Escucha y lee

Descubre un mundo infinito de historias

  • Lee y escucha todo lo que quieras
  • Más de 1 millón de títulos
  • Títulos exclusivos + Storytel Originals
  • 7 días de prueba gratis, luego $169 MXN al mes
  • Cancela cuando quieras
Suscríbete ahora
Copy of Device Banner Block 894x1036 3
Cover for Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

2 calificaciones

3.5

Duración
3 h 29 m
Idioma
Inglés
Formato
Categoría

No ficción

Data breaches and network intrusions are constantly in front page headline news. No matter how the data was lost or the network invaded, tracing the root cause of IT security problems usually leads back to ineffective management of security programs. In this book, you'll gain solid foundational knowledge and skills you can use to effectively manage security in your organization.

You will learn:

• Objectives of Security Management • How to support Security Goals • Security Management Principles • Defense in Depth • How to apply Security Controls • Security Control Functions • How to establish Organizational Governance • Security Strategy & Governance Scenario • Information Security Relationships • Business, Compliance, and Security • Management Roles and Responsibilities • Security Roles and Responsibilities • How to create a Security Management Program • Security Management Program Structure • How to decipher the Risk Management Program • Risk Strategy Fundamentals • Risk Management Scenario • Risk within the Organization • How to conduct Risk Assessments • How to assess risk • How to respond to Risk • How to monitor Risk • Resiliency Concepts • Business Impact Analysis • Business Impact Analysis • Incident Response • Disaster Recovery • Business Continuity Fundamentals • Alternative Processing Sites • How to maintain Business Continuity

© 2020 John Knowles (Audiolibro): 9781664914308

Fecha de lanzamiento

Audiolibro: 24 de septiembre de 2020

Etiquetas

Otros también disfrutaron...

