Écouter et lire

Entrez dans un monde infini d'histoires

  • Lire et écouter autant que vous le voulez
  • Plus d'un million de titres
  • Titres exclusifs + créations originales Storytel
  • 14 jours d'essai gratuit, puis 9,99 € par mois
  • Annulation facile à tout moment
Essayer gratuitement
Details page - Device banner - 894x1036
Cover for Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

2 évaluations

3.5

Durée
3h 29min
Langue
Anglais
Format
Catégorie

Documents et essais

Data breaches and network intrusions are constantly in front page headline news. No matter how the data was lost or the network invaded, tracing the root cause of IT security problems usually leads back to ineffective management of security programs. In this book, you'll gain solid foundational knowledge and skills you can use to effectively manage security in your organization.

You will learn:

• Objectives of Security Management • How to support Security Goals • Security Management Principles • Defense in Depth • How to apply Security Controls • Security Control Functions • How to establish Organizational Governance • Security Strategy & Governance Scenario • Information Security Relationships • Business, Compliance, and Security • Management Roles and Responsibilities • Security Roles and Responsibilities • How to create a Security Management Program • Security Management Program Structure • How to decipher the Risk Management Program • Risk Strategy Fundamentals • Risk Management Scenario • Risk within the Organization • How to conduct Risk Assessments • How to assess risk • How to respond to Risk • How to monitor Risk • Resiliency Concepts • Business Impact Analysis • Business Impact Analysis • Incident Response • Disaster Recovery • Business Continuity Fundamentals • Alternative Processing Sites • How to maintain Business Continuity

© 2020 John Knowles (Livre audio): 9781664914308

Date de publication

Livre audio : 24 septembre 2020

Mots-clés

    D'autres ont également apprécié ...

    1. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
      CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    2. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
      Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    3. Certified Information Security Manager CISM Study Guide
      Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    4. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    5. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
      8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    6. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
      (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    7. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
      Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    8. Hacking: How to Hack
      Hacking: How to Hack Alex Wagner
    9. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
      The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    10. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
      CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    11. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
      CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    12. Software Development Fundamentals
      Software Development Fundamentals Introbooks Team
    13. Web3: Charting the Internet's Next Economic and Cultural Frontier
      Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
    14. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
      Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    15. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
      Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
    16. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
      CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
    17. Social Capital: Life online in the shadow of Ireland’s tech boom
      Social Capital: Life online in the shadow of Ireland’s tech boom Aoife Barry
    18. Cloud Security For Dummies
      Cloud Security For Dummies Ted Coombs
    19. Spatial Computing
      Spatial Computing Pamela Vold
    20. Deep Learning: Guide to Machine Learning and Artificial Intelligence
      Deep Learning: Guide to Machine Learning and Artificial Intelligence David Feldspar
    21. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
      Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    22. The Art of Attack: Attacker Mindset for Security Professionals
      The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
    23. Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI
      Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI Beena Ammanath
    24. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
      A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    25. How to Measure Anything in Cybersecurity Risk, 2nd Edition
      How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
    26. 3D Printing
      3D Printing John M. Jordan
    27. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
      The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
    28. Cybersecurity For Dummies
      Cybersecurity For Dummies Joseph Steinberg
    29. Haptics
      Haptics Lynette Jones
    30. The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World
      The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World Shaun Rein
    31. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
      Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
    32. The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age
      The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age Nicholas Sullivan
    33. Cybercrime Investigators Handbook
      Cybercrime Investigators Handbook Graeme Edwards
    34. The Legal Analyst: A Toolkit for Thinking about the Law
      The Legal Analyst: A Toolkit for Thinking about the Law Ward Farnsworth
    35. Quantum Computing For Dummies
      Quantum Computing For Dummies whurley
    36. Disrupting Sacred Cows
      Disrupting Sacred Cows Garrett Gunderson
    37. Behavioural Economics: Psychology, neuroscience, and the human side of economics
      Behavioural Economics: Psychology, neuroscience, and the human side of economics David Orrell
    38. Mastering Research Papers: A Guide for PhD Students
      Mastering Research Papers: A Guide for PhD Students Arvind Chopra
    39. Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life
      Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life Dr. Joe Schwarcz
    40. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
      The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
    41. The New Roaring Twenties: Prosper in Volatile Times
      The New Roaring Twenties: Prosper in Volatile Times Paul Zane Pilzer
    42. The Road to Reinvention: How to Drive Disruption and Accelerate Transformation
      The Road to Reinvention: How to Drive Disruption and Accelerate Transformation Josh Linkner
    43. Biggest Cyber Crimes in the History
      Biggest Cyber Crimes in the History Introbooks Team
    44. GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights
      GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Ferris Eanfar
    45. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
      Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
    46. Distrust: Big Data, Data-Torturing, and the Assault on Science
      Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
    47. CISSP All-in-One Exam Guide, Ninth Edition
      CISSP All-in-One Exam Guide, Ninth Edition Fernando Maymi
    48. Catching Up to Crypto: Your Guide to Bitcoin and the New Digital Economy
      Catching Up to Crypto: Your Guide to Bitcoin and the New Digital Economy Ben Armstrong
    49. Trading at the Speed of Light: How Ultrafast Algorithms Are Transforming Financial Markets
      Trading at the Speed of Light: How Ultrafast Algorithms Are Transforming Financial Markets Donald MacKenzie
    50. Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy
      Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy Elizabeth Popp Berman
    51. Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English
      Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English Donald B. Grey
    52. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
      Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
    53. Billionaires in World Politics
      Billionaires in World Politics Peter Hagel
    54. How Big-Tech Barons Smash Innovation—and How to Strike Back
      How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
    55. Fake Photos
      Fake Photos Hany Farid
    56. The Vanishing American Corporation: Navigating the Hazards of a New Economy
      The Vanishing American Corporation: Navigating the Hazards of a New Economy Gerald F. Davis
    57. The Space Economy: Capitalize on the Greatest Business Opportunity of Our Lifetime
      The Space Economy: Capitalize on the Greatest Business Opportunity of Our Lifetime Chad Anderson
    58. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
      The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
    59. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
      Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
    60. ChatGPT for Nonfiction Authors: How AI Can Improve Your Writing
      ChatGPT for Nonfiction Authors: How AI Can Improve Your Writing Acquilia Awa
    61. Anatomy of a Ponzi: Scams Past and Present
      Anatomy of a Ponzi: Scams Past and Present Colleen Cross
    62. Understandable Economics: Because Understanding Our Economy Is Easier Than You Think and More Important Than You Know
      Understandable Economics: Because Understanding Our Economy Is Easier Than You Think and More Important Than You Know Howard Yaruss
    63. Machine Learning
      Machine Learning Introbooks Team
    64. Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments
      Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments Erik van Mechelen
    65. Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science
      Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science Peter J. Hotez
    66. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
      Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
    67. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
      Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    68. The Great Persuasion: Reinventing Free Markets Since the Depression
      The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
    69. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
      Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
    70. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
      Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
    71. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity
      Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
    72. Business Consulting Methods
      Business Consulting Methods IntroBooks Team
    73. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
      RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
    74. Project Myopia: Why Projects Damage Software #NoProjects
      Project Myopia: Why Projects Damage Software #NoProjects Allan Kelly

    L’offre Storytel :

    • Accès à la bibliothèque complète

    • Mode enfant

    • Annulez à tout moment

    15 heures

    Pour accompagner vos loisirs

    9.99€ /mois
    30 jours gratuits
    • 1 compte

    • 15 heures/mois

    Essayer maintenant

    30 heures

    Pour vos trajets quotidiens

    14.99€ /mois
    30 jours gratuits
    • 1 compte

    • 30 heures/mois

    Essayer maintenant

    45 heures

    Pour écouter tous les jours

    17.99€ /mois
    30 jours gratuits
    • 1 compte

    • 45 heures/mois

    Essayer maintenant