Dengarkan dan baca

Masuki dunia cerita tanpa batas

  • Baca dan dengarkan sebanyak yang Anda mau
  • Lebih dari 1 juta judul
  • Judul eksklusif + Storytel Original
  • Uji coba gratis 14 hari, lalu €9,99/bulan
  • Mudah untuk membatalkan kapan saja
Coba gratis
Details page - Device banner - 894x1036

Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

2 Peringkat

3.5

Durasi
3H 29menit
Bahasa
Inggris
Format
Kategori

Non Fiksi

Data breaches and network intrusions are constantly in front page headline news. No matter how the data was lost or the network invaded, tracing the root cause of IT security problems usually leads back to ineffective management of security programs. In this book, you'll gain solid foundational knowledge and skills you can use to effectively manage security in your organization.

You will learn:

• Objectives of Security Management • How to support Security Goals • Security Management Principles • Defense in Depth • How to apply Security Controls • Security Control Functions • How to establish Organizational Governance • Security Strategy & Governance Scenario • Information Security Relationships • Business, Compliance, and Security • Management Roles and Responsibilities • Security Roles and Responsibilities • How to create a Security Management Program • Security Management Program Structure • How to decipher the Risk Management Program • Risk Strategy Fundamentals • Risk Management Scenario • Risk within the Organization • How to conduct Risk Assessments • How to assess risk • How to respond to Risk • How to monitor Risk • Resiliency Concepts • Business Impact Analysis • Business Impact Analysis • Incident Response • Disaster Recovery • Business Continuity Fundamentals • Alternative Processing Sites • How to maintain Business Continuity

© 2020 John Knowles (Buku audio ): 9781664914308

Tanggal rilis

Buku audio : 24 September 2020

Tag

    Yang lain juga menikmati...

    1. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    2. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    3. Cybersecurity For Dummies Joseph Steinberg
    4. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    5. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
    6. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    7. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    8. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    9. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    10. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
    11. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    12. Cloud Security For Dummies Ted Coombs
    13. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
    14. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
    15. The Art of Deception: Controlling the Human Element of Security William L. Simon
    16. Cybersecurity For Beginners: How to apply the NIST Risk Management Framework John Knowles
    17. If It's Smart, It's Vulnerable Mikko Hypponen
    18. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    19. Ethical Hacking Bible: Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux | 7 books in 1 HUGO HOFFMAN
    20. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
    21. Cybersecutity First Principles Rick Howard
    22. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    23. Hacking: How to Hack Alex Wagner
    24. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    25. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    26. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    27. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
    28. Cybercrime Investigators Handbook Graeme Edwards
    29. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
    30. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    31. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
    32. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    33. Ethical Hacking Introbooks Team
    34. Cyberdeterrence and Cyberwar Martin C. Libicki
    35. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    36. Social Engineering: The Art of Human Hacking Christopher Hadnagy
    37. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
    38. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
    39. Security Awareness For Dummies Ira Winkler, CISSP
    40. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    41. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    42. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    43. The Fourth Age: Smart Robots, Conscious Computers, and the Future of Humanity Byron Reese
    44. Cyber Security for Decision Makers Jarno Limnéll
    45. Linux for Beginners: 3 BOOKS IN 1 ATTILA KOVACS

    Selalu dengan Storytel

    • Lebih dari 900.000 judul

    • Mode Anak (lingkungan aman untuk anak)

    • Unduh buku untuk akses offline

    • Batalkan kapan saja

    Terpopuler

    Premium

    Bagi yang ingin mendengarkan dan membaca tanpa batas.

    Rp39000 /bulan
    7 hari gratis
    • 1 akun

    • Akses Tanpa Batas

    • Akses bulanan tanpa batas

    • Batalkan kapan saja

    • Judul dalam bahasa Inggris dan Indonesia

    Coba sekarang

    Premium 6 bulan

    Bagi yang ingin mendengarkan dan membaca tanpa batas

    Rp189000 /6 bulan
    7 hari gratis
    Hemat 19%
    • 1 akun

    • Akses Tanpa Batas

    • Akses bulanan tanpa batas

    • Batalkan kapan saja

    • Judul dalam bahasa Inggris dan Indonesia

    Coba sekarang

    Local

    Bagi yang hanya ingin mendengarkan dan membaca dalam bahasa lokal.

    Rp19900 /bulan
    7 hari gratis
    • 1 akun

    • Akses Tanpa Batas

    • Akses tidak terbatas

    • Batalkan kapan saja

    • Judul dalam bahasa Indonesia

    Coba sekarang

    Local 6 bulan

    Bagi yang hanya ingin mendengarkan dan membaca dalam bahasa lokal.

    Rp89000 /6 bulan
    7 hari gratis
    Hemat 25%
    • 1 akun

    • Akses Tanpa Batas

    • Akses tidak terbatas

    • Batalkan kapan saja

    • Judul dalam bahasa Indonesia

    Coba sekarang