Hlustaðu og lestu

Stígðu inn í heim af óteljandi sögum

  • Lestu og hlustaðu eins mikið og þú vilt
  • Þúsundir titla
  • Getur sagt upp hvenær sem er
  • Engin skuldbinding
Prófa frítt
is Device Banner Block 894x1036

Cybersecurity For Beginners: How to Manage Risk, Using the NIST Cybersecurity Framework

1 Umsagnir

1

Sería

3 of 1

Lengd
5Klst. 27Mín.
Tungumál
enska
Format
Flokkur

Óskáldað efni

In this audiobook, you are going to learn what it takes to manage risk in your organization specifically risk that has to do with information with information systems, with data, and so on. You are going to learn about a wide variety of topics. You are going to learn about assets and what they are, what are the elements of risks, risk analysis, risk assessments, managing and monitoring risk and more.

You will learn:

•How to Understand Asset Value

•How to place Value on the Company’s Information Assets

•How to Classify Information Assets

•Information Asset and Risk Ownership

•Understanding Information Asset and Risk Ownership

•Assigning Information Asset Value

•How to Assign Value to our company’s Assets

•How to Determine Legal Requirements and Risk

•Understanding FISMA, NIST, HIPAA and PCI-DSS

•How to Describe Risk

•Risk Management Scenario

•Risk Scenarios

•Risk Assessments

•How to Reassess Risk

•Risk Assessments Scenario

•How to Implement Risk Response

•Risk Response Option Basics

•How to Analyse Cost & Benefit

•How to Prioritize Risk Response Options

•How to Respond to Risk

•Introduction to Control Types

•Control Function Basics

•Understanding Security Controls

•Control Standards Assessment, and Analysis

•Understanding Risk Factors and Risk Metrics

•How to Develop and Use KPIs

•How to Monitor Risk Factors

•Understanding Risk Indicators

•Reporting Compliance Basics

© 2020 John Knowles (Hljóðbók): 9781664901667

Útgáfudagur

Hljóðbók: 7 oktober 2020

Aðrir höfðu einnig áhuga á...

  1. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  2. Cybersecurity For Beginners: How to apply the NIST Risk Management Framework John Knowles
  3. Cybersecurity For Dummies Joseph Steinberg
  4. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  5. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  6. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  7. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  8. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  9. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  10. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  11. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  12. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  13. Cybercrime Investigators Handbook Graeme Edwards
  14. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
  15. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
  16. Cybersecurity for Beginners: How to Defend Against Hackers & Malware ATTILA KOVACS
  17. Biggest Cyber Crimes in the History Introbooks Team
  18. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
  19. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  20. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  21. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  22. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
  23. Cybersecurity All-in-One For Dummies Joseph Steinberg
  24. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  25. Cybersecurity for Beginners: Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide Kevin Clark
  26. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  27. Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
  28. The Art of Deception: Controlling the Human Element of Security William L. Simon
  29. Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Helen Patton
  30. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
  31. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  32. Burners and Black Markets: How to Be Invisible on Android, Blackberry & Iphone Lance Henderson
  33. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  34. Cyberdeterrence and Cyberwar Martin C. Libicki
  35. Tor and the Dark Art of Anonymity Lance Henderson
  36. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  37. Cybersecurity: The Insights You Need from Harvard Business Review Boris Groysberg
  38. Cyber Security for Decision Makers Jarno Limnéll
  39. Hacking: How to Hack Alex Wagner
  40. Ethical Hacking Introbooks Team
  41. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
  42. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  43. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  44. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin

Veldu áskrift

  • Yfir 900.000 hljóð- og rafbækur

  • Yfir 400 titlar frá Storytel Original

  • Barnvænt viðmót með Kids Mode

  • Vistaðu bækurnar fyrir ferðalögin

Vinsælast

Unlimited

Besti valkosturinn fyrir einn notanda

3290 kr /mánuði
3 dagar frítt
  • 1 aðgangur

  • Ótakmörkuð hlustun

  • Yfir 900.000 hljóð- og rafbækur

  • Engin skuldbinding

  • Getur sagt upp hvenær sem er

Prófaðu frítt

Family

Fyrir þau sem vilja deila sögum með fjölskyldu og vinum.

Frá 3990 kr/mánuði
3 dagar frítt
  • 2-6 aðgangar

  • 100 klst/mán fyrir hvern aðgang

  • Yfir 900.000 hljóð- og rafbækur

  • ‎Engin skuldbinding

  • Getur sagt upp hvenær sem er

2 aðgangar

3990 kr /á mánuði
Prófaðu frítt