Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Prøv nu
DK - Details page - Device banner - 894x1036
Cover for Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

2 Bedømmelse

3.5

Varighed
3T 29M
Sprog
Engelsk
Format
Kategori

Fakta

Data breaches and network intrusions are constantly in front page headline news. No matter how the data was lost or the network invaded, tracing the root cause of IT security problems usually leads back to ineffective management of security programs. In this book, you'll gain solid foundational knowledge and skills you can use to effectively manage security in your organization.

You will learn:

• Objectives of Security Management • How to support Security Goals • Security Management Principles • Defense in Depth • How to apply Security Controls • Security Control Functions • How to establish Organizational Governance • Security Strategy & Governance Scenario • Information Security Relationships • Business, Compliance, and Security • Management Roles and Responsibilities • Security Roles and Responsibilities • How to create a Security Management Program • Security Management Program Structure • How to decipher the Risk Management Program • Risk Strategy Fundamentals • Risk Management Scenario • Risk within the Organization • How to conduct Risk Assessments • How to assess risk • How to respond to Risk • How to monitor Risk • Resiliency Concepts • Business Impact Analysis • Business Impact Analysis • Incident Response • Disaster Recovery • Business Continuity Fundamentals • Alternative Processing Sites • How to maintain Business Continuity

© 2020 John Knowles (Lydbog): 9781664914308

Udgivelsesdato

Lydbog: 24. september 2020

Andre kan også lide...

  1. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  2. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  3. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  4. Hacking: How to Hack
    Hacking: How to Hack Alex Wagner
  5. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
    CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  6. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  7. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  8. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  9. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
    Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  10. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  11. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  12. Artificial Intelligence: Modern Magic or Dangerous Future?
    Artificial Intelligence: Modern Magic or Dangerous Future? Yorick Wilks
  13. Software Development Fundamentals
    Software Development Fundamentals Introbooks Team
  14. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  15. Web3: Charting the Internet's Next Economic and Cultural Frontier
    Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
  16. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
    Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  17. Cybersecurity For Dummies
    Cybersecurity For Dummies Joseph Steinberg
  18. Cloud Security For Dummies
    Cloud Security For Dummies Ted Coombs
  19. Social Capital: Life online in the shadow of Ireland’s tech boom
    Social Capital: Life online in the shadow of Ireland’s tech boom Aoife Barry
  20. When AI Rules the World: China, the U.S., and the Race to Control a Smart Planet
    When AI Rules the World: China, the U.S., and the Race to Control a Smart Planet Handel Jones
  21. Biggest Cyber Crimes in the History
    Biggest Cyber Crimes in the History Introbooks Team
  22. A Vulnerable System: The History of Information Security in the Computer Age
    A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  23. The Language of Deception: Weaponizing Next Generation AI
    The Language of Deception: Weaponizing Next Generation AI Justin Hutchens
  24. Machine Learning
    Machine Learning Introbooks Team
  25. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  26. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
    Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  27. Mastering Research Papers: A Guide for PhD Students
    Mastering Research Papers: A Guide for PhD Students Arvind Chopra
  28. 3D Printing
    3D Printing John M. Jordan
  29. The Things We Make: The Unknown History of Invention from Cathedrals to Soda Cans
    The Things We Make: The Unknown History of Invention from Cathedrals to Soda Cans Bill Hammack
  30. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
    Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  31. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
    Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
  32. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
    Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  33. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
    The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
  34. Cloud Computing
    Cloud Computing Nayan B. Ruparella
  35. Contraception: A Concise History
    Contraception: A Concise History Donna J. Drucker
  36. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  37. Virtual You: How Building Your Digital Twin Will Revolutionize Medicine and Change Your Life
    Virtual You: How Building Your Digital Twin Will Revolutionize Medicine and Change Your Life Roger Highfield
  38. New Laws of Robotics: Defending Human Expertise in the Age of AI
    New Laws of Robotics: Defending Human Expertise in the Age of AI Frank Pasquale
  39. CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON
    CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON MARK MATTHES AND ERIC LUTZ
  40. How to Measure Anything in Cybersecurity Risk, 2nd Edition
    How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned
  • 1 konto

  • 100 timer/måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

149 kr. /måned
  • 1 konto

  • Ubegrænset adgang

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned
  • 2-6 konti

  • 100 timer/måned pr. konto

  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

2 konti

179 kr. /måned
Start tilbuddet

Flex

For dig som vil prøve Mofibo.

89 kr. /måned
  • 1 konto

  • 20 timer/måned

  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis