great no nonsense, non technical glimpse into the real world of Information Security practitioners. It does not get hung up on theoretical issues but focuses on real challenges and scenarios from Mike’s experience in the field. Obviously it is not ‘Zero to Hero’ Information Security professional course but it is a good introduction particularly to those who are not overly familiar with Information Security and like to know what all the fuss is about.

    Financial Services ASP, provides credit clearance software services for 20 large banks worldwide
    We provide the platform and the software, their (the banks) people operate the system
    Our DBAs have access to the banks databases for support reasons
    Network security, database security, application security are all ours
    All of our customers audit us, using whatever standard they see fit ISO 27002, BS 7799, SS 627799, etc


    What’s important to our customers

    Information in the database includes
    Names
    Date of birth
    Financial details (income, savings, net worth)
    Credit Card info
    SSN
    They want to know that every person with access to the data meets certain criteria
    Background checked
    Qualified for the work
    Authorized specifically for access to their data


    Important, Part 2

    They want to know that there is distinct separation of duties for adding authenticated access to the database
    They want to know exactly how network (not authenticated) access to web servers, application servers and database servers is protected
    They want to know who has access to what, and they want to audit these accesses.

    also You can watch my other helpful: Coursera-posts
    (if old file-links don't show activity, try copy-paste them to the address bar)

    General
    Complete name : Designing and Executing Information Security Strategies 9.2 Part 3 - Sources of Threats Part 2 of 3 (958).mp4
    Format : MPEG-4
    Format profile : Base Media
    Codec ID : isom
    File size : 13.9 MiB
    Duration : 9mn 58s
    Overall bit rate : 194 Kbps
    Encoded date : UTC 1970-01-01 00:00:00
    Tagged date : UTC 1970-01-01 00:00:00
    Writing application : Lavf53.29.100

    Video
    ID : 1
    Format : AVC
    Format/Info : Advanced Video Codec
    Format profile : High@L3.1
    Format settings, CABAC : Yes
    Format settings, ReFrames : 4 frames
    Codec ID : avc1
    Codec ID/Info : Advanced Video Coding
    Duration : 9mn 58s
    Bit rate : 59.1 Kbps
    Width : 960 pixels
    Height : 540 pixels
    Display aspect ratio : 16:9
    Frame rate mode : Constant
    Frame rate : 29.970 fps
    Color space : YUV
    Chroma subsampling : 4:2:0
    Bit depth : 8 bits
    Scan type : Progressive
    Bits/(Pixel*Frame) : 0.004
    Stream size : 4.22 MiB (30%)
    Writing library : x264 core 120 r2120 0c7dab9
    Encoding settings : cabac=1 / ref=3 / deblock=1:0:0 / analyse=0x3:0x113 / me=hex / subme=7 / psy=1 / psy_rd=1.00:0.00 / mixed_ref=1 / me_range=16 / chroma_me=1 / trellis=1 / 8x8dct=1 / cqm=0 / deadzone=21,11 / fast_pskip=1 / chroma_qp_offset=-2 / threads=12 / sliced_threads=0 / nr=0 / decimate=1 / interlaced=0 / bluray_compat=0 / constrained_intra=0 / bframes=3 / b_pyramid=2 / b_adapt=1 / b_bias=0 / direct=1 / weightb=1 / open_gop=0 / weightp=2 / keyint=250 / keyint_min=25 / scenecut=40 / intra_refresh=0 / rc_lookahead=40 / rc=crf / mbtree=1 / crf=28.0 / qcomp=0.60 / qpmin=0 / qpmax=69 / qpstep=4 / ip_ratio=1.40 / aq=1:1.00
    Encoded date : UTC 1970-01-01 00:00:00
    Tagged date : UTC 1970-01-01 00:00:00

    Audio
    ID : 2
    Format : AAC
    Format/Info : Advanced Audio Codec
    Format profile : LC
    Codec ID : 40
    Duration : 9mn 58s
    Bit rate mode : Constant
    Bit rate : 128 Kbps
    Channel(s) : 2 channels
    Channel positions : Front: L R
    Sampling rate : 44.1 KHz
    Compression mode : Lossy
    Stream size : 9.12 MiB (66%)
    Encoded date : UTC 1970-01-01 00:00:00
    Tagged date : UTC 1970-01-01 00:00:00
    Screenshots

    Coursera - Designing and Executing Information Security Strategies

    Coursera - Designing and Executing Information Security Strategies

    Coursera - Designing and Executing Information Security Strategies

    Coursera - Designing and Executing Information Security Strategies

    Coursera - Designing and Executing Information Security Strategies

    Coursera - Designing and Executing Information Security Strategies

    Coursera - Designing and Executing Information Security Strategies

    Coursera - Designing and Executing Information Security Strategies

    ✅ Exclusive eLearning Videos ParRus-blogadd to bookmarks

    Feel free to contact me PM
    when links are dead or want any repost

    Coursera - Designing and Executing Information Security Strategies