Escucha y lee

Descubre un mundo infinito de historias

  • Lee y escucha todo lo que quieras
  • Más de 900 000 títulos
  • Títulos exclusivos + Storytel Originals
  • 7 días de prueba gratis, luego $7.99 /mes
  • Cancela cuando quieras
Suscríbete ahora
Copy of Device Banner Block 894x1036 3

Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

2 Calificaciones

3.5

Duración
3H 29min
Idioma
Inglés
Format
Categoría

No ficción

Data breaches and network intrusions are constantly in front page headline news. No matter how the data was lost or the network invaded, tracing the root cause of IT security problems usually leads back to ineffective management of security programs. In this book, you'll gain solid foundational knowledge and skills you can use to effectively manage security in your organization.

You will learn:

• Objectives of Security Management • How to support Security Goals • Security Management Principles • Defense in Depth • How to apply Security Controls • Security Control Functions • How to establish Organizational Governance • Security Strategy & Governance Scenario • Information Security Relationships • Business, Compliance, and Security • Management Roles and Responsibilities • Security Roles and Responsibilities • How to create a Security Management Program • Security Management Program Structure • How to decipher the Risk Management Program • Risk Strategy Fundamentals • Risk Management Scenario • Risk within the Organization • How to conduct Risk Assessments • How to assess risk • How to respond to Risk • How to monitor Risk • Resiliency Concepts • Business Impact Analysis • Business Impact Analysis • Incident Response • Disaster Recovery • Business Continuity Fundamentals • Alternative Processing Sites • How to maintain Business Continuity

© 2020 John Knowles (Audiolibro): 9781664914308

Fecha de lanzamiento

Audiolibro: 24 de septiembre de 2020

Otros también disfrutaron...

  1. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  2. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  3. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  4. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  5. Cybersecurity For Dummies Joseph Steinberg
  6. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  7. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  8. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  9. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  10. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  11. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
  12. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  13. Cloud Security For Dummies Ted Coombs
  14. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
  15. Cybersecurity For Beginners: How to apply the NIST Risk Management Framework John Knowles
  16. The Art of Deception: Controlling the Human Element of Security William L. Simon
  17. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
  18. Cybersecutity First Principles Rick Howard
  19. If It's Smart, It's Vulnerable Mikko Hypponen
  20. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  21. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  22. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
  23. Ethical Hacking Bible: Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux | 7 books in 1 HUGO HOFFMAN
  24. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  25. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  26. Hacking: How to Hack Alex Wagner
  27. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
  28. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  29. Cybercrime Investigators Handbook Graeme Edwards
  30. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
  31. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
  32. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  33. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  34. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  35. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  36. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  37. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  38. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  39. Ethical Hacking Introbooks Team
  40. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  41. Security Awareness For Dummies Ira Winkler, CISSP
  42. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  43. Biggest Cyber Crimes in the History Introbooks Team
  44. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
  45. Linux for Beginners: 3 BOOKS IN 1 ATTILA KOVACS
  46. Bad Blood: Secrets and Lies in a Silicon Valley Startup John Carreyrou
  47. Cyber Security for Decision Makers Jarno Limnéll

Siempre con Storytel:

  • Acceso ilimitado

  • Modo sin conexión

  • Modo Infantil

  • Cancela en cualquier momento

Historias ilimitadas siempre
Oferta por tiempo limitado

Ilimitado

Para los que quieren escuchar y leer sin límites.

$7.99 /mes
  • 1 cuenta

  • Acceso ilimitado

  • Escucha y lee los títulos que quieras

  • Modo sin conexión + Modo Infantil

  • Cancela en cualquier momento

Pruébalo ahora