|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1378795690 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
230511s2023 xx 411 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|
019 |
|
|
|a 1390764385
|
024 |
8 |
|
|a 10000DIVC202314
|
029 |
1 |
|
|a AU@
|b 000074864246
|
035 |
|
|
|a (OCoLC)1378795690
|z (OCoLC)1390764385
|
037 |
|
|
|a 10000DIVC202314
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.3
|
082 |
0 |
4 |
|a 005.4/4769
|2 23/eng/20230511
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Ultimate cybersecurity course and CISSP exam prep.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Manning Publications,
|c [2023]
|
300 |
|
|
|a 1 online resource (1 video file (6 hr., 51 min.)) :
|b sound, color.
|
306 |
|
|
|a 065100
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Derek Fisher, presenter.
|
520 |
|
|
|a In this course you will learn everything you need to know to take your cyber-security career to the next level. Whether you are already in cyber security and want to prepare for the CISSP exam, or you are working in technology and are curious about what cybersecurity is, this course is for you. The course covers the range of topics that professionals in the field need to know about security and risk management in organizations, including best practices for security in architecture, networking, and physical locations. You'll learn how organizations test and monitor for security, and how they use asset management to discover the data and systems that exist in their organization so they can protect them. And you'll see how security fits into the software development lifecycle We will delve into the importance of security concepts such as confidentiality, integrity, and availability. How to use authentication and authorization to manage user and system access. How organizations prepare for disasters and ready themselves to resume operations. How to use risk management to define your company's approach to security. Supply chain risks. Threat modeling. Security models. Cryptoanalysis. And so much more! We cover a lot of topics here, and when you've finished the course you will have a thorough understanding of how security fits into an organization, and all the areas that need to be secured. Grab a comfy chair and get ready to learn.
|
588 |
|
|
|a Online resource; title from title details screen (O'Reilly, viewed May 11, 2023).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Examinations.
|2 fast
|0 (OCoLC)fst00872343
|
650 |
|
7 |
|a Computer security
|x Examinations.
|2 fast
|0 (OCoLC)fst00872489
|
650 |
|
7 |
|a Electronic data processing personnel
|x Certification.
|2 fast
|0 (OCoLC)fst00907100
|
655 |
|
7 |
|a Instructional films.
|2 fast
|0 (OCoLC)fst01726236
|
655 |
|
7 |
|a Internet videos.
|2 fast
|0 (OCoLC)fst01750214
|
655 |
|
7 |
|a Nonfiction films.
|2 fast
|0 (OCoLC)fst01710269
|
655 |
|
7 |
|a Study guides.
|2 fast
|0 (OCoLC)fst01423888
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
700 |
1 |
|
|a Fisher, Derek,
|e presenter.
|
710 |
2 |
|
|a Manning (Firm),
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/10000DIVC202314/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|