[Coursera] Designing and Executing Information Security Strategies
Mike Simon (University of Washington)

Info hash55284a002672598923af36bc55f3205b42c93b00
Last mirror activity6d,19:55:54 ago
Size1.01GB (1,007,286,635 bytes)
Added2016-09-26 16:00:02
Views1926
Hits4923
ID3435
Typemulti
Downloaded5905 time(s)
Uploaded by gravatar.com icon for user joecohen
Foldercoursera-designing-and-executing-information-security-strategies
Num files164 files
File list [Hide list]
assignments/assignment_1.html 51.10kB
assignments/assignment_1_files/204.js 6.33kB
assignments/assignment_1_files/400.js 7.79kB
assignments/assignment_1_files/abUtils.js 2.32kB
assignments/assignment_1_files/assessApi.js 0.45kB
assignments/assignment_1_files/catalogApi.js 0.45kB
assignments/assignment_1_files/course.css 0.17kB
assignments/assignment_1_files/flexjoinLastChanceModal.html.js 3.42kB
assignments/assignment_1_files/form-core.js 14.46kB
assignments/assignment_1_files/ga.js 43.08kB
assignments/assignment_1_files/government_id.jpg 24.91kB
assignments/assignment_1_files/header(1).js 0.09kB
assignments/assignment_1_files/header.html.js 28.87kB
assignments/assignment_1_files/header.js 2.12kB
assignments/assignment_1_files/hg.css 30.19kB
assignments/assignment_1_files/LearnerStoriesCollection.js 0.52kB
assignments/assignment_1_files/LearnerStoryModel.js 0.18kB
assignments/assignment_1_files/logo 54.35kB
assignments/assignment_1_files/MathJax.js 50.41kB
assignments/assignment_1_files/modernizr-custom.js 9.35kB
assignments/assignment_1_files/path.js 0.23kB
assignments/assignment_1_files/readme.js 4.94kB
assignments/assignment_1_files/require.v2-1-1.js 22.78kB
assignments/assignment_1_files/ribbon_stripes.png 5.73kB
assignments/assignment_1_files/routes.js 1.09MB
assignments/assignment_1_files/shim.css 14.46kB
assignments/assignment_1_files/sidebar(1).js 0.09kB
assignments/assignment_1_files/sidebar.html.js 9.23kB
assignments/assignment_1_files/sidebar.js 4.17kB
assignments/assignment_1_files/signature_track.js 5.07kB
assignments/assignment_1_files/signatureTrackLastChanceModal.html.js 4.41kB
assignments/assignment_1_files/spark.main.css 283.29kB
assignments/assignment_1_files/university_logo 2.93kB
assignments/assignment_1_files/webcam_keyboard.jpg 20.79kB
assignments/assignment_2.html 52.84kB
assignments/assignment_2_files/204.js 6.33kB
assignments/assignment_2_files/400.js 7.79kB
assignments/assignment_2_files/abUtils.js 2.32kB
assignments/assignment_2_files/assessApi.js 0.45kB
assignments/assignment_2_files/catalogApi.js 0.45kB
assignments/assignment_2_files/course.css 0.17kB
assignments/assignment_2_files/flexjoinLastChanceModal.html.js 3.42kB
assignments/assignment_2_files/form-core.js 14.46kB
assignments/assignment_2_files/ga.js 43.08kB
assignments/assignment_2_files/government_id.jpg 24.91kB
assignments/assignment_2_files/header(1).js 0.09kB
assignments/assignment_2_files/header.html.js 28.87kB
assignments/assignment_2_files/header.js 2.12kB
assignments/assignment_2_files/hg.css 30.19kB
assignments/assignment_2_files/LearnerStoriesCollection.js 0.52kB
assignments/assignment_2_files/LearnerStoryModel.js 0.18kB
assignments/assignment_2_files/logo 54.35kB
assignments/assignment_2_files/MathJax.js 50.41kB
assignments/assignment_2_files/modernizr-custom.js 9.35kB
assignments/assignment_2_files/path.js 0.23kB
assignments/assignment_2_files/readme.js 4.94kB
assignments/assignment_2_files/require.v2-1-1.js 22.78kB
assignments/assignment_2_files/ribbon_stripes.png 5.73kB
assignments/assignment_2_files/routes.js 1.09MB
assignments/assignment_2_files/shim.css 14.46kB
assignments/assignment_2_files/sidebar(1).js 0.09kB
assignments/assignment_2_files/sidebar.html.js 9.23kB
assignments/assignment_2_files/sidebar.js 4.17kB
assignments/assignment_2_files/signature_track.js 5.07kB
assignments/assignment_2_files/signatureTrackLastChanceModal.html.js 4.41kB
assignments/assignment_2_files/spark.main.css 283.29kB
assignments/assignment_2_files/university_logo 2.93kB
assignments/assignment_2_files/webcam_keyboard.jpg 20.79kB
assignments/assignment_3.html 57.82kB
assignments/assignment_3_files/204.js 6.33kB
assignments/assignment_3_files/400.js 7.79kB
assignments/assignment_3_files/abUtils.js 2.32kB
assignments/assignment_3_files/assessApi.js 0.45kB
assignments/assignment_3_files/catalogApi.js 0.45kB
assignments/assignment_3_files/course.css 0.17kB
assignments/assignment_3_files/flexjoinLastChanceModal.html.js 3.42kB
assignments/assignment_3_files/form-core.js 14.46kB
assignments/assignment_3_files/ga.js 43.08kB
assignments/assignment_3_files/government_id.jpg 24.91kB
assignments/assignment_3_files/header(1).js 0.09kB
assignments/assignment_3_files/header.html.js 28.87kB
assignments/assignment_3_files/header.js 2.12kB
assignments/assignment_3_files/hg.css 30.19kB
assignments/assignment_3_files/LearnerStoriesCollection.js 0.52kB
assignments/assignment_3_files/LearnerStoryModel.js 0.18kB
assignments/assignment_3_files/logo 54.35kB
assignments/assignment_3_files/MathJax.js 50.41kB
assignments/assignment_3_files/modernizr-custom.js 9.35kB
assignments/assignment_3_files/path.js 0.23kB
assignments/assignment_3_files/readme.js 4.94kB
assignments/assignment_3_files/require.v2-1-1.js 22.78kB
assignments/assignment_3_files/ribbon_stripes.png 5.73kB
assignments/assignment_3_files/routes.js 1.09MB
assignments/assignment_3_files/shim.css 14.46kB
assignments/assignment_3_files/sidebar(1).js 0.09kB
assignments/assignment_3_files/sidebar.html.js 9.23kB
assignments/assignment_3_files/sidebar.js 4.17kB
assignments/assignment_3_files/signature_track.js 5.07kB
assignments/assignment_3_files/signatureTrackLastChanceModal.html.js 4.41kB
assignments/assignment_3_files/spark.main.css 283.29kB
assignments/assignment_3_files/university_logo 2.93kB
assignments/assignment_3_files/webcam_keyboard.jpg 20.79kB
lectures/week1/Designing and Executing Information Security Strategies 0.0 Part 1 - Course Overview (544).mp4 8.71MB
lectures/week1/Designing and Executing Information Security Strategies 0.1 Part 2 - HackMeCo Basics (1623).mp4 24.54MB
lectures/week1/Designing and Executing Information Security Strategies 0.2 Part 3 - Case 1 Background Part 1 of 2 (1655).mp4 25.35MB
lectures/week1/Designing and Executing Information Security Strategies 0.3 Part 4 - Case 1 Background Part 2 of 2 (1241).mp4 19.94MB
lectures/week1/Designing and Executing Information Security Strategies 0.4 Part 5 - Controls Review (914).mp4 14.50MB
lectures/week1/Designing and Executing Information Security Strategies 0.5 Part 6 - Case 1 (1108).mp4 17.78MB
lectures/week10/Designing and Executing Information Security Strategies 9.0 Part 1 - Sources and Uses for Threat Information (705).mp4 10.31MB
lectures/week10/Designing and Executing Information Security Strategies 9.1 Part 2 - Sources of Threats Part 1 of 3 (935).mp4 14.24MB
lectures/week10/Designing and Executing Information Security Strategies 9.2 Part 3 - Sources of Threats Part 2 of 3 (958).mp4 14.53MB
lectures/week10/Designing and Executing Information Security Strategies 9.3 Part 4 - Sources of Threats Part 3 of 3 (815).mp4 11.85MB
lectures/week10/Designing and Executing Information Security Strategies 9.4 Part 5 - Why What and Who (756).mp4 11.41MB
lectures/week10/Designing and Executing Information Security Strategies 9.5 Part 6 - What to do With What You Find (758).mp4 11.59MB
lectures/week10/Designing and Executing Information Security Strategies 9.6 Bonus Lecture Part 1 of 2 (1232).mp4 52.17MB
lectures/week10/Designing and Executing Information Security Strategies 9.7 Bonus Lecture Part 2 of 2 (1233).mp4 56.28MB
lectures/week2/Designing and Executing Information Security Strategies 1.0 Part 1 - Week 1 Review (617).mp4 9.76MB
lectures/week2/Designing and Executing Information Security Strategies 1.1 Part 2 - Incident Response Part 1 of 2 (1408).mp4 21.19MB
lectures/week2/Designing and Executing Information Security Strategies 1.2 Part 3 - Incident Response Part 2 of 2 (1401).mp4 21.04MB
lectures/week2/Designing and Executing Information Security Strategies 1.3 Part 4 - My Monday Part 1 of 2 (1528).mp4 23.48MB
lectures/week2/Designing and Executing Information Security Strategies 1.4 Part 5 - My Monday Part 2 of 2 (1508).mp4 23.15MB
lectures/week3/Designing and Executing Information Security Strategies 2.0 Part 1 - Compliance (1438).mp4 22.00MB
lectures/week3/Designing and Executing Information Security Strategies 2.1 Part 2 - Penalties (828).mp4 12.85MB
lectures/week3/Designing and Executing Information Security Strategies 2.2 Part 3 - Complicated Landscape (607).mp4 9.52MB
lectures/week3/Designing and Executing Information Security Strategies 2.3 Part 4 - Compliance (1109).mp4 16.85MB
lectures/week3/Designing and Executing Information Security Strategies 2.4 Part 5 - Your Case (711).mp4 11.32MB
lectures/week4/Designing and Executing Information Security Strategies 3.0 Part 1 - Approach to Lesson 3 (328).mp4 5.24MB
lectures/week4/Designing and Executing Information Security Strategies 3.1 Part 2 - Organizational Risk (1100).mp4 16.55MB
lectures/week4/Designing and Executing Information Security Strategies 3.2 Part 3 - Context - Who is Right (846).mp4 13.79MB
lectures/week4/Designing and Executing Information Security Strategies 3.3 Part 4 - Mini Assignment (144).mp4 2.69MB
lectures/week4/Designing and Executing Information Security Strategies 3.4 Part 5 - Information Assurance and Progress (757).mp4 12.81MB
lectures/week4/Designing and Executing Information Security Strategies 3.5 Part 6 - Enabling Information Assurance (1113).mp4 17.51MB
lectures/week5/Designing and Executing Information Security Strategies 4.0 Part 1 - Your Case (548).mp4 9.19MB
lectures/week5/Designing and Executing Information Security Strategies 4.1 Part 2 - Week 4 Review (1054).mp4 16.18MB
lectures/week5/Designing and Executing Information Security Strategies 4.2 Part 3 - Liability Scenarios Part 1 of 3 (1221).mp4 18.65MB
lectures/week5/Designing and Executing Information Security Strategies 4.3 Part 4 - Liability Scenarios Part 2 of 3 (1110).mp4 16.77MB
lectures/week5/Designing and Executing Information Security Strategies 4.4 Part 5 - Liability Scenarios Part 3 of 3 (1413).mp4 21.97MB
lectures/week5/Designing and Executing Information Security Strategies 4.5 Part 6 - Glitter.com (1042).mp4 16.19MB
lectures/week6/Designing and Executing Information Security Strategies 5.0 Part 1 - Water and Rats (721).mp4 10.87MB
lectures/week6/Designing and Executing Information Security Strategies 5.1 Part 2 - Go Native (407).mp4 6.01MB
lectures/week6/Designing and Executing Information Security Strategies 5.2 Part 3 - The CISO Part 1 of 2 (930).mp4 14.09MB
lectures/week6/Designing and Executing Information Security Strategies 5.3 Part 4 - The CISO Part 2 of 2 (915).mp4 13.75MB
lectures/week6/Designing and Executing Information Security Strategies 5.4 Part 5 - How Not To (1505).mp4 23.03MB
lectures/week6/Designing and Executing Information Security Strategies 5.5 Part 6 - Understanding Differences - Working with Them (1444).mp4 21.92MB
lectures/week7/Designing and Executing Information Security Strategies 6.0 Part 1 - The Cloud Risks (437).mp4 6.75MB
lectures/week7/Designing and Executing Information Security Strategies 6.1 Part 2 - System Characterization Inputs (1101).mp4 16.20MB
lectures/week7/Designing and Executing Information Security Strategies 6.2 Part 3 - System Characterization Outputs (853).mp4 13.13MB
lectures/week7/Designing and Executing Information Security Strategies 6.3 Part 4 - Sensitivity Levels (640).mp4 10.07MB
lectures/week7/Designing and Executing Information Security Strategies 6.4 Part 5 - Threat Identification (801).mp4 11.98MB
lectures/week7/Designing and Executing Information Security Strategies 6.5 Part 6 - Vulnerability Identification (637).mp4 10.18MB
lectures/week7/Designing and Executing Information Security Strategies 6.6 Part 7 - Control Analysis (1117).mp4 16.44MB
lectures/week7/Designing and Executing Information Security Strategies 6.7 Part 8 - Compare the Cloud (647).mp4 10.16MB
lectures/week8/Designing and Executing Information Security Strategies 7.0 Part 1 - Budget Decisions (1019).mp4 15.35MB
lectures/week8/Designing and Executing Information Security Strategies 7.1 Part 2 - Heartland Example (1123).mp4 17.07MB
lectures/week8/Designing and Executing Information Security Strategies 7.2 Part 3 - Accounting vs. Economics (825).mp4 12.77MB
lectures/week8/Designing and Executing Information Security Strategies 7.3 Part 4 - Financial Justification (1215).mp4 18.85MB
lectures/week8/Designing and Executing Information Security Strategies 7.4 Part 5 - Finance and Real Numbers (1311).mp4 20.02MB
lectures/week8/Designing and Executing Information Security Strategies 7.5 Part 6 - TJ Maxx (607).mp4 9.11MB
lectures/week9/Designing and Executing Information Security Strategies 8.0 Part 1 - Privacy and Security Introduction (851).mp4 13.19MB
lectures/week9/Designing and Executing Information Security Strategies 8.1 Part 2 - Private Information (1022).mp4 15.42MB
lectures/week9/Designing and Executing Information Security Strategies 8.2 Part 3 - History of Privacy (858).mp4 13.37MB
lectures/week9/Designing and Executing Information Security Strategies 8.3 Part 4 - Scientific Methods Data (809).mp4 12.24MB
lectures/week9/Designing and Executing Information Security Strategies 8.4 Part 5 - Examples (1043).mp4 16.19MB
lectures/week9/Designing and Executing Information Security Strategies 8.5 Part 6 - Privacy Value and Concerns (1421).mp4 21.81MB
Mirrors10 complete, 0 downloading = 10 mirror(s) total [Log in to see full list]


Send Feedback Start
   0.000003
DB Connect
   0.000325
Lookup hash in DB
   0.000703
Get torrent details
   0.000683
Get torrent details, finished
   0.000616
Get authors
   0.000069
Parse bibtex
   0.000173
Write header
   0.000616
get stars
   0.000504
target tab
   0.000035
Request peers
   0.000885
Write table
   0.007372
geoloc peers
   0.033739
render right panel
   0.000062
render ads
   0.000102
fetch current hosters
   0.001570
Done