Escucha y lee

Descubre un mundo infinito de historias

  • Lee y escucha todo lo que quieras
  • Más de 900 000 títulos
  • Títulos exclusivos + Storytel Originals
  • 7 días de prueba gratis, luego $7.99 /mes
  • Cancela cuando quieras
Suscríbete ahora
Copy of Device Banner Block 894x1036 3

RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals

2 Calificaciones

5

Series

1 of 2

Duración
1H 32min
Idioma
Inglés
Format
Categoría

Negocios y economía

This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused.

Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications such as the ISC2 CGRC.

© 2023 convocourses (Audiolibro): 9798368993348

Fecha de lanzamiento

Audiolibro: 11 de febrero de 2023

Tags

    Otros también disfrutaron...

    1. Cybersecurity For Beginners: How to apply the NIST Risk Management Framework John Knowles
    2. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    3. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    4. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    5. Cybersecurity For Beginners: How to Manage Risk, Using the NIST Cybersecurity Framework John Knowles
    6. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
    7. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    8. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    9. Cloud Security For Dummies Ted Coombs
    10. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    11. Cybersecurity For Dummies Joseph Steinberg
    12. Cybercrime Investigators Handbook Graeme Edwards
    13. Cybersecurity For Beginners: Incident Management And Cybersecurity Awareness | 2 Books In 1 Mike Miller
    14. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
    15. Security Awareness For Dummies Ira Winkler, CISSP
    16. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    17. CISSP All-in-One Exam Guide, Ninth Edition Fernando Maymi
    18. Cybersecutity First Principles Rick Howard
    19. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    20. Biggest Cyber Crimes in the History Introbooks Team
    21. Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    22. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
    23. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    24. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    25. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    26. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    27. Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
    28. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
    29. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    30. Social Engineering: The Art of Human Hacking Christopher Hadnagy
    31. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    32. Cybersecurity for Beginners: How to Defend Against Hackers & Malware ATTILA KOVACS
    33. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
    34. Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Helen Patton
    35. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    36. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
    37. Security Chaos Engineering: Sustaining Resilience in Software and Systems Aaron Rinehart
    38. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
    39. A Journey into Cybersecurity: Mastering Cybersecurity: Expert Insights and Best Practices Cameron Brooks
    40. Uberland: How Algorithms Are Rewriting the Rules of Work Alex Rosenblat
    41. The CISO Evolution: Business Knowledge for Cybersecurity Executives Kyriakos Lambros
    42. The Dhandho Investor: The Low-Risk Value Method to High Returns Mohnish Pabrai
    43. Mastering Docker: A comprehensive guide to Docker for developing, shipping, and running applications in containers Et Tu Code
    44. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard

    Siempre con Storytel:

    • Acceso ilimitado

    • Modo sin conexión

    • Modo Infantil

    • Cancela en cualquier momento

    Historias ilimitadas siempre
    Oferta por tiempo limitado

    Ilimitado

    Para los que quieren escuchar y leer sin límites.

    $7.99 /mes
    • 1 cuenta

    • Acceso ilimitado

    • Escucha y lee los títulos que quieras

    • Modo sin conexión + Modo Infantil

    • Cancela en cualquier momento

    Pruébalo ahora