[Coursera] Designing and Executing Information Security Strategies
Mike Simon (University of Washington)

Info hash55284a002672598923af36bc55f3205b42c93b00
Last mirror activity4d,20:58:31 ago
Size1.01GB (1,007,286,635 bytes)
Added2016-09-26 16:00:02
Views1717
Hits4640
ID3435
Typemulti
Downloaded5314 time(s)
Uploaded bygravatar.com icon for user joecohen
Foldercoursera-designing-and-executing-information-security-strategies
Num files164 files
File list
[Hide list]
PathSize
assignments/assignment_1.html51.10kB
assignments/assignment_1_files/204.js6.33kB
assignments/assignment_1_files/400.js7.79kB
assignments/assignment_1_files/abUtils.js2.32kB
assignments/assignment_1_files/assessApi.js0.45kB
assignments/assignment_1_files/catalogApi.js0.45kB
assignments/assignment_1_files/course.css0.17kB
assignments/assignment_1_files/flexjoinLastChanceModal.html.js3.42kB
assignments/assignment_1_files/form-core.js14.46kB
assignments/assignment_1_files/ga.js43.08kB
assignments/assignment_1_files/government_id.jpg24.91kB
assignments/assignment_1_files/header(1).js0.09kB
assignments/assignment_1_files/header.html.js28.87kB
assignments/assignment_1_files/header.js2.12kB
assignments/assignment_1_files/hg.css30.19kB
assignments/assignment_1_files/LearnerStoriesCollection.js0.52kB
assignments/assignment_1_files/LearnerStoryModel.js0.18kB
assignments/assignment_1_files/logo54.35kB
assignments/assignment_1_files/MathJax.js50.41kB
assignments/assignment_1_files/modernizr-custom.js9.35kB
assignments/assignment_1_files/path.js0.23kB
assignments/assignment_1_files/readme.js4.94kB
assignments/assignment_1_files/require.v2-1-1.js22.78kB
assignments/assignment_1_files/ribbon_stripes.png5.73kB
assignments/assignment_1_files/routes.js1.09MB
assignments/assignment_1_files/shim.css14.46kB
assignments/assignment_1_files/sidebar(1).js0.09kB
assignments/assignment_1_files/sidebar.html.js9.23kB
assignments/assignment_1_files/sidebar.js4.17kB
assignments/assignment_1_files/signature_track.js5.07kB
assignments/assignment_1_files/signatureTrackLastChanceModal.html.js4.41kB
assignments/assignment_1_files/spark.main.css283.29kB
assignments/assignment_1_files/university_logo2.93kB
assignments/assignment_1_files/webcam_keyboard.jpg20.79kB
assignments/assignment_2.html52.84kB
assignments/assignment_2_files/204.js6.33kB
assignments/assignment_2_files/400.js7.79kB
assignments/assignment_2_files/abUtils.js2.32kB
assignments/assignment_2_files/assessApi.js0.45kB
assignments/assignment_2_files/catalogApi.js0.45kB
assignments/assignment_2_files/course.css0.17kB
assignments/assignment_2_files/flexjoinLastChanceModal.html.js3.42kB
assignments/assignment_2_files/form-core.js14.46kB
assignments/assignment_2_files/ga.js43.08kB
assignments/assignment_2_files/government_id.jpg24.91kB
assignments/assignment_2_files/header(1).js0.09kB
assignments/assignment_2_files/header.html.js28.87kB
assignments/assignment_2_files/header.js2.12kB
assignments/assignment_2_files/hg.css30.19kB
assignments/assignment_2_files/LearnerStoriesCollection.js0.52kB
assignments/assignment_2_files/LearnerStoryModel.js0.18kB
assignments/assignment_2_files/logo54.35kB
assignments/assignment_2_files/MathJax.js50.41kB
assignments/assignment_2_files/modernizr-custom.js9.35kB
assignments/assignment_2_files/path.js0.23kB
assignments/assignment_2_files/readme.js4.94kB
assignments/assignment_2_files/require.v2-1-1.js22.78kB
assignments/assignment_2_files/ribbon_stripes.png5.73kB
assignments/assignment_2_files/routes.js1.09MB
