Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036
Cover for CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies

CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies

2 Bedømmelse

3

Varighed
11T 3M
Sprog
Engelsk
Format
Kategori

Fakta

2 AUDIOBOOKS IN 1 DEAL!

• book 1 - nist cybersecurity framework: beginners guide to measure risk, systems, security controls and monitoring • book 2 - risk management governance strategies: risk ownership strategies, risk analysis, risk response & risk monitoring

In book 1 you will discover:

compliance, security & riskrisk management framework fundamentalsnist cybersecurity framework fundamentalsrisk tiers, systems and authorizationroles and responsibilities & privacyhow to prepare for system-level taskshow to select security controlshow to assess security controlsrmf specific tasks fundamentalshow to authorize information systemshow to monitor security controlshow to monitor systemsincident response team roles, skills, and tools

In book 2 you will discover:

information assets fundamentalsinformation asset & risk ownershipfisma nist, hipaa and pci-dssrisk management governance & risk strategylikelihood, impact & riskinternal and external risk factorsrisk assessments & risk scenarioshow to conduct the nist assessmenthow to calculate & reassess riskhow to implement risk responsehow to analyse cost & benefithow to prioritize & respond to riskcontrol types & control functions and more...

© 2021 HUGO HOFFMAN (Lydbog): 9781669601951

Udgivelsesdato

Lydbog: 17. november 2021

Andre kan også lide...

  1. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  2. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
    RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
  3. The #PACE Process for Early Career Success
    The #PACE Process for Early Career Success Mark Zides
  4. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
    The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
  5. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
    Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
  6. Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles
    Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles Mike Colias
  7. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
    The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
  8. Business Ethics for Better Behavior
    Business Ethics for Better Behavior Jason Brennan
  9. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  10. The Boomerang Principle: Inspire Lifetime Loyalty from Your Employees
    The Boomerang Principle: Inspire Lifetime Loyalty from Your Employees Lee Caraher
  11. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  12. The DevSecOps Playbook: Deliver Continuous Security at Speed
    The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
  13. The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy
    The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy William E. Forbath
  14. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
    Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  15. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
    CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
  16. The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence
    The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence John Rauscher
  17. Designing Transformative Experiences: A Toolkit for Leaders, Trainers, Teachers, and other Experience Designers
    Designing Transformative Experiences: A Toolkit for Leaders, Trainers, Teachers, and other Experience Designers Brad McLain
  18. Cloud Security For Dummies
    Cloud Security For Dummies Ted Coombs
  19. Transhumanistic Solar System
    Transhumanistic Solar System Allen Young
  20. Born Digital: The Story of a Distracted Generation
    Born Digital: The Story of a Distracted Generation Robert Wigley
  21. The Knowledge Gene
    The Knowledge Gene Lynne Kelly
  22. Industrial Designs: Ideas and Inventive Problem Solving for Industrial Design
    Industrial Designs: Ideas and Inventive Problem Solving for Industrial Design Phil Gilberts
  23. Leaving the Golden Cage: A hands-on guide to starting and building your life science consulting practice
    Leaving the Golden Cage: A hands-on guide to starting and building your life science consulting practice Norbert Farkas
  24. Certified Information Security Manager CISM Study Guide
    Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  25. The Truth about Energy, Global Warming, and Climate Change: Exposing Climate Lies in an Age of Disinformation
    The Truth about Energy, Global Warming, and Climate Change: Exposing Climate Lies in an Age of Disinformation Jerome R. Corsi, Ph.D.
  26. Open Talent: Leveraging the Global Workforce to Solve Your Biggest Challenges
    Open Talent: Leveraging the Global Workforce to Solve Your Biggest Challenges Jin H. Paik
  27. Long Hard Road: The Lithium-Ion Battery and the Electric Car
    Long Hard Road: The Lithium-Ion Battery and the Electric Car Charles J. Murray
  28. Tech Agnostic: How Technology Became the World’s Most Powerful Religion, and Why It Desperately Needs a Reformation
    Tech Agnostic: How Technology Became the World’s Most Powerful Religion, and Why It Desperately Needs a Reformation Greg M. Epstein
  29. Business Models for the Social Mobile Cloud: Transform Your Business Using Social Media, Mobile Internet, and Cloud Computing
    Business Models for the Social Mobile Cloud: Transform Your Business Using Social Media, Mobile Internet, and Cloud Computing Ted Shelton
  30. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  31. Herd: How to Change Mass Behaviour by Harnessing Our True Nature
    Herd: How to Change Mass Behaviour by Harnessing Our True Nature Mark Earls
  32. Creepy Analytics: Avoid Crossing the Line and Establish Ethical HR Analytics for Smarter Workforce Decisions
    Creepy Analytics: Avoid Crossing the Line and Establish Ethical HR Analytics for Smarter Workforce Decisions Salvatore V. Falletta
  33. Working Machines: An Executive’s Guide to AI and Intelligent Automation
    Working Machines: An Executive’s Guide to AI and Intelligent Automation Mario Grunitz
  34. Cybersecurity for Beginners: How to Defend Against Hackers & Malware
    Cybersecurity for Beginners: How to Defend Against Hackers & Malware ATTILA KOVACS
  35. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
    Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  36. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
    Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  37. Cynicism
    Cynicism Ansgar Allen
  38. Create the Future: Tactics for Disruptive Thinking
    Create the Future: Tactics for Disruptive Thinking Jeremy Gutsche
  39. Understanding the Metaverse: A Business and Ethical Guide
    Understanding the Metaverse: A Business and Ethical Guide Nick Rosa
  40. The Datapreneurs: The Promise of AI and the Creators Building Our Future
    The Datapreneurs: The Promise of AI and the Creators Building Our Future Bob Muglia
  41. Mastering Research Papers: A Guide for PhD Students
    Mastering Research Papers: A Guide for PhD Students Arvind Chopra
  42. The New Technology Elite: How Great Companies Optimize Both Technology Consumption and Production
    The New Technology Elite: How Great Companies Optimize Both Technology Consumption and Production Vinnie Mirchandani
  43. Good Influence: How to Engage Influencers for Purpose and Profit
    Good Influence: How to Engage Influencers for Purpose and Profit Paul M. Katz
  44. Decision Intelligence: Transform Your Team and Organization with AI-Driven Decision-Making
    Decision Intelligence: Transform Your Team and Organization with AI-Driven Decision-Making Thorsten Heilig
  45. Security Awareness For Dummies
    Security Awareness For Dummies Ira Winkler, CISSP
  46. A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050
    A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050 Paul B. Carroll
  47. The Board Game: How Smart Women Become Corporate Directors
    The Board Game: How Smart Women Become Corporate Directors Betsy Berkhemer-Credaire
  48. Rattiner’s Secrets of Financial Planning: From Running Your Practice to Optimizing Your Client's Experience
    Rattiner’s Secrets of Financial Planning: From Running Your Practice to Optimizing Your Client's Experience Jeffrey H. Rattiner
  49. How to Speak Science: Gravity, Relativity, and Other Ideas That Were Crazy until Proven Brilliant
    How to Speak Science: Gravity, Relativity, and Other Ideas That Were Crazy until Proven Brilliant Bruce Benamran
  50. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
    Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  51. The Cloud Revolution: How the Convergence of New Technologies Will Unleash the Next Economic Boom and A Roaring 2020s
    The Cloud Revolution: How the Convergence of New Technologies Will Unleash the Next Economic Boom and A Roaring 2020s Mark P. Mills
  52. Lucky by Design: The Hidden Economics You Need to Get More of What You Want
    Lucky by Design: The Hidden Economics You Need to Get More of What You Want Judd Kessler
  53. Fair Pay: How to Get a Raise, Close the Wage Gap, and Build Stronger Businesses
    Fair Pay: How to Get a Raise, Close the Wage Gap, and Build Stronger Businesses David Buckmaster
  54. Not Very Intelligent Design: On the Origin, Creation and Evolution of the Theory of Intelligent Design
    Not Very Intelligent Design: On the Origin, Creation and Evolution of the Theory of Intelligent Design Neel Ingman
  55. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  56. Distrust: Big Data, Data-Torturing, and the Assault on Science
    Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
  57. Choosing Leadership: Revised and Expanded: How to Create a Better Future by Building Your Courage, Capacity, and Wisdom
    Choosing Leadership: Revised and Expanded: How to Create a Better Future by Building Your Courage, Capacity, and Wisdom Linda Ginzel, PhD
  58. Web3: Charting the Internet's Next Economic and Cultural Frontier
    Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
  59. Beyond Traditional: Unlocking the Potential of Alternative Assets
    Beyond Traditional: Unlocking the Potential of Alternative Assets Chad R. Larson
  60. Reimagining Collaboration: Slack, Microsoft Teams, Zoom, and the Post-COVID World of Work
    Reimagining Collaboration: Slack, Microsoft Teams, Zoom, and the Post-COVID World of Work Phil Simon
  61. DEMAND TRANSPARENCY: Stop Wall Street Greed and Rising Taxes From Destroying Your Wealth
    DEMAND TRANSPARENCY: Stop Wall Street Greed and Rising Taxes From Destroying Your Wealth Jason G Mandel
  62. Critical Thinking and Analytical Mind: The Art of Making Decisions and Solving Problems. Think Clearly, Avoid Cognitive Biases and Fallacies in Systems. Improve Listening Skills. Be a Logical Thinker
    Critical Thinking and Analytical Mind: The Art of Making Decisions and Solving Problems. Think Clearly, Avoid Cognitive Biases and Fallacies in Systems. Improve Listening Skills. Be a Logical Thinker Marcus P. Dawson
  63. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
    Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
  64. How to Measure Anything in Cybersecurity Risk, 2nd Edition
    How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
  65. Digital Transformation in the Electronics Industry: Business and Technical Evolution in Electronic Components Procurement
    Digital Transformation in the Electronics Industry: Business and Technical Evolution in Electronic Components Procurement Casimir Saternos
  66. The Rise of Open Source Software
    The Rise of Open Source Software Introbooks Team
  67. Welding for Beginners in Fabrication: The Essentials of the Welding Craft
    Welding for Beginners in Fabrication: The Essentials of the Welding Craft Roger Scates
  68. Winner Sells All: Amazon, Walmart, and the Battle for Our Wallets
    Winner Sells All: Amazon, Walmart, and the Battle for Our Wallets Jason Del Rey
  69. Too Proud to Lead: How Hubris Can Destroy Effective Leadership and What to Do About It
    Too Proud to Lead: How Hubris Can Destroy Effective Leadership and What to Do About It Ben Laker
  70. Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants
    Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants Maurice E. Stucke
  71. The Corporate Whistleblower's Survival Guide: A Handbook for Committing the Truth
    The Corporate Whistleblower's Survival Guide: A Handbook for Committing the Truth Tom Devine
  72. Startup Boards: Getting the Most Out of Your Board of Directors
    Startup Boards: Getting the Most Out of Your Board of Directors Brad Feld
  73. Negotiating with Giants: Get what you want against the odds
    Negotiating with Giants: Get what you want against the odds Peter D. Johnston
  74. The Great Persuasion: Reinventing Free Markets Since the Depression
    The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
  75. The Nurture Effect: How the Science of Human Behavior Can Improve Our Lives and Our World
    The Nurture Effect: How the Science of Human Behavior Can Improve Our Lives and Our World Anthony Biglan
  76. Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career
    Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Dr. Gerald Auger
  77. The Healthcare Mandate: How to Leverage Disruptive Innovation to Heal America's Biggest Industry
    The Healthcare Mandate: How to Leverage Disruptive Innovation to Heal America's Biggest Industry Nicholas Webb
  78. AI WITH US, OR US WITH THE AI?: GPT AND OTHERS AMONG MANKIND
    AI WITH US, OR US WITH THE AI?: GPT AND OTHERS AMONG MANKIND Pavel Zlatnik
  79. Leadership for a Digital World: The Transformation of GE Appliances
    Leadership for a Digital World: The Transformation of GE Appliances Annika Steiber

Vælg dit abonnement

  • Over 1 million titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned

7 dage gratis
  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

159 kr. /måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned

7 dage gratis
  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

Dig + 1 familiemedlem2 konti

179 kr. /måned

Start tilbuddet

Flex

For dig som vil prøve Mofibo.

89 kr. /måned

7 dage gratis
  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis