|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1393485772 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
230814s2023 xx 095 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d ORMDA
|
020 |
|
|
|a 9781961356016
|q (electronic video)
|
020 |
|
|
|a 1961356015
|q (electronic video)
|
029 |
1 |
|
|a AU@
|b 000075034004
|
035 |
|
|
|a (OCoLC)1393485772
|
037 |
|
|
|a 9781961356016
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8076
|2 23/eng/20230814
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a CASP+ :
|b preparing for governance, risk, and compliance domain.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Expanding Security,
|c [2023]
|
300 |
|
|
|a 1 online resource (1 video file (1 hr., 35 min.)) :
|b sound, color.
|
306 |
|
|
|a 013500
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Dean Bushmiller, presenter.
|
520 |
|
|
|a Dean Bushmiller will give you the easiest, best path to learning the CompTIA CASP+ This certification qualifies you to assess cyber readiness within an enterprise. You will be able to design and implement the proper solutions to ensure the organization is ready for the next attack. You will have the knowledge and skills required to do the following: For this part of the exam you will consider the impact of governance, risk, and compliance requirements throughout the enterprise This course in the CASP series covers the following topics: Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans.
|
588 |
|
|
|a Online resource; title from title details screen (O'Reilly, viewed August 14, 2023).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
610 |
2 |
0 |
|a Computing Technology Industry Association
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Examinations
|v Study guides.
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
700 |
1 |
|
|a Bushmiller, Dean,
|e presenter.
|
710 |
2 |
|
|a Expanding Security (Firm),
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781961356016/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|