[Coursera] Designing and Executing Information Security Strategies
Mike Simon (University of Washington)

Info hash55284a002672598923af36bc55f3205b42c93b00
Last mirror activity19:40 ago
Size1.01GB (1,007,286,635 bytes)
Added2016-09-26 16:00:02
Views1729
Hits4656
ID3435
Typemulti
Downloaded5356 time(s)
Uploaded bygravatar.com icon for user joecohen
Foldercoursera-designing-and-executing-information-security-strategies
Num files164 files
File list
[Hide list]
PathSize
assignments/assignment_1.html51.10kB
assignments/assignment_1_files/204.js6.33kB
assignments/assignment_1_files/400.js7.79kB
assignments/assignment_1_files/abUtils.js2.32kB
assignments/assignment_1_files/assessApi.js0.45kB
assignments/assignment_1_files/catalogApi.js0.45kB
assignments/assignment_1_files/course.css0.17kB
assignments/assignment_1_files/flexjoinLastChanceModal.html.js3.42kB
assignments/assignment_1_files/form-core.js14.46kB
assignments/assignment_1_files/ga.js43.08kB
assignments/assignment_1_files/government_id.jpg24.91kB
assignments/assignment_1_files/header(1).js0.09kB
assignments/assignment_1_files/header.html.js28.87kB
assignments/assignment_1_files/header.js2.12kB
assignments/assignment_1_files/hg.css30.19kB
assignments/assignment_1_files/LearnerStoriesCollection.js0.52kB
assignments/assignment_1_files/LearnerStoryModel.js0.18kB
assignments/assignment_1_files/logo54.35kB
assignments/assignment_1_files/MathJax.js50.41kB
assignments/assignment_1_files/modernizr-custom.js9.35kB
assignments/assignment_1_files/path.js0.23kB
assignments/assignment_1_files/readme.js4.94kB
assignments/assignment_1_files/require.v2-1-1.js22.78kB
assignments/assignment_1_files/ribbon_stripes.png5.73kB
assignments/assignment_1_files/routes.js1.09MB
assignments/assignment_1_files/shim.css14.46kB
assignments/assignment_1_files/sidebar(1).js0.09kB
assignments/assignment_1_files/sidebar.html.js9.23kB
assignments/assignment_1_files/sidebar.js4.17kB
assignments/assignment_1_files/signature_track.js5.07kB
assignments/assignment_1_files/signatureTrackLastChanceModal.html.js4.41kB
assignments/assignment_1_files/spark.main.css283.29kB
assignments/assignment_1_files/university_logo2.93kB
assignments/assignment_1_files/webcam_keyboard.jpg20.79kB
assignments/assignment_2.html52.84kB
assignments/assignment_2_files/204.js6.33kB
assignments/assignment_2_files/400.js7.79kB
assignments/assignment_2_files/abUtils.js2.32kB
assignments/assignment_2_files/assessApi.js0.45kB
assignments/assignment_2_files/catalogApi.js0.45kB
assignments/assignment_2_files/course.css0.17kB
assignments/assignment_2_files/flexjoinLastChanceModal.html.js3.42kB
assignments/assignment_2_files/form-core.js14.46kB
assignments/assignment_2_files/ga.js43.08kB
assignments/assignment_2_files/government_id.jpg24.91kB
assignments/assignment_2_files/header(1).js0.09kB
assignments/assignment_2_files/header.html.js28.87kB
assignments/assignment_2_files/header.js2.12kB
assignments/assignment_2_files/hg.css30.19kB
assignments/assignment_2_files/LearnerStoriesCollection.js0.52kB
assignments/assignment_2_files/LearnerStoryModel.js0.18kB
assignments/assignment_2_files/logo54.35kB
assignments/assignment_2_files/MathJax.js50.41kB
assignments/assignment_2_files/modernizr-custom.js9.35kB
assignments/assignment_2_files/path.js0.23kB
assignments/assignment_2_files/readme.js4.94kB
assignments/assignment_2_files/require.v2-1-1.js22.78kB
assignments/assignment_2_files/ribbon_stripes.png5.73kB
assignments/assignment_2_files/routes.js1.09MB
assignments/assignment_2_files/shim.css14.46kB
assignments/assignment_2_files/sidebar(1).js0.09kB
assignments/assignment_2_files/sidebar.html.js9.23kB
assignments/assignment_2_files/sidebar.js4.17kB
assignments/assignment_2_files/signature_track.js5.07kB
assignments/assignment_2_files/signatureTrackLastChanceModal.html.js4.41kB
assignments/assignment_2_files/spark.main.css283.29kB
assignments/assignment_2_files/university_logo2.93kB
assignments/assignment_2_files/webcam_keyboard.jpg20.79kB
assignments/assignment_3.html57.82kB
assignments/assignment_3_files/204.js6.33kB
assignments/assignment_3_files/400.js7.79kB
assignments/assignment_3_files/abUtils.js2.32kB
assignments/assignment_3_files/assessApi.js0.45kB
assignments/assignment_3_files/catalogApi.js0.45kB
assignments/assignment_3_files/course.css0.17kB
assignments/assignment_3_files/flexjoinLastChanceModal.html.js3.42kB
assignments/assignment_3_files/form-core.js14.46kB
assignments/assignment_3_files/ga.js43.08kB
assignments/assignment_3_files/government_id.jpg24.91kB
assignments/assignment_3_files/header(1).js0.09kB
assignments/assignment_3_files/header.html.js28.87kB
assignments/assignment_3_files/header.js2.12kB
assignments/assignment_3_files/hg.css30.19kB
assignments/assignment_3_files/LearnerStoriesCollection.js0.52kB
assignments/assignment_3_files/LearnerStoryModel.js0.18kB
assignments/assignment_3_files/logo54.35kB
assignments/assignment_3_files/MathJax.js50.41kB
assignments/assignment_3_files/modernizr-custom.js9.35kB
assignments/assignment_3_files/path.js0.23kB
assignments/assignment_3_files/readme.js4.94kB
assignments/assignment_3_files/require.v2-1-1.js22.78kB
assignments/assignment_3_files/ribbon_stripes.png5.73kB
assignments/assignment_3_files/routes.js1.09MB
assignments/assignment_3_files/shim.css14.46kB
assignments/assignment_3_files/sidebar(1).js0.09kB
assignments/assignment_3_files/sidebar.html.js9.23kB
assignments/assignment_3_files/sidebar.js4.17kB
assignments/assignment_3_files/signature_track.js5.07kB
assignments/assignment_3_files/signatureTrackLastChanceModal.html.js4.41kB
assignments/assignment_3_files/spark.main.css283.29kB
assignments/assignment_3_files/university_logo2.93kB
assignments/assignment_3_files/webcam_keyboard.jpg20.79kB
lectures/week1/Designing and Executing Information Security Strategies 0.0 Part 1 - Course Overview (544).mp48.71MB
lectures/week1/Designing and Executing Information Security Strategies 0.1 Part 2 - HackMeCo Basics (1623).mp424.54MB
lectures/week1/Designing and Executing Information Security Strategies 0.2 Part 3 - Case 1 Background Part 1 of 2 (1655).mp425.35MB
lectures/week1/Designing and Executing Information Security Strategies 0.3 Part 4 - Case 1 Background Part 2 of 2 (1241).mp419.94MB
lectures/week1/Designing and Executing Information Security Strategies 0.4 Part 5 - Controls Review (914).mp414.50MB
lectures/week1/Designing and Executing Information Security Strategies 0.5 Part 6 - Case 1 (1108).mp417.78MB
lectures/week10/Designing and Executing Information Security Strategies 9.0 Part 1 - Sources and Uses for Threat Information (705).mp410.31MB
lectures/week10/Designing and Executing Information Security Strategies 9.1 Part 2 - Sources of Threats Part 1 of 3 (935).mp414.24MB
lectures/week10/Designing and Executing Information Security Strategies 9.2 Part 3 - Sources of Threats Part 2 of 3 (958).mp414.53MB
lectures/week10/Designing and Executing Information Security Strategies 9.3 Part 4 - Sources of Threats Part 3 of 3 (815).mp411.85MB
lectures/week10/Designing and Executing Information Security Strategies 9.4 Part 5 - Why What and Who (756).mp411.41MB
lectures/week10/Designing and Executing Information Security Strategies 9.5 Part 6 - What to do With What You Find (758).mp411.59MB
lectures/week10/Designing and Executing Information Security Strategies 9.6 Bonus Lecture Part 1 of 2 (1232).mp452.17MB
lectures/week10/Designing and Executing Information Security Strategies 9.7 Bonus Lecture Part 2 of 2 (1233).mp456.28MB
lectures/week2/Designing and Executing Information Security Strategies 1.0 Part 1 - Week 1 Review (617).mp49.76MB
lectures/week2/Designing and Executing Information Security Strategies 1.1 Part 2 - Incident Response Part 1 of 2 (1408).mp421.19MB
lectures/week2/Designing and Executing Information Security Strategies 1.2 Part 3 - Incident Response Part 2 of 2 (1401).mp421.04MB
lectures/week2/Designing and Executing Information Security Strategies 1.3 Part 4 - My Monday Part 1 of 2 (1528).mp423.48MB
lectures/week2/Designing and Executing Information Security Strategies 1.4 Part 5 - My Monday Part 2 of 2 (1508).mp423.15MB
lectures/week3/Designing and Executing Information Security Strategies 2.0 Part 1 - Compliance (1438).mp422.00MB
lectures/week3/Designing and Executing Information Security Strategies 2.1 Part 2 - Penalties (828).mp412.85MB
lectures/week3/Designing and Executing Information Security Strategies 2.2 Part 3 - Complicated Landscape (607).mp49.52MB
lectures/week3/Designing and Executing Information Security Strategies 2.3 Part 4 - Compliance (1109).mp416.85MB
lectures/week3/Designing and Executing Information Security Strategies 2.4 Part 5 - Your Case (711).mp411.32MB
lectures/week4/Designing and Executing Information Security Strategies 3.0 Part 1 - Approach to Lesson 3 (328).mp45.24MB
lectures/week4/Designing and Executing Information Security Strategies 3.1 Part 2 - Organizational Risk (1100).mp416.55MB
lectures/week4/Designing and Executing Information Security Strategies 3.2 Part 3 - Context - Who is Right (846).mp413.79MB
lectures/week4/Designing and Executing Information Security Strategies 3.3 Part 4 - Mini Assignment (144).mp42.69MB
lectures/week4/Designing and Executing Information Security Strategies 3.4 Part 5 - Information Assurance and Progress (757).mp412.81MB
lectures/week4/Designing and Executing Information Security Strategies 3.5 Part 6 - Enabling Information Assurance (1113).mp417.51MB
lectures/week5/Designing and Executing Information Security Strategies 4.0 Part 1 - Your Case (548).mp49.19MB
lectures/week5/Designing and Executing Information Security Strategies 4.1 Part 2 - Week 4 Review (1054).mp416.18MB
lectures/week5/Designing and Executing Information Security Strategies 4.2 Part 3 - Liability Scenarios Part 1 of 3 (1221).mp418.65MB
lectures/week5/Designing and Executing Information Security Strategies 4.3 Part 4 - Liability Scenarios Part 2 of 3 (1110).mp416.77MB
lectures/week5/Designing and Executing Information Security Strategies 4.4 Part 5 - Liability Scenarios Part 3 of 3 (1413).mp421.97MB
lectures/week5/Designing and Executing Information Security Strategies 4.5 Part 6 - Glitter.com (1042).mp416.19MB
lectures/week6/Designing and Executing Information Security Strategies 5.0 Part 1 - Water and Rats (721).mp410.87MB
lectures/week6/Designing and Executing Information Security Strategies 5.1 Part 2 - Go Native (407).mp46.01MB
lectures/week6/Designing and Executing Information Security Strategies 5.2 Part 3 - The CISO Part 1 of 2 (930).mp414.09MB
lectures/week6/Designing and Executing Information Security Strategies 5.3 Part 4 - The CISO Part 2 of 2 (915).mp413.75MB
lectures/week6/Designing and Executing Information Security Strategies 5.4 Part 5 - How Not To (1505).mp423.03MB
lectures/week6/Designing and Executing Information Security Strategies 5.5 Part 6 - Understanding Differences - Working with Them (1444).mp421.92MB
lectures/week7/Designing and Executing Information Security Strategies 6.0 Part 1 - The Cloud Risks (437).mp46.75MB
lectures/week7/Designing and Executing Information Security Strategies 6.1 Part 2 - System Characterization Inputs (1101).mp416.20MB
lectures/week7/Designing and Executing Information Security Strategies 6.2 Part 3 - System Characterization Outputs (853).mp413.13MB
lectures/week7/Designing and Executing Information Security Strategies 6.3 Part 4 - Sensitivity Levels (640).mp410.07MB
lectures/week7/Designing and Executing Information Security Strategies 6.4 Part 5 - Threat Identification (801).mp411.98MB
lectures/week7/Designing and Executing Information Security Strategies 6.5 Part 6 - Vulnerability Identification (637).mp410.18MB
lectures/week7/Designing and Executing Information Security Strategies 6.6 Part 7 - Control Analysis (1117).mp416.44MB
lectures/week7/Designing and Executing Information Security Strategies 6.7 Part 8 - Compare the Cloud (647).mp410.16MB
lectures/week8/Designing and Executing Information Security Strategies 7.0 Part 1 - Budget Decisions (1019).mp415.35MB
lectures/week8/Designing and Executing Information Security Strategies 7.1 Part 2 - Heartland Example (1123).mp417.07MB
lectures/week8/Designing and Executing Information Security Strategies 7.2 Part 3 - Accounting vs. Economics (825).mp412.77MB
lectures/week8/Designing and Executing Information Security Strategies 7.3 Part 4 - Financial Justification (1215).mp418.85MB
lectures/week8/Designing and Executing Information Security Strategies 7.4 Part 5 - Finance and Real Numbers (1311).mp420.02MB
lectures/week8/Designing and Executing Information Security Strategies 7.5 Part 6 - TJ Maxx (607).mp49.11MB
lectures/week9/Designing and Executing Information Security Strategies 8.0 Part 1 - Privacy and Security Introduction (851).mp413.19MB
lectures/week9/Designing and Executing Information Security Strategies 8.1 Part 2 - Private Information (1022).mp415.42MB
lectures/week9/Designing and Executing Information Security Strategies 8.2 Part 3 - History of Privacy (858).mp413.37MB
lectures/week9/Designing and Executing Information Security Strategies 8.3 Part 4 - Scientific Methods Data (809).mp412.24MB
lectures/week9/Designing and Executing Information Security Strategies 8.4 Part 5 - Examples (1043).mp416.19MB
lectures/week9/Designing and Executing Information Security Strategies 8.5 Part 6 - Privacy Value and Concerns (1421).mp421.81MB
Mirrors12 complete, 1 downloading = 13 mirror(s) total [Log in to see full list]


Send Feedback