Luister en lees nu 45 dagen gratis

Tijdelijke zomeractie: ontdek Storytel nu 45 dagen gratis. De aanbieding loopt t/m 11 augustus. Meer dan 1 miljoen luisterboeken en ebooks in één app.

  • Switch makkelijk tussen luisteren en lezen
  • Elke week honderden nieuwe verhalen
  • Voor ieder een passend abonnement
  • Opzeggen wanneer je maar wilt
Probeer 45 dagen gratis
BE - Details page - Device banner - 894x1036

Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

2 beoordelingen

3.5

Lengte
3uur 29min
Taal
Engels
Format
Categorie

Non-fictie

Data breaches and network intrusions are constantly in front page headline news. No matter how the data was lost or the network invaded, tracing the root cause of IT security problems usually leads back to ineffective management of security programs. In this book, you'll gain solid foundational knowledge and skills you can use to effectively manage security in your organization.

You will learn:

• Objectives of Security Management • How to support Security Goals • Security Management Principles • Defense in Depth • How to apply Security Controls • Security Control Functions • How to establish Organizational Governance • Security Strategy & Governance Scenario • Information Security Relationships • Business, Compliance, and Security • Management Roles and Responsibilities • Security Roles and Responsibilities • How to create a Security Management Program • Security Management Program Structure • How to decipher the Risk Management Program • Risk Strategy Fundamentals • Risk Management Scenario • Risk within the Organization • How to conduct Risk Assessments • How to assess risk • How to respond to Risk • How to monitor Risk • Resiliency Concepts • Business Impact Analysis • Business Impact Analysis • Incident Response • Disaster Recovery • Business Continuity Fundamentals • Alternative Processing Sites • How to maintain Business Continuity

© 2020 John Knowles (Luisterboek): 9781664914308

Publicatiedatum

Luisterboek: 24 september 2020

Anderen genoten ook van...

  1. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  2. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  3. Cybersecurity For Dummies Joseph Steinberg
  4. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  5. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  6. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  7. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  8. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  9. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  10. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  11. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  12. Cloud Security For Dummies Ted Coombs
  13. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
  14. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
  15. The Art of Deception: Controlling the Human Element of Security William L. Simon
  16. Cybersecurity For Beginners: How to apply the NIST Risk Management Framework John Knowles
  17. If It's Smart, It's Vulnerable Mikko Hypponen
  18. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  19. Ethical Hacking Bible: Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux | 7 books in 1 HUGO HOFFMAN
  20. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
  21. Cybersecutity First Principles Rick Howard
  22. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  23. Hacking: How to Hack Alex Wagner
  24. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  25. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  26. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  27. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
  28. Cybercrime Investigators Handbook Graeme Edwards
  29. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
  30. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  31. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
  32. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  33. Ethical Hacking Introbooks Team
  34. Cyberdeterrence and Cyberwar Martin C. Libicki
  35. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  36. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  37. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  38. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  39. Security Awareness For Dummies Ira Winkler, CISSP
  40. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  41. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  42. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  43. The Fourth Age: Smart Robots, Conscious Computers, and the Future of Humanity Byron Reese
  44. Cyber Security for Decision Makers Jarno Limnéll
  45. Linux for Beginners: 3 BOOKS IN 1 ATTILA KOVACS

Maak je keuze:

  • Voor ieder een passend abonnement

  • Kies het aantal uur en accounts dat bij jou past

  • Download verhalen voor offline toegang

  • Kids Mode - een veilige omgeving voor kinderen

Meest gekozen
Zomeractie: geldig t/m 3 augustus

Unlimited

Voor wie onbeperkt wil luisteren en lezen.

€13.99 /30 dagen
  • 1 account

  • Onbeperkte toegang

  • Meer dan 1 miljoen luisterboeken en ebooks

  • Altijd opzegbaar

Probeer 45 dagen gratis

Premium

Voor wie zo nu en dan wil luisteren en lezen.

€9.99 /30 dagen
14 dagen gratis
  • 1 account

  • 30 uur/maand

  • Meer dan 1 miljoen luisterboeken en ebooks

  • Altijd opzegbaar

Probeer 14 dagen gratis

Flex

Voor wie Storytel wil proberen.

€7.99 /30 dagen
14 dagen gratis
  • 1 account

  • 10 uur/30 dagen

  • Spaar ongebruikte uren op tot 50 uur

  • Meer dan 1 miljoen luisterboeken en ebooks

  • Altijd opzegbaar

Probeer 14 dagen gratis

Family

Voor wie verhalen met familie en vrienden wil delen.

Vanaf €18.99 /30 dagen
14 dagen gratis
  • 2-3 accounts

  • Onbeperkte toegang

  • Meer dan 1 miljoen luisterboeken en ebooks

  • Altijd opzegbaar

2 accounts

€18.99 /30 dagen
Probeer 14 dagen gratis