File | Size |
---|
Get Bonus Downloads Here.url | 182.00 B |
~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4 | 35.54 MB |
~Get Your Files Here !/1 - Introduction/1 - S0-lecture0-Introduction.pdf | 900.92 kB |
~Get Your Files Here !/1 - Introduction/2 - Course structure and supporting material.mp4 | 38.88 MB |
~Get Your Files Here !/1 - Introduction/2 - S0-lecture1-Course-Content.pdf | 10.08 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/10 - ANNEX I1.mp4 | 16.35 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/10 - S1-lecture7-Annex-I.1.pdf | 786.00 kB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/11 - ANNEX I2.mp4 | 15.30 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/11 - S1-lecture8-Annex-I.2.pdf | 1.09 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/12 - ANNEX II.mp4 | 14.15 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/12 - S1-lecture9-ANNEX-II.pdf | 1.14 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/13 - Conformity of the Product with Digital Elements Chapter 3.mp4 | 20.58 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/13 - S1-lecture10-Conformity-of-the-Product-with-Digital-Elements-Chapter-3.pdf | 243.44 kB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/14 - ANNEX V.mp4 | 3.68 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/14 - S1-lecture11-ANNEX-V.pdf | 189.39 kB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/15 - ANNEX VI.mp4 | 1.50 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/15 - S1-lecture12-ANNEX-VI.pdf | 23.78 kB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/16 - ANNEX VII.mp4 | 12.62 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/16 - S1-lecture12-ANNEX-VII.pdf | 386.94 kB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/17 - ANNEX VIII.mp4 | 18.42 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/17 - S1-lecture12-ANNEX-VIII.pdf | 108.77 kB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/18 - Notification of Conformity Assessment Bodies Chapter 4.mp4 | 5.07 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/18 - S1-lecture13-Notification-of-Conformity-Assessment-Bodies-Chapter-4.pdf | 62.27 kB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/19 - Notification of Conformity Assessment Bodies Chapter 4 Actions.mp4 | 1.84 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/20 - Market Surveillance and Enforcement Chapter 5.mp4 | 18.19 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/20 - S1-lecture15-Market-Surveillance-and-Enforcement-Chapter-5.pdf | 385.46 kB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/21 - Market Surveillance and Enforcement Chapter 5 Actions.mp4 | 13.55 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/22 - Delegated Powers and Committee Procedures Chapter 6.mp4 | 9.08 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/22 - S1-lecture17-Delegated-Powers-and-Committee-Procedures-Chapter-6.pdf | 216.97 kB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/23 - Delegated Powers and Committee Procedures Chapter 6 Actions.mp4 | 8.65 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/24 - Confidentiality and Penalties Chapter 7.mp4 | 11.83 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/24 - S1-lecture19-Confidentiality-and-Penalties-Chapter-7.pdf | 537.87 kB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/25 - Confidentiality and Penalties Chapter 7 Actions.mp4 | 7.70 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/26 - S1-lecture21-Transitional-and-Final-Provisions-Chapter-8.pdf | 364.44 kB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/26 - Transitional and Final Provisions Chapter 8.mp4 | 10.39 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/27 - Transitional and Final Provisions Chapter 8 Actions.mp4 | 3.45 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/3 - Introduction to the EU Cyber Resilience Act.mp4 | 22.05 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/3 - S1-lecture0-Introduction-to-the-EU-Cyber-Resilience-Act.pdf | 166.99 kB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/4 - S1-lecture1-Understanding-Cybersecurity-in-the-EU.pdf | 785.00 kB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/4 - Understanding Cybersecurity in the EU.mp4 | 19.77 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/5 - General Provisions Chapter 1.mp4 | 27.76 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/5 - S1-lecture2-General-Provisions-Chapter-1.pdf | 1.03 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/6 - General Provisions Chapter 1 Actions.mp4 | 7.01 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/7 - ANNEX III and ANNEX IV.mp4 | 11.63 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/7 - S1-lecture4-ANNEX-III-and-ANNEX-IV.pdf | 233.89 kB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/8 - Obligations of Economic Operators Chapter 2.mp4 | 48.07 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/8 - S1-lecture5-Obligations-of-Economic-Operators-Chapter-2.pdf | 1.29 MB |
~Get Your Files Here !/2 - The European Cyber Resilience Act/9 - Obligations of Economic Operators Chapter 2 Actions.mp4 | 11.32 MB |
~Get Your Files Here !/3 - HandsOn A practical example/28 - S2-lecture0-Session-Intro.pdf | 650.92 kB |
~Get Your Files Here !/3 - HandsOn A practical example/28 - Session Intro.mp4 | 9.64 MB |
~Get Your Files Here !/3 - HandsOn A practical example/29 - CRA Practical overview.mp4 | 19.66 MB |
~Get Your Files Here !/3 - HandsOn A practical example/29 - CRA-Practical-overview-Diagram.pdf | 122.66 kB |
~Get Your Files Here !/3 - HandsOn A practical example/29 - S2-lecture1-CRA-Practical-overview.pdf | 174.35 kB |
~Get Your Files Here !/3 - HandsOn A practical example/30 - IEC 62443 and CRA.mp4 | 15.62 MB |
~Get Your Files Here !/3 - HandsOn A practical example/30 - S2-lecture2-IEC-62443-and-CRA.pdf | 242.67 kB |
~Get Your Files Here !/3 - HandsOn A practical example/31 - Process 1 Decide product applicability.mp4 | 7.98 MB |
~Get Your Files Here !/3 - HandsOn A practical example/31 - Process-1-Decide-product-applicability.pdf | 69.74 kB |
~Get Your Files Here !/3 - HandsOn A practical example/32 - Process 2 Establish economic operator.mp4 | 27.30 MB |
~Get Your Files Here !/3 - HandsOn A practical example/32 - S2-lecture4-Process-2-Stablish-economic-operator.pdf | 929.09 kB |
~Get Your Files Here !/3 - HandsOn A practical example/33 - Process 3 Define product criticality.mp4 | 9.50 MB |
~Get Your Files Here !/3 - HandsOn A practical example/33 - Process-3-Define-Product-Criticality.pdf | 32.56 kB |
~Get Your Files Here !/3 - HandsOn A practical example/34 - Outcome 1 Product Registry entry.mp4 | 10.80 MB |
~Get Your Files Here !/3 - HandsOn A practical example/34 - Outcome-1-Product-Registry-Entry.pdf | 45.51 kB |
~Get Your Files Here !/3 - HandsOn A practical example/35 - Process 4 Security By design.mp4 | 11.62 MB |
~Get Your Files Here !/3 - HandsOn A practical example/35 - S2-lecture7-Process-4-Security-By-design.pdf | 100.29 kB |
~Get Your Files Here !/3 - HandsOn A practical example/36 - Documented-Security-Context-Threat-Model.pdf | 69.76 kB |
~Get Your Files Here !/3 - HandsOn A practical example/36 - Outcome 2 Risk assessment Threat Model.mp4 | 20.97 MB |
~Get Your Files Here !/3 - HandsOn A practical example/37 - Outcome 2 Risk assessment Security Analysis for Product Interfaces.mp4 | 12.17 MB |
~Get Your Files Here !/3 - HandsOn A practical example/37 - Security-Analysis-for-Product-Interfaces.pdf | 36.99 kB |
~Get Your Files Here !/3 - HandsOn A practical example/38 - Outcome 3 Security verification testing and SBOM.mp4 | 39.71 MB |
~Get Your Files Here !/3 - HandsOn A practical example/38 - Security-Verification-and-Validation-Testing.pdf | 65.41 kB |
~Get Your Files Here !/3 - HandsOn A practical example/39 - Outcome 4 User Documentation.mp4 | 25.57 MB |
~Get Your Files Here !/3 - HandsOn A practical example/39 - Security-User-Documentation.pdf | 56.97 kB |
~Get Your Files Here !/3 - HandsOn A practical example/40 - Outcome 5 Risk Register.mp4 | 7.85 MB |
~Get Your Files Here !/3 - HandsOn A practical example/40 - Risk-Register.pdf | 29.98 kB |
~Get Your Files Here !/3 - HandsOn A practical example/41 - Process 5 Vulnerability Handling.mp4 | 18.33 MB |
~Get Your Files Here !/3 - HandsOn A practical example/41 - Vulnerability-Handling.pdf | 116.84 kB |
~Get Your Files Here !/3 - HandsOn A practical example/42 - Process 6 Conformity Assessment.mp4 | 8.12 MB |
~Get Your Files Here !/3 - HandsOn A practical example/42 - S2-lecture14-Process-6-Conformity-Assessment.pdf | 348.91 kB |
~Get Your Files Here !/3 - HandsOn A practical example/43 - Outcome 6 Conformity Assessment.mp4 | 4.26 MB |
~Get Your Files Here !/3 - HandsOn A practical example/43 - S2-lecture15-Outcome-6-Conformity-Assessment.pdf | 30.35 kB |
~Get Your Files Here !/3 - HandsOn A practical example/44 - Incident-Handling-Process.pdf | 60.57 kB |
~Get Your Files Here !/3 - HandsOn A practical example/44 - Process 7 Incident Handling.mp4 | 8.46 MB |
~Get Your Files Here !/3 - HandsOn A practical example/45 - Process 8 Security Updates.mp4 | 7.42 MB |
~Get Your Files Here !/3 - HandsOn A practical example/45 - Security-Updates.pdf | 23.40 kB |
~Get Your Files Here !/3 - HandsOn A practical example/46 - S2-lecture18-Session-Conclusion.pdf | 173.02 kB |
~Get Your Files Here !/3 - HandsOn A practical example/46 - Session Conclusion.mp4 | 4.50 MB |
~Get Your Files Here !/4 - Recap/47 - Recap.mp4 | 5.29 MB |
~Get Your Files Here !/Bonus Resources.txt | 386.00 B |