  1. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  2. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  3. Certified Information Security Manager CISM Study Guide
    Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  4. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  5. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  6. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
    CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  7. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  8. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  9. Hacking: How to Hack
    Hacking: How to Hack Alex Wagner
  10. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  11. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  12. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  13. Web3: Charting the Internet's Next Economic and Cultural Frontier
    Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
  14. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
    Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  15. Social Capital: Life online in the shadow of Ireland’s tech boom
    Social Capital: Life online in the shadow of Ireland’s tech boom Aoife Barry
  16. Quantum Entanglement
    Quantum Entanglement Jed Brody
  17. Software Development Fundamentals
    Software Development Fundamentals Introbooks Team
  18. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  19. Deep Learning: Guide to Machine Learning and Artificial Intelligence
    Deep Learning: Guide to Machine Learning and Artificial Intelligence David Feldspar
  20. Cybersecurity For Dummies
    Cybersecurity For Dummies Joseph Steinberg
  21. How to Measure Anything in Cybersecurity Risk, 2nd Edition
    How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
  22. Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI
    Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI Beena Ammanath
  23. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
    Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
  24. Mastering Research Papers: A Guide for PhD Students
    Mastering Research Papers: A Guide for PhD Students Arvind Chopra
  25. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
    Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  26. The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World
    The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World Shaun Rein
  27. CISSP All-in-One Exam Guide, Ninth Edition
    CISSP All-in-One Exam Guide, Ninth Edition Fernando Maymi
  28. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
    The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
  29. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
    RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
  30. Cloud Security For Dummies
    Cloud Security For Dummies Ted Coombs
  31. Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life
    Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life Dr. Joe Schwarcz
  32. Haptics
    Haptics Lynette Jones
  33. Distrust: Big Data, Data-Torturing, and the Assault on Science
    Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
  34. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
    CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
  35. Biggest Cyber Crimes in the History
    Biggest Cyber Crimes in the History Introbooks Team
  36. The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age
    The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age Nicholas Sullivan
  37. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  38. Quantum Computing For Dummies
    Quantum Computing For Dummies whurley
  39. Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments
    Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments Erik van Mechelen
  40. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
    Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  41. 3D Printing
    3D Printing John M. Jordan
  42. Behavioural Economics: Psychology, neuroscience, and the human side of economics
    Behavioural Economics: Psychology, neuroscience, and the human side of economics David Orrell
  43. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  44. The Legal Analyst: A Toolkit for Thinking about the Law
    The Legal Analyst: A Toolkit for Thinking about the Law Ward Farnsworth
  45. GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights
    GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Ferris Eanfar
  46. Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy
    Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy Elizabeth Popp Berman
  47. Disrupting Sacred Cows
    Disrupting Sacred Cows Garrett Gunderson
  48. Billionaires in World Politics
    Billionaires in World Politics Peter Hagel
  49. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
    The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
  50. Secrets of Sleep Science: From Dreams to Disorders
    Secrets of Sleep Science: From Dreams to Disorders The Great Courses
  51. The New Roaring Twenties: Prosper in Volatile Times
    The New Roaring Twenties: Prosper in Volatile Times Paul Zane Pilzer
  52. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
    Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
  53. Anatomy of a Ponzi: Scams Past and Present
    Anatomy of a Ponzi: Scams Past and Present Colleen Cross
  54. Machine Learning
    Machine Learning Introbooks Team
  55. ChatGPT for Nonfiction Authors: How AI Can Improve Your Writing
    ChatGPT for Nonfiction Authors: How AI Can Improve Your Writing Acquilia Awa
  56. Breached!: Why Data Security Law Fails and How to Improve It
    Breached!: Why Data Security Law Fails and How to Improve It Daniel J. Solove
  57. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
    Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  58. Catching Up to Crypto: Your Guide to Bitcoin and the New Digital Economy
    Catching Up to Crypto: Your Guide to Bitcoin and the New Digital Economy Ben Armstrong
  59. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
    Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
  60. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
    The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
  61. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
    Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
  62. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
    Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
  63. The Vanishing American Corporation: Navigating the Hazards of a New Economy
    The Vanishing American Corporation: Navigating the Hazards of a New Economy Gerald F. Davis
  64. The Great Persuasion: Reinventing Free Markets Since the Depression
    The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
  65. Thomas Edison: American Inventor
    Thomas Edison: American Inventor Michael W. Simmons
  66. The DevSecOps Playbook: Deliver Continuous Security at Speed
    The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
  67. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
    Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
  68. Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science
    Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science Peter J. Hotez
  69. Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity
    Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity Robert Hannigan
  70. How Big-Tech Barons Smash Innovation—and How to Strike Back
    How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
  71. Food, Science, and the Human Body
    Food, Science, and the Human Body The Great Courses
  72. The Space Economy: Capitalize on the Greatest Business Opportunity of Our Lifetime
    The Space Economy: Capitalize on the Greatest Business Opportunity of Our Lifetime Chad Anderson
  73. Economic Warfare: Secrets of Wealth Creation in the Age of Welfare Politics
    Economic Warfare: Secrets of Wealth Creation in the Age of Welfare Politics Herman Cain
  74. Chinese Rules: Mao's Dog, Deng's Cat, and Five Timeless Lessons from the Front Lines in China
    Chinese Rules: Mao's Dog, Deng's Cat, and Five Timeless Lessons from the Front Lines in China Tim Clissold
  75. Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English
    Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English Donald B. Grey

Explora nuevos mundos

  • Más de 1 millón de títulos

  • Modo sin conexión

  • Kids Mode

  • Cancela en cualquier momento

¡Más popular!
Oferta por tiempo limitado

Ilimitado

Audiolibros que celebran la tradición y despiertan la imaginación.

$169 /mes
Ahorra 59%
  • 1 cuenta

  • Acceso ilimitado

  • Escucha y lee los títulos que quieras

  • Modo sin conexión + Kids Mode

  • Cancela en cualquier momento

Pruébalo ahora

Ilimitado Anual

Escucha y lee sin límites a un mejor precio.

$1190 /año
7 días gratis
Ahorra 40%
  • 1 cuenta

  • Acceso ilimitado

  • Escucha y lee los títulos que quieras

  • Modo sin conexión + Kids Mode

  • Cancela en cualquier momento

Pruébalo ahora

Familiar

Perfecto para compartir historias con toda la familia.

Desde $259 /mes
7 días gratis
  • 4-6 cuentas

  • 100 horas/mes para cada cuenta

  • Acceso a todo el catálogo

  • Modo sin conexión + Kids Mode

  • Cancela en cualquier momento

4 cuentas

$259 /mes
Pruébalo ahora