Cargando…

Risk management for cyber security managers.

Cyber risk management strategies help decision-makers about the risks associated with it on a day-to-day operational level. A strategized cyber risk assessment can help businesses establish the likelihood of any cyber-related attacks they can be vulnerable to and eliminate them. This course begins w...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Packt Publishing, [2022]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1357158105
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 230110s2022 xx 103 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d OCLCO 
020 |a 9781837639878  |q (electronic video) 
020 |a 1837639876  |q (electronic video) 
029 1 |a AU@  |b 000073289717 
035 |a (OCoLC)1357158105 
037 |a 9781837639878  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20230110 
049 |a UAMI 
245 0 0 |a Risk management for cyber security managers. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b Packt Publishing,  |c [2022] 
300 |a 1 online resource (1 video file (1 hr., 43 min.)) :  |b sound, color. 
306 |a 014300 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Alexander Oni, presenter. 
520 |a Cyber risk management strategies help decision-makers about the risks associated with it on a day-to-day operational level. A strategized cyber risk assessment can help businesses establish the likelihood of any cyber-related attacks they can be vulnerable to and eliminate them. This course begins with a cursory overview of risks and the different risks an organization can face. We will then delve into the risk management scope and roles. We will also understand the various threats and adversaries an organization can stumble upon. Further, you will learn to identify, assess, and understand the various risk management processes. We will then focus on risk mitigation, avoidance, transference, acceptance, and rejection. Next, you will learn more about information classification, the different security controls, and how to implement them. We will closely examine the different vulnerabilities an organization gets exposed to and third-party cyber risk management. We will understand how ethical hacking and penetration testing can help prevent cyber risks. Upon completing the course, we will acquire comprehensive information about cyber risk management and be able to mitigate cyber risks and develop successful business continuity and disaster recovery plans. What You Will Learn Understand the foundations of risk management in cyber security Learn how to determine and analyze risks Understand how to mitigate, transfer, avoid, and monitor risks Learn how to manage third-party cyber risks effectively Learn ethical hacking/penetration testing to reduce vulnerabilities Understand how to calculate quantitative/qualitative risk analyses Audience This course primarily focuses on information technology or cyber security managers and is designed to help them understand the concepts elaborately. This course is intended to provide comprehensive insight into cyber risk management but not prepare for certifications related to the topic. This short course superficially embarks on the crucial concepts in cyber risk management. If you are new to cyber risk management or want to further your knowledge in this field, being risk manager or cyber security personnel, this course is for you. A basic understanding of cybersecurity is required. About The Author Alexander Oni: Alexander Oni is a bestselling instructor with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for three years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His success in Udemy has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city and moving to the next. His hobbies include watching movies, sports, and chess. 
588 |a Online resource; title from title details screen (O'Reilly, viewed January 10, 2023). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Information technology  |x Security measures. 
650 6 |a Sécurité informatique. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 7 |a Computer security  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
655 7 |a Instructional films  |2 fast 
655 7 |a Internet videos  |2 fast 
655 7 |a Nonfiction films  |2 fast 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
655 7 |a Films de formation.  |2 rvmgf 
655 7 |a Films autres que de fiction.  |2 rvmgf 
655 7 |a Vidéos sur Internet.  |2 rvmgf 
700 1 |a Oni, Alexander,  |e presenter. 
710 2 |a Packt Publishing,  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781837639878/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP