Escucha y lee

Descubre un mundo infinito de historias

  • Lee y escucha todo lo que quieras
  • Más de 1 millón de títulos
  • Títulos exclusivos + Storytel Originals
  • 7 días de prueba gratis, luego $7.99 /mes
  • Cancela cuando quieras
Suscríbete ahora
Copy of Device Banner Block 894x1036 3
Cover for Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

2 calificaciones

3.5

Duración
3 h 29 m
Idioma
Inglés
Formato
Categoría

No ficción

Data breaches and network intrusions are constantly in front page headline news. No matter how the data was lost or the network invaded, tracing the root cause of IT security problems usually leads back to ineffective management of security programs. In this book, you'll gain solid foundational knowledge and skills you can use to effectively manage security in your organization.

You will learn:

• Objectives of Security Management • How to support Security Goals • Security Management Principles • Defense in Depth • How to apply Security Controls • Security Control Functions • How to establish Organizational Governance • Security Strategy & Governance Scenario • Information Security Relationships • Business, Compliance, and Security • Management Roles and Responsibilities • Security Roles and Responsibilities • How to create a Security Management Program • Security Management Program Structure • How to decipher the Risk Management Program • Risk Strategy Fundamentals • Risk Management Scenario • Risk within the Organization • How to conduct Risk Assessments • How to assess risk • How to respond to Risk • How to monitor Risk • Resiliency Concepts • Business Impact Analysis • Business Impact Analysis • Incident Response • Disaster Recovery • Business Continuity Fundamentals • Alternative Processing Sites • How to maintain Business Continuity

© 2020 John Knowles (Audiolibro): 9781664914308

Fecha de lanzamiento

Audiolibro: 24 de septiembre de 2020

Etiquetas

Otros también disfrutaron...

  1. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  2. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  3. Certified Information Security Manager CISM Study Guide
    Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  4. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  5. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  6. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  7. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  8. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  9. Hacking: How to Hack
    Hacking: How to Hack Alex Wagner
  10. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  11. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  12. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
    CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  13. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
    Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  14. Software Development Fundamentals
    Software Development Fundamentals Introbooks Team
  15. Web3: Charting the Internet's Next Economic and Cultural Frontier
    Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
  16. Deep Learning: Guide to Machine Learning and Artificial Intelligence
    Deep Learning: Guide to Machine Learning and Artificial Intelligence David Feldspar
  17. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  18. Cloud Security For Dummies
    Cloud Security For Dummies Ted Coombs
  19. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
    Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  20. Smart Cities
    Smart Cities Germaine Halegoua
  21. Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI
    Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI Beena Ammanath
  22. Cybersecurity For Dummies
    Cybersecurity For Dummies Joseph Steinberg
  23. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  24. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
    Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
  25. Mastering Research Papers: A Guide for PhD Students
    Mastering Research Papers: A Guide for PhD Students Arvind Chopra
  26. Biggest Cyber Crimes in the History
    Biggest Cyber Crimes in the History Introbooks Team
  27. CISSP All-in-One Exam Guide, Ninth Edition
    CISSP All-in-One Exam Guide, Ninth Edition Fernando Maymi
  28. The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy
    The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy William E. Forbath
  29. Behavioural Economics: Psychology, neuroscience, and the human side of economics
    Behavioural Economics: Psychology, neuroscience, and the human side of economics David Orrell
  30. The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World
    The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World Shaun Rein
  31. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
    The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
  32. 3D Printing
    3D Printing John M. Jordan
  33. How to Measure Anything in Cybersecurity Risk, 2nd Edition
    How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
  34. Quantum Computing For Dummies
    Quantum Computing For Dummies whurley
  35. The Legal Analyst: A Toolkit for Thinking about the Law
    The Legal Analyst: A Toolkit for Thinking about the Law Ward Farnsworth
  36. Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments
    Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments Erik van Mechelen
  37. Distrust: Big Data, Data-Torturing, and the Assault on Science
    Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
  38. The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age
    The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age Nicholas Sullivan
  39. Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy
    Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy Elizabeth Popp Berman
  40. Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life
    Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life Dr. Joe Schwarcz
  41. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  42. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
    CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
  43. ChatGPT for Nonfiction Authors: How AI Can Improve Your Writing
    ChatGPT for Nonfiction Authors: How AI Can Improve Your Writing Acquilia Awa
  44. CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON
    CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON MARK MATTHES AND ERIC LUTZ
  45. Machine Learning
    Machine Learning Introbooks Team
  46. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
    The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
  47. GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights
    GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Ferris Eanfar
  48. Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English
    Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English Donald B. Grey
  49. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
    Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  50. Catching Up to Crypto: Your Guide to Bitcoin and the New Digital Economy
    Catching Up to Crypto: Your Guide to Bitcoin and the New Digital Economy Ben Armstrong
  51. How Big-Tech Barons Smash Innovation—and How to Strike Back
    How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
  52. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
    RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
  53. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
    The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
  54. The Myths of Nutrition and Fitness
    The Myths of Nutrition and Fitness The Great Courses
  55. Disrupting Sacred Cows
    Disrupting Sacred Cows Garrett Gunderson
  56. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
    The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
  57. Secrets of Sleep Science: From Dreams to Disorders
    Secrets of Sleep Science: From Dreams to Disorders The Great Courses
  58. The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence
    The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence John Rauscher
  59. The Knowledge Gene
    The Knowledge Gene Lynne Kelly
  60. The Great Persuasion: Reinventing Free Markets Since the Depression
    The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
  61. Billionaires in World Politics
    Billionaires in World Politics Peter Hagel
  62. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
    Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
  63. Fake Photos
    Fake Photos Hany Farid
  64. The Road to Reinvention: How to Drive Disruption and Accelerate Transformation
    The Road to Reinvention: How to Drive Disruption and Accelerate Transformation Josh Linkner
  65. The Future of China
    The Future of China Introbooks Team
  66. How to Raise Lifelong Learners
    How to Raise Lifelong Learners The Great Courses
  67. Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science
    Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science Peter J. Hotez
  68. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
    Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  69. Geopolitics
    Geopolitics Introbooks Team
  70. Haptics
    Haptics Lynette Jones
  71. Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles
    Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles Mike Colias
  72. Business Ethics for Better Behavior
    Business Ethics for Better Behavior Jason Brennan
  73. Artificial Intelligence: Modern Magic or Dangerous Future?
    Artificial Intelligence: Modern Magic or Dangerous Future? Yorick Wilks

Explora nuevos mundos

  • Más de 1 millón de títulos

  • Modo sin conexión

  • Kids Mode

  • Cancela en cualquier momento

Unlimited

Para los que quieren escuchar y leer sin límites.

$7.99 /mes
7 días gratis
  • 1 cuenta

  • Acceso ilimitado

  • Escucha y lee los títulos que quieras

  • Modo sin conexión + Modo Infantil

  • Cancela en cualquier momento

Pruébalo ahora