오디오북 라이프의 시작

격이 다른 오디오북 생활을 경험해보세요!

  • 언제든 손쉽게 구독해지 가능
  • 월정액 11900원 부터
  • 무제한 청취
  • 총 5만권 이상의 영/한 오디오북
  • 온가족을 위한 다양한 오디오북
지금 바로 시작해보세요!
kr all devices
Cover for Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

2 평가

3.5

시간
3 시간 29 분
언어학습
영어
형식
컬렉션

논픽션

Data breaches and network intrusions are constantly in front page headline news. No matter how the data was lost or the network invaded, tracing the root cause of IT security problems usually leads back to ineffective management of security programs. In this book, you'll gain solid foundational knowledge and skills you can use to effectively manage security in your organization.

You will learn:

• Objectives of Security Management • How to support Security Goals • Security Management Principles • Defense in Depth • How to apply Security Controls • Security Control Functions • How to establish Organizational Governance • Security Strategy & Governance Scenario • Information Security Relationships • Business, Compliance, and Security • Management Roles and Responsibilities • Security Roles and Responsibilities • How to create a Security Management Program • Security Management Program Structure • How to decipher the Risk Management Program • Risk Strategy Fundamentals • Risk Management Scenario • Risk within the Organization • How to conduct Risk Assessments • How to assess risk • How to respond to Risk • How to monitor Risk • Resiliency Concepts • Business Impact Analysis • Business Impact Analysis • Incident Response • Disaster Recovery • Business Continuity Fundamentals • Alternative Processing Sites • How to maintain Business Continuity

© 2020 John Knowles (오디오북): 9781664914308

출시일

오디오북: 2020년 9월 24일

태그

    다른 사람들도 즐겼습니다 ...

    1. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
      CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    2. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
      Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    3. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
      (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    4. Hacking: How to Hack
      Hacking: How to Hack Alex Wagner
    5. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
      CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    6. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
      8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    7. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
      The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    8. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
      A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    9. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
      Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
    10. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    11. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
      Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    12. Artificial Intelligence: Modern Magic or Dangerous Future?
      Artificial Intelligence: Modern Magic or Dangerous Future? Yorick Wilks
    13. Software Development Fundamentals
      Software Development Fundamentals Introbooks Team
    14. The Art of Attack: Attacker Mindset for Security Professionals
      The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
    15. Web3: Charting the Internet's Next Economic and Cultural Frontier
      Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
    16. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
      Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    17. Cybersecurity For Dummies
      Cybersecurity For Dummies Joseph Steinberg
    18. Cloud Security For Dummies
      Cloud Security For Dummies Ted Coombs
    19. Social Capital: Life online in the shadow of Ireland’s tech boom
      Social Capital: Life online in the shadow of Ireland’s tech boom Aoife Barry
    20. When AI Rules the World: China, the U.S., and the Race to Control a Smart Planet
      When AI Rules the World: China, the U.S., and the Race to Control a Smart Planet Handel Jones
    21. Biggest Cyber Crimes in the History
      Biggest Cyber Crimes in the History Introbooks Team
    22. A Vulnerable System: The History of Information Security in the Computer Age
      A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    23. The Language of Deception: Weaponizing Next Generation AI
      The Language of Deception: Weaponizing Next Generation AI Justin Hutchens
    24. Machine Learning
      Machine Learning Introbooks Team
    25. Cybercrime Investigators Handbook
      Cybercrime Investigators Handbook Graeme Edwards
    26. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
      Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
    27. Mastering Research Papers: A Guide for PhD Students
      Mastering Research Papers: A Guide for PhD Students Arvind Chopra
    28. 3D Printing
      3D Printing John M. Jordan
    29. The Things We Make: The Unknown History of Invention from Cathedrals to Soda Cans
      The Things We Make: The Unknown History of Invention from Cathedrals to Soda Cans Bill Hammack
    30. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
      Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    31. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
      Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
    32. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
      Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
    33. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
      The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
    34. Cloud Computing
      Cloud Computing Nayan B. Ruparella
    35. Secrets of Sleep Science: From Dreams to Disorders
      Secrets of Sleep Science: From Dreams to Disorders The Great Courses
    36. Contraception: A Concise History
      Contraception: A Concise History Donna J. Drucker
    37. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
      Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    38. Virtual You: How Building Your Digital Twin Will Revolutionize Medicine and Change Your Life
      Virtual You: How Building Your Digital Twin Will Revolutionize Medicine and Change Your Life Roger Highfield
    39. New Laws of Robotics: Defending Human Expertise in the Age of AI
      New Laws of Robotics: Defending Human Expertise in the Age of AI Frank Pasquale
    40. CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON
      CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON MARK MATTHES AND ERIC LUTZ
    41. How to Measure Anything in Cybersecurity Risk, 2nd Edition
      How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard

    언제 어디서나 스토리텔

    • 국내 유일 해리포터 시리즈 오디오북

    • 5만권이상의 영어/한국어 오디오북

    • 키즈 모드(어린이 안전 환경)

    • 월정액 무제한 청취

    • 언제든 취소 및 해지 가능

    • 오프라인 액세스를 위한 도서 다운로드

    인기

    스토리텔 언리미티드

    5만권 이상의 영어, 한국어 오디오북을 무제한 들어보세요

    11900 원 /월
    • 계정 1개

    • 무제한 청취

    • 사용자 1인

    • 무제한 청취

    • 언제든 해지하실 수 있어요

    지금 바로 시작하기

    패밀리

    친구 또는 가족과 함께 오디오북을 즐기고 싶은 분들을 위해

    매달 17900원 부터
    • 2-3 계정

    • 무제한 청취

    • 2-3 계정

    • 무제한 청취

    • 언제든 해지하실 수 있어요

    2 개 계정

    17900 원 /월
    지금 바로 시작하기