CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1
HUGO HOFFMAN
2 AUDIOBOOKS IN 1 DEAL!
BOOK 1 - INCIDENT MANAGEMENT HANDBOOK: BEGINNERS GUIDE TO INCIDENT MANAGEMENT PROCESSES AND PROCEDURES FOR OPERATIONSBOOK 2 - SECURITY MANAGEMENT ETHICS HANDBOOK: BEGINNERS GUIDE TO CYBERSECURITY FRAMEWORK AND SECURITY MANAGEMENT FUNCTIONS
In book 1 you will discover:
DEFINING INCIDENT RESPONSESBUSINESS CONTINUITY PLANPLANNING FOR DISASTER RECOVERYHOW TO CREATE AN INCIDENT RESPONSE TEAMIR TEAM ROLES AND RESPONSIBILITIESWHAT SKILLSET THE RESPONSE TEAM MUST HAVEHOW TO COMMUNICATE WITH IR STAKEHOLDERSHOW TO COMMUNICATE INCIDENT RESPONSESHOW TO MONITOR INCIDENT RESPONSE PERFORMANCEHOW TO ESCALATE AN INCIDENT
In book 2 you will discover:
SECURITY MANAGEMENT ETHICSDEFENSE IN DEPTHSECURITY CONTROL FUNCTIONS FUNDAMENTALSHOW TO ESTABLISH ORGANIZATIONAL GOVERNANCESECURITY STRATEGY & GOVERNANCE SCENARIO BASICSBUSINESS COMPLIANCE FUNDAMENTALSMANAGEMENT ROLES AND RESPONSIBILITIESHOW TO CREATE & STRUCTURE A SECURITY MANAGEMENT PROGRAMHOW TO DECRYPT THE RISK MANAGEMENT PROGRAMRISK STRATEGY & RISK MANAGEMENT SCENARIOHOW TO CONDUCT RISK ASSESSMENTS & HOW TO ASSESS RISKHOW TO RESPOND & MONITOR RISKRESILIENCY & BUSINESS IMPACT ANALYSISINCIDENT RESPONSE FUNDAMENTALSDISASTER RECOVERY & BUSINESS CONTINUITY★ Buy this Audiobook now and get started today! ★
Duration - 10h 54m.
Author - HUGO HOFFMAN.
Narrator - Khai Lannor.
Published Date - Sunday, 22 January 2023.
Copyright - © 2021 Hugo Hoffman ©.
Location:
United States
Description:
2 AUDIOBOOKS IN 1 DEAL! BOOK 1 - INCIDENT MANAGEMENT HANDBOOK: BEGINNERS GUIDE TO INCIDENT MANAGEMENT PROCESSES AND PROCEDURES FOR OPERATIONSBOOK 2 - SECURITY MANAGEMENT ETHICS HANDBOOK: BEGINNERS GUIDE TO CYBERSECURITY FRAMEWORK AND SECURITY MANAGEMENT FUNCTIONS In book 1 you will discover: DEFINING INCIDENT RESPONSESBUSINESS CONTINUITY PLANPLANNING FOR DISASTER RECOVERYHOW TO CREATE AN INCIDENT RESPONSE TEAMIR TEAM ROLES AND RESPONSIBILITIESWHAT SKILLSET THE RESPONSE TEAM MUST HAVEHOW TO COMMUNICATE WITH IR STAKEHOLDERSHOW TO COMMUNICATE INCIDENT RESPONSESHOW TO MONITOR INCIDENT RESPONSE PERFORMANCEHOW TO ESCALATE AN INCIDENT In book 2 you will discover: SECURITY MANAGEMENT ETHICSDEFENSE IN DEPTHSECURITY CONTROL FUNCTIONS FUNDAMENTALSHOW TO ESTABLISH ORGANIZATIONAL GOVERNANCESECURITY STRATEGY & GOVERNANCE SCENARIO BASICSBUSINESS COMPLIANCE FUNDAMENTALSMANAGEMENT ROLES AND RESPONSIBILITIESHOW TO CREATE & STRUCTURE A SECURITY MANAGEMENT PROGRAMHOW TO DECRYPT THE RISK MANAGEMENT PROGRAMRISK STRATEGY & RISK MANAGEMENT SCENARIOHOW TO CONDUCT RISK ASSESSMENTS & HOW TO ASSESS RISKHOW TO RESPOND & MONITOR RISKRESILIENCY & BUSINESS IMPACT ANALYSISINCIDENT RESPONSE FUNDAMENTALSDISASTER RECOVERY & BUSINESS CONTINUITY★ Buy this Audiobook now and get started today! ★ Duration - 10h 54m. Author - HUGO HOFFMAN. Narrator - Khai Lannor. Published Date - Sunday, 22 January 2023. Copyright - © 2021 Hugo Hoffman ©.
Language:
English
Opening Credits
Duración:00:00:19
Opening credits
Duración:00:00:20
Intended audience
Duración:00:01:55
Introduction
Duración:00:03:02
Chapter 1 how to define and classify incidents
Duración:00:15:48
Chapter 2 how to prepare policy and plans for incident management
Duración:00:08:24
Chapter 3 defining incident responses
Duración:00:10:32
Chapter 4 business continuity plan
Duración:00:10:28
Chapter 5 planning for disaster recovery
Duración:00:16:47
Chapter 6 how to create an incident response team
Duración:00:07:36
Chapter 7 ir team roles and responsibilities
Duración:00:08:39
Chapter 8 what skillset the response team must have
Duración:00:07:41
Chapter 9 how to train the ir team
Duración:00:06:04
Chapter 10 what tools and equipment should the ir team have
Duración:00:08:34
Chapter 11 how to communicate with ir stakeholders
Duración:00:13:29
Chapter 12 how to communicate incident responses
Duración:00:12:43
Chapter 13 how to monitor incident response performance
Duración:00:03:41
Chapter 14 how to escalate an incident
Duración:00:09:34
Chapter 15 how to collect data
Duración:00:05:55
Chapter 16 close threat fundamentals
Duración:00:03:47
Chapter 17 containment concerns
Duración:00:03:47
Chapter 18 containment practices
Duración:00:17:42
Chapter 19 how to contain incidents
Duración:00:04:21
Chapter 20 how to investigate an incident
Duración:00:05:57
Chapter 21 investigators roles and skills
Duración:00:10:18
Chapter 22 legal and regulatory considerations
Duración:00:08:46
Chapter 23 how to collect evidence
Duración:00:12:29
Chapter 24 incident analysis fundamentals
Duración:00:04:59
Chapter 25 how to report an the investigation
Duración:00:05:52
Chapter 26 forensics analysis fundamentals
Duración:00:05:18
Chapter 27 how to test an ir plan
Duración:00:08:18
Chapter 28 how to execute an ir test
Duración:00:17:04
Chapter 29 post response fundamentals
Duración:00:08:53
Chapter 30 how to upgrade controls
Duración:00:06:38
Chapter 31 how to reassess risk
Duración:00:11:19
Chapter 32 how to evaluate the response
Duración:00:07:40
Chapter 33 fisma and nist fundamentals
Duración:00:05:53
Chapter 34 hipaa & pci dss fundamentals
Duración:00:08:11
Chapter 35 additional regulatory risk management requirements
Duración:00:05:23
Conclusion
Duración:00:10:36
Closing credits
Duración:00:00:29
Chapter 1 security management ethics
Duración:00:25:39
Chapter 2 defense in depth
Duración:00:09:19
Chapter 3 security control functions fundamentals
Duración:00:10:18
Chapter 4 how to establish organizational governance
Duración:00:08:23
Chapter 5 security strategy & governance scenario basics
Duración:00:08:04
Chapter 6 business compliance fundamentals
Duración:00:07:34
Chapter 7 management roles and responsibilities
Duración:00:11:44
Chapter 8 how to create & structure a security management program
Duración:00:13:21
Chapter 9 how to decrypt the risk management program
Duración:00:08:40
Chapter 10 risk strategy & risk management scenario
Duración:00:11:26
Chapter 11 how to conduct risk assessments & how to assess risk
Duración:00:07:31
Chapter 12 how to respond & monitor risk
Duración:00:08:32
Chapter 13 resiliency & business impact analysis
Duración:00:19:48
Chapter 14 incident response fundamentals
Duración:00:15:23
Chapter 15 disaster recovery & business continuity
Duración:00:28:05
Chapter 16 well known cybercriminals
Duración:01:56:36
About the author
Duración:00:01:04
Ending Credits
Duración:00:00:28