Oreilly - ISO-IEC 27002 - IT Security Threats and Risks - 10000000ML118
Oreilly - ISO-IEC 27002 - IT Security Threats and Risks
by McLearn eLearning | Publisher: Stone River eLearning | Release Date: October 2019 | ISBN: 10000000ML118


This course is an entry level Information Security course that is designed for everyone who utilizes computer technology in their daily life. Whether you use technology for business or personal reasons, this course will provide you with the basic knowledge you need to assign the appropriate level of value to your information, become aware of the risks and threats that could compromise your information, and take some practical steps to protect your valuable information assets. What you'll learn: This course will provide the basic knowledge you need to assign the appropriate level of value to your information and become aware of the risks and threats that could compromise your information.
  1. Introduction
    • Setting the Stage 00:04:22
    • Scenario Overview 00:03:16
  2. Understanding Basic Information Concepts
    • Understanding the Value of DIKW 00:04:16
    • How Information Systems Add Value 00:06:41
    • Managing Information Lifecycle 00:06:49
    • Exercise Your Knowledge of DIKW 00:02:13
  3. Understanding Basic Information ConceptsDetermining the Value of Information Assets
    • Information as a Business Asset 00:06:31
    • Information as a Production Factor and a Product 00:04:48
    • Using Process to Manage Assets 00:05:02
  4. Leveraging Operational Process Types to Manage Assets
    • Leveraging Operational Process Types to Manage Assets 00:04:03
    • Creating Value Stream 00:03:37
  5. Achieving Information Reliability Through Security
    • The Attributes of Information Reliability 00:07:15
    • Developing an Asset Classification Criteria 00:01:29
  6. Categorizing Threats, Identifying Damage, and Calculating Loss
    • Module Overview 00:01:59
    • Categorizing Threats 00:03:25
    • Non-human Threats 00:01:37
    • Identifying Damage 00:02:04
    • Calculating Loss 00:06:05
  7. Analyzing Risk to Help Drive Information Security Decisions
    • Risk Analysis Process 00:01:21
    • Types of Risk Analysis 00:03:57
  8. Using Risk Mitigation Strategies to Minimize the Impact of Risk
    • Identifying Risk Strategy 00:03:33
  9. Oreilly - ISO-IEC 27002 - IT Security Threats and Risks


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss