|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1357158105 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
230110s2022 xx 103 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d OCLCO
|
020 |
|
|
|a 9781837639878
|q (electronic video)
|
020 |
|
|
|a 1837639876
|q (electronic video)
|
029 |
1 |
|
|a AU@
|b 000073289717
|
035 |
|
|
|a (OCoLC)1357158105
|
037 |
|
|
|a 9781837639878
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20230110
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Risk management for cyber security managers.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Packt Publishing,
|c [2022]
|
300 |
|
|
|a 1 online resource (1 video file (1 hr., 43 min.)) :
|b sound, color.
|
306 |
|
|
|a 014300
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Alexander Oni, presenter.
|
520 |
|
|
|a Cyber risk management strategies help decision-makers about the risks associated with it on a day-to-day operational level. A strategized cyber risk assessment can help businesses establish the likelihood of any cyber-related attacks they can be vulnerable to and eliminate them. This course begins with a cursory overview of risks and the different risks an organization can face. We will then delve into the risk management scope and roles. We will also understand the various threats and adversaries an organization can stumble upon. Further, you will learn to identify, assess, and understand the various risk management processes. We will then focus on risk mitigation, avoidance, transference, acceptance, and rejection. Next, you will learn more about information classification, the different security controls, and how to implement them. We will closely examine the different vulnerabilities an organization gets exposed to and third-party cyber risk management. We will understand how ethical hacking and penetration testing can help prevent cyber risks. Upon completing the course, we will acquire comprehensive information about cyber risk management and be able to mitigate cyber risks and develop successful business continuity and disaster recovery plans. What You Will Learn Understand the foundations of risk management in cyber security Learn how to determine and analyze risks Understand how to mitigate, transfer, avoid, and monitor risks Learn how to manage third-party cyber risks effectively Learn ethical hacking/penetration testing to reduce vulnerabilities Understand how to calculate quantitative/qualitative risk analyses Audience This course primarily focuses on information technology or cyber security managers and is designed to help them understand the concepts elaborately. This course is intended to provide comprehensive insight into cyber risk management but not prepare for certifications related to the topic. This short course superficially embarks on the crucial concepts in cyber risk management. If you are new to cyber risk management or want to further your knowledge in this field, being risk manager or cyber security personnel, this course is for you. A basic understanding of cybersecurity is required. About The Author Alexander Oni: Alexander Oni is a bestselling instructor with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for three years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His success in Udemy has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city and moving to the next. His hobbies include watching movies, sports, and chess.
|
588 |
|
|
|a Online resource; title from title details screen (O'Reilly, viewed January 10, 2023).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
655 |
|
7 |
|a Instructional films
|2 fast
|
655 |
|
7 |
|a Internet videos
|2 fast
|
655 |
|
7 |
|a Nonfiction films
|2 fast
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
655 |
|
7 |
|a Films de formation.
|2 rvmgf
|
655 |
|
7 |
|a Films autres que de fiction.
|2 rvmgf
|
655 |
|
7 |
|a Vidéos sur Internet.
|2 rvmgf
|
700 |
1 |
|
|a Oni, Alexander,
|e presenter.
|
710 |
2 |
|
|a Packt Publishing,
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781837639878/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|