Udemy - NIST 800-30 - Risk Assessment Step by Step

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size1.4 GB
  • Uploaded Byfreecoursewb
  • Downloads33
  • Last checkedJun. 13th '25
  • Date uploadedJun. 12th '25
  • Seeders 9
  • Leechers7

Infohash : CC4771FB4928A6F9E6F274E624382E7EF9FFA90F

NIST 800-30: Risk Assessment Step by Step

https://WebToolTip.com

Published 5/2025
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 4h 20m | Size: 1.4 GB

Learn how to conduct, document, and apply risk assessments using NIST SP 800-30 Rev.1 with templates, and case studies

What you'll learn
Conduct structured risk assessments using NIST 800-30 guidelines.
Identify threat sources, events, vulnerabilities, and impacts.
Develop and communicate actionable risk assessment results.
Apply risk assessment techniques in real-world case scenarios.

Requirements
Basic understanding of IT systems or cybersecurity is helpful but not required. All concepts will be clearly explained.

Files:

[ WebToolTip.com ] Udemy - NIST 800-30 - Risk Assessment Step by Step
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1 - Introduction
    • 1 -Introduction.mp4 (34.6 MB)
    • 2 -Model Company_ MediSure Health Solutions Inc.docx (7.9 KB)
    • 2 -Our Use Case - MediSure Health Solutions Inc.mp4 (14.5 MB)
    2 - Risk Management Process
    • 1 -Risk Management Process.mp4 (36.1 MB)
    • 2 -Risk Assessment.mp4 (10.1 MB)
    3 - Key Risk Concepts
    • 1 -Key Risk Concepts (1).mp4 (68.1 MB)
    • 2 -Key Risk Concepts (1).mp4 (52.8 MB)
    4 - Application of Risk Assessments
    • 1 -Application of Risk Assessments (1).mp4 (61.4 MB)
    • 2 -Application of Risk Assessments (2).mp4 (48.7 MB)
    5 - The Risk Assessment Process
    • 1 -The Risk Assessment Process.mp4 (13.1 MB)
    • 2 -Use Case for Assignments AeroLink Logistics.mp4 (10.8 MB)
    • 2 -Use Case_ AeroLink Logistics Inc.docx (7.7 KB)
    6 - Step 1 Prepare For The Assessment
    • 1 -Step 1 - Prepare For The Assessment.mp4 (20.1 MB)
    • 2 -Task 1-1 Identify Purpose.mp4 (17.3 MB)
    • 3 -Task 1-2 Identify Scope.mp4 (19.8 MB)
    • 4 -Task 1-3 Identify the Specific Assumptions and Constraints (1).mp4 (47.0 MB)
    • 5 -Task 1-3 Identify the Specific Assumptions and Constraints (2).mp4 (52.0 MB)
    • 6 -Task 1-4 Identify Information Sources.mp4 (9.2 MB)
    7 - Step 2 - Conducting The Risk Assessment
    • 1 -Step 2 Conducting The Risk Assessment.mp4 (12.5 MB)
    • 10 -APPENDIX F - VULNERABILITIES AND PREDISPOSING CONDITIONS (1).mp4 (54.8 MB)
    • 11 -APPENDIX F - VULNERABILITIES AND PREDISPOSING CONDITIONS (2).mp4 (50.2 MB)
    • 12 -Task 2-4 - Determine Likelihood of Threat Event Success.mp4 (8.9 MB)
    • 13 -Appendix G – Likelihood Determination (1).mp4 (48.7 MB)
    • 14 -Appendix G – Likelihood Determination (2).mp4 (31.2 MB)
    • 15 -Task 2-5 - Determine Impact of Successful Exploitation.mp4 (17.2 MB)
    • 16 -APPENDIX H - IMPACT (1).mp4 (34.4 MB)
    • 17 -APPENDIX H - IMPACT (2).mp4 (46.7 MB)
    • 18 -Task 2-6 - Determine Information Security Risks.mp4 (15.0 MB)
    • 19 -APPENDIX I - RISK DETERMINATION (1).mp4 (94.8 MB)
    • 2 -NIST 800-30 Appendices.mp4 (16.1 MB)
    • 20 -APPENDIX I - RISK DETERMINATION (2).mp4 (104.4 MB)
    • 3 -Task 2-1 Identify Threat Sources.mp4 (10.1 MB)
    • 4 -Appendix D - Threat Sources (1).mp4 (57.9 MB)
    • 5 -Appendix D - Threat Sources (2).mp4 (61.2 MB)
    • 6 -Task 2-2 - Identify Threat Events.mp4 (11.4 MB)
    • 7 -APPENDIX E - THREAT EVENTS (1).mp4 (106.0 MB)
    • 8 -APPENDIX E - THREAT EVENTS (2).mp4 (38.2 MB)
    • 9 -Task 2-3 - Identify Vulnerabilities and Predisposing Conditions.mp4 (18.1 MB)
    8 - Step 3 ... Step 5
    • 1 -Step 3 - Communicate and Share Results.mp4 (11.9 MB)
    • 2 -Step 4 - Maintain the Assessment.mp4 (32.9 MB)
    • 3 -Step 5 - Maintain the Risk Assessment.mp4 (24.1 MB)
    9 - Conclusion
    • 1 -Conclusion.mp4 (14.3 MB)
    • Bonus Resources.txt (0.1 KB)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce