Cybersecurity Fundamentals by John Knowles audiobook

Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

By John Knowles
Read by Scott Clem

John Knowles
3.50 Hours Unabridged
Format : Digital Download (In Stock)
  • $17.99
    or 1 Credit

    ISBN: 9781664914308

Data breaches and network intrusions are constantly in front page headline news. No matter how the data was lost or the network invaded, tracing the root cause of IT security problems usually leads back to ineffective management of security programs. In this book, you'll gain solid foundational knowledge and skills you can use to effectively manage security in your organization. CLICK BUY NOW TO GET STARTED TODAY! You will learn: Objectives of Security Management How to support Security Goals Security Management Principles Defense in Depth How to apply Security Controls Security Control Functions How to establish Organizational Governance Security Strategy & Governance Scenario Information Security Relationships Business, Compliance, and Security Management Roles and Responsibilities Security Roles and Responsibilities How to create a Security Management Program Security Management Program Structure How to decipher the Risk Management Program Risk Strategy Fundamentals Risk Management Scenario Risk within the Organization How to conduct Risk Assessments How to assess risk How to respond to Risk How to monitor Risk Resiliency Concepts Business Impact Analysis Business Impact Analysis Incident Response Disaster Recovery Business Continuity Fundamentals Alternative Processing Sites How to maintain Business Continuity CLICK BUY NOW TO GET STARTED TODAY!

Learn More
Membership Details
  • Only $12.99/month gets you 1 Credit/month
  • Cancel anytime
  • Hate a book? Then we do too, and we'll exchange it.
See how it works in 15 seconds

Summary

Summary

Data breaches and network intrusions are constantly in front page headline news. No matter how the data was lost or the network invaded, tracing the root cause of IT security problems usually leads back to ineffective management of security programs. In this book, you'll gain solid foundational knowledge and skills you can use to effectively manage security in your organization.

CLICK BUY NOW TO GET STARTED TODAY!

You will learn:

  • Objectives of Security Management
  • How to support Security Goals
  • Security Management Principles
  • Defense in Depth
  • How to apply Security Controls
  • Security Control Functions
  • How to establish Organizational Governance
  • Security Strategy & Governance Scenario
  • Information Security Relationships
  • Business, Compliance, and Security
  • Management Roles and Responsibilities
  • Security Roles and Responsibilities
  • How to create a Security Management Program
  • Security Management Program Structure
  • How to decipher the Risk Management Program
  • Risk Strategy Fundamentals
  • Risk Management Scenario
  • Risk within the Organization
  • How to conduct Risk Assessments
  • How to assess risk
  • How to respond to Risk
  • How to monitor Risk
  • Resiliency Concepts
  • Business Impact Analysis
  • Business Impact Analysis
  • Incident Response
  • Disaster Recovery
  • Business Continuity Fundamentals
  • Alternative Processing Sites
  • How to maintain Business Continuity

CLICK BUY NOW TO GET STARTED TODAY!

Reviews

Reviews

Author

Author Bio: John Knowles

Author Bio: John Knowles

John Knowles (1926–2001) was educated at Phillips Exeter Academy in New Hampshire and Yale University. His first novel, A Separate Peace, was published in 1959 and adapted for film in 1972. In 2004 it was adapted again as a television movie by Showtime. He wrote seven novels, a book on travel, and a collection of stories. He was the winner of the William Faulkner Award and the Rosenthal Award of the National Institute of Arts and Letters.

Titles by Author

See All

Details

Details

Available Formats : Digital Download
Runtime: 3.50
Audience: Adult
Language: English