assignments/assignment_2_files/shim.css14.46kB
assignments/assignment_2_files/sidebar(1).js0.09kB
assignments/assignment_2_files/sidebar.html.js9.23kB
assignments/assignment_2_files/sidebar.js4.17kB
assignments/assignment_2_files/signature_track.js5.07kB
assignments/assignment_2_files/signatureTrackLastChanceModal.html.js4.41kB
assignments/assignment_2_files/spark.main.css283.29kB
assignments/assignment_2_files/university_logo2.93kB
assignments/assignment_2_files/webcam_keyboard.jpg20.79kB
assignments/assignment_3.html57.82kB
assignments/assignment_3_files/204.js6.33kB
assignments/assignment_3_files/400.js7.79kB
assignments/assignment_3_files/abUtils.js2.32kB
assignments/assignment_3_files/assessApi.js0.45kB
assignments/assignment_3_files/catalogApi.js0.45kB
assignments/assignment_3_files/course.css0.17kB
assignments/assignment_3_files/flexjoinLastChanceModal.html.js3.42kB
assignments/assignment_3_files/form-core.js14.46kB
assignments/assignment_3_files/ga.js43.08kB
assignments/assignment_3_files/government_id.jpg24.91kB
assignments/assignment_3_files/header(1).js0.09kB
assignments/assignment_3_files/header.html.js28.87kB
assignments/assignment_3_files/header.js2.12kB
assignments/assignment_3_files/hg.css30.19kB
assignments/assignment_3_files/LearnerStoriesCollection.js0.52kB
assignments/assignment_3_files/LearnerStoryModel.js0.18kB
assignments/assignment_3_files/logo54.35kB
assignments/assignment_3_files/MathJax.js50.41kB
assignments/assignment_3_files/modernizr-custom.js9.35kB
assignments/assignment_3_files/path.js0.23kB
assignments/assignment_3_files/readme.js4.94kB
assignments/assignment_3_files/require.v2-1-1.js22.78kB
assignments/assignment_3_files/ribbon_stripes.png5.73kB
assignments/assignment_3_files/routes.js1.09MB
assignments/assignment_3_files/shim.css14.46kB
assignments/assignment_3_files/sidebar(1).js0.09kB
assignments/assignment_3_files/sidebar.html.js9.23kB
assignments/assignment_3_files/sidebar.js4.17kB
assignments/assignment_3_files/signature_track.js5.07kB
assignments/assignment_3_files/signatureTrackLastChanceModal.html.js4.41kB
assignments/assignment_3_files/spark.main.css283.29kB
assignments/assignment_3_files/university_logo2.93kB
assignments/assignment_3_files/webcam_keyboard.jpg20.79kB
lectures/week1/Designing and Executing Information Security Strategies 0.0 Part 1 - Course Overview (544).mp48.71MB
lectures/week1/Designing and Executing Information Security Strategies 0.1 Part 2 - HackMeCo Basics (1623).mp424.54MB
lectures/week1/Designing and Executing Information Security Strategies 0.2 Part 3 - Case 1 Background Part 1 of 2 (1655).mp425.35MB
lectures/week1/Designing and Executing Information Security Strategies 0.3 Part 4 - Case 1 Background Part 2 of 2 (1241).mp419.94MB
lectures/week1/Designing and Executing Information Security Strategies 0.4 Part 5 - Controls Review (914).mp414.50MB
lectures/week1/Designing and Executing Information Security Strategies 0.5 Part 6 - Case 1 (1108).mp417.78MB
lectures/week10/Designing and Executing Information Security Strategies 9.0 Part 1 - Sources and Uses for Threat Information (705).mp410.31MB
lectures/week10/Designing and Executing Information Security Strategies 9.1 Part 2 - Sources of Threats Part 1 of 3 (935).mp414.24MB
lectures/week10/Designing and Executing Information Security Strategies 9.2 Part 3 - Sources of Threats Part 2 of 3 (958).mp414.53MB
lectures/week10/Designing and Executing Information Security Strategies 9.3 Part 4 - Sources of Threats Part 3 of 3 (815).mp411.85MB
lectures/week10/Designing and Executing Information Security Strategies 9.4 Part 5 - Why What and Who (756).mp411.41MB
lectures/week10/Designing and Executing Information Security Strategies 9.5 Part 6 - What to do With What You Find (758).mp411.59MB
lectures/week10/Designing and Executing Information Security Strategies 9.6 Bonus Lecture Part 1 of 2 (1232).mp452.17MB
lectures/week10/Designing and Executing Information Security Strategies 9.7 Bonus Lecture Part 2 of 2 (1233).mp456.28MB
lectures/week2/Designing and Executing Information Security Strategies 1.0 Part 1 - Week 1 Review (617).mp49.76MB
lectures/week2/Designing and Executing Information Security Strategies 1.1 Part 2 - Incident Response Part 1 of 2 (1408).mp421.19MB
lectures/week2/Designing and Executing Information Security Strategies 1.2 Part 3 - Incident Response Part 2 of 2 (1401).mp421.04MB
lectures/week2/Designing and Executing Information Security Strategies 1.3 Part 4 - My Monday Part 1 of 2 (1528).mp423.48MB
lectures/week2/Designing and Executing Information Security Strategies 1.4 Part 5 - My Monday Part 2 of 2 (1508).mp423.15MB
lectures/week3/Designing and Executing Information Security Strategies 2.0 Part 1 - Compliance (1438).mp422.00MB
lectures/week3/Designing and Executing Information Security Strategies 2.1 Part 2 - Penalties (828).mp412.85MB
lectures/week3/Designing and Executing Information Security Strategies 2.2 Part 3 - Complicated Landscape (607).mp49.52MB
lectures/week3/Designing and Executing Information Security Strategies 2.3 Part 4 - Compliance (1109).mp416.85MB
lectures/week3/Designing and Executing Information Security Strategies 2.4 Part 5 - Your Case (711).mp411.32MB
lectures/week4/Designing and Executing Information Security Strategies 3.0 Part 1 - Approach to Lesson 3 (328).mp45.24MB
lectures/week4/Designing and Executing Information Security Strategies 3.1 Part 2 - Organizational Risk (1100).mp416.55MB
lectures/week4/Designing and Executing Information Security Strategies 3.2 Part 3 - Context - Who is Right (846).mp413.79MB
lectures/week4/Designing and Executing Information Security Strategies 3.3 Part 4 - Mini Assignment (144).mp42.69MB
lectures/week4/Designing and Executing Information Security Strategies 3.4 Part 5 - Information Assurance and Progress (757).mp412.81MB
lectures/week4/Designing and Executing Information Security Strategies 3.5 Part 6 - Enabling Information Assurance (1113).mp417.51MB
lectures/week5/Designing and Executing Information Security Strategies 4.0 Part 1 - Your Case (548).mp49.19MB
lectures/week5/Designing and Executing Information Security Strategies 4.1 Part 2 - Week 4 Review (1054).mp416.18MB
lectures/week5/Designing and Executing Information Security Strategies 4.2 Part 3 - Liability Scenarios Part 1 of 3 (1221).mp418.65MB
lectures/week5/Designing and Executing Information Security Strategies 4.3 Part 4 - Liability Scenarios Part 2 of 3 (1110).mp416.77MB
lectures/week5/Designing and Executing Information Security Strategies 4.4 Part 5 - Liability Scenarios Part 3 of 3 (1413).mp421.97MB
lectures/week5/Designing and Executing Information Security Strategies 4.5 Part 6 - Glitter.com (1042).mp416.19MB
lectures/week6/Designing and Executing Information Security Strategies 5.0 Part 1 - Water and Rats (721).mp410.87MB
lectures/week6/Designing and Executing Information Security Strategies 5.1 Part 2 - Go Native (407).mp46.01MB
lectures/week6/Designing and Executing Information Security Strategies 5.2 Part 3 - The CISO Part 1 of 2 (930).mp414.09MB
lectures/week6/Designing and Executing Information Security Strategies 5.3 Part 4 - The CISO Part 2 of 2 (915).mp413.75MB
lectures/week6/Designing and Executing Information Security Strategies 5.4 Part 5 - How Not To (1505).mp423.03MB
lectures/week6/Designing and Executing Information Security Strategies 5.5 Part 6 - Understanding Differences - Working with Them (1444).mp421.92MB
lectures/week7/Designing and Executing Information Security Strategies 6.0 Part 1 - The Cloud Risks (437).mp46.75MB
lectures/week7/Designing and Executing Information Security Strategies 6.1 Part 2 - System Characterization Inputs (1101).mp416.20MB
lectures/week7/Designing and Executing Information Security Strategies 6.2 Part 3 - System Characterization Outputs (853).mp413.13MB
lectures/week7/Designing and Executing Information Security Strategies 6.3 Part 4 - Sensitivity Levels (640).mp410.07MB
lectures/week7/Designing and Executing Information Security Strategies 6.4 Part 5 - Threat Identification (801).mp411.98MB
lectures/week7/Designing and Executing Information Security Strategies 6.5 Part 6 - Vulnerability Identification (637).mp410.18MB
lectures/week7/Designing and Executing Information Security Strategies 6.6 Part 7 - Control Analysis (1117).mp416.44MB
lectures/week7/Designing and Executing Information Security Strategies 6.7 Part 8 - Compare the Cloud (647).mp410.16MB
lectures/week8/Designing and Executing Information Security Strategies 7.0 Part 1 - Budget Decisions (1019).mp415.35MB
lectures/week8/Designing and Executing Information Security Strategies 7.1 Part 2 - Heartland Example (1123).mp417.07MB
lectures/week8/Designing and Executing Information Security Strategies 7.2 Part 3 - Accounting vs. Economics (825).mp412.77MB
lectures/week8/Designing and Executing Information Security Strategies 7.3 Part 4 - Financial Justification (1215).mp418.85MB
lectures/week8/Designing and Executing Information Security Strategies 7.4 Part 5 - Finance and Real Numbers (1311).mp420.02MB
lectures/week8/Designing and Executing Information Security Strategies 7.5 Part 6 - TJ Maxx (607).mp49.11MB
lectures/week9/Designing and Executing Information Security Strategies 8.0 Part 1 - Privacy and Security Introduction (851).mp413.19MB
lectures/week9/Designing and Executing Information Security Strategies 8.1 Part 2 - Private Information (1022).mp415.42MB
lectures/week9/Designing and Executing Information Security Strategies 8.2 Part 3 - History of Privacy (858).mp413.37MB
lectures/week9/Designing and Executing Information Security Strategies 8.3 Part 4 - Scientific Methods Data (809).mp412.24MB
lectures/week9/Designing and Executing Information Security Strategies 8.4 Part 5 - Examples (1043).mp416.19MB
lectures/week9/Designing and Executing Information Security Strategies 8.5 Part 6 - Privacy Value and Concerns (1421).mp421.81MB
Mirrors15 complete, 1 downloading = 16 mirror(s) total [Log in to see full list]


Send Feedback Start
   0.000005
DB Connect
   0.000503
Lookup hash in DB
   0.000673
Get torrent details
   0.000660
Get torrent details, finished
   0.000697
Get authors
   0.000043
Parse bibtex
   0.000392
Write header
   0.000632
get stars
   0.000543
target tab
   0.000035
Request peers
   0.001334
Write table
   0.003511
geoloc peers
   0.021657
home tab
   0.002322
render right panel
   0.000057
render ads
   0.000094
fetch current hosters
   0.001107
Done