Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions

Risk management, the process by which organizations identify, analyze, and mitigate potential threats, is a fundamental skill for any cybersecurity professional. This comprehensive course will teach you the components of risk management, the roles and responsibilities of each player, and how to put...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Bushmiller, Dean (MitwirkendeR)
Format: Elektronisch Video
Sprache:English
Veröffentlicht: [Place of publication not identified] O'Reilly Media, Inc. 2024
Ausgabe:[First edition].
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000ngm a22000002 4500
001 ZDB-30-ORH-100859402
003 DE-627-1
005 20240227122213.0
006 m o | |
007 cr uuu---uuuuu
008 240227s2024 xx ||| |o o ||eng c
035 |a (DE-627-1)100859402 
035 |a (DE-599)KEP100859402 
035 |a (ORHE)0636920973287 
035 |a (DE-627-1)100859402 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 658.4/78  |2 23/eng/20240130 
245 1 0 |a Cybersecurity risk management  |b identify, analyze, and mitigate threats to inform business decisions 
250 |a [First edition]. 
264 1 |a [Place of publication not identified]  |b O'Reilly Media, Inc.  |c 2024 
300 |a 1 online resource (1 video file (4 hr., 56 min.))  |b sound, color. 
336 |a zweidimensionales bewegtes Bild  |b tdi  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Online resource; title from title details screen (O'Reilly, viewed January 30, 2024) 
520 |a Risk management, the process by which organizations identify, analyze, and mitigate potential threats, is a fundamental skill for any cybersecurity professional. This comprehensive course will teach you the components of risk management, the roles and responsibilities of each player, and how to put it all together to make smart business decisions. You will build the vocabulary and searching skills needed to identify the specific vulnerabilities and threats that are slowing down your mission as well as the ability to communicate about them effectively. What you'll learn and how you can apply it: Be able to apply risk management techniques to your organization Have a firm understanding of cybersecurity risk management Understand the technical risk inventory Be able to consolidate multiple risk analysis reports into a single risk management report This course is for you because: You're a cybersecurity professional. You want a solid foundation and practical skills of risk management. You're looking to move into a new role from a technologist to a cybersecurity professional with an emphasis on core skills important to cybersecurity. Risk Assessment is an adjacent knowledge base that you would like to understand better. Prerequisites: Knowledge of cybersecurity concepts and protocols Knowledge of network security methodologies CompTIA Network+ certification or equivalent knowledge Knowledge of the following: ports, protocols, services, OSI layers, routing, switching, IP addressing, wired and wireless networking infrastructure, network operations, and network troubleshooting tools. 
650 0 |a Cyberterrorism 
650 0 |a Cyberspace  |x Security measures 
650 0 |a Risk management 
650 4 |a Cyberterrorisme 
650 4 |a Gestion du risque 
650 4 |a risk management 
650 4 |a Instructional films 
650 4 |a Nonfiction films 
650 4 |a Internet videos 
650 4 |a Films de formation 
650 4 |a Films autres que de fiction 
650 4 |a Vidéos sur Internet 
700 1 |a Bushmiller, Dean  |e MitwirkendeR  |4 ctb 
710 2 |a O'Reilly (Firm),  |e Verlag  |4 pbl 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/0636920973287/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
935 |c vide 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-100859402
_version_ 1818767372679380992
adam_text
any_adam_object
author2 Bushmiller, Dean
author2_role ctb
author2_variant d b db
author_facet Bushmiller, Dean
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)100859402
(DE-599)KEP100859402
(ORHE)0636920973287
dewey-full 658.4/78
dewey-hundreds 600 - Technology (Applied sciences)
dewey-ones 658 - General management
dewey-raw 658.4/78
dewey-search 658.4/78
dewey-sort 3658.4 278
dewey-tens 650 - Management and auxiliary services
discipline Wirtschaftswissenschaften
edition [First edition].
format Electronic
Video
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03351ngm a22005052 4500</leader><controlfield tag="001">ZDB-30-ORH-100859402</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240227122213.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240227s2024 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100859402</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP100859402</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0636920973287</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100859402</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23/eng/20240130</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity risk management</subfield><subfield code="b">identify, analyze, and mitigate threats to inform business decisions</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">O'Reilly Media, Inc.</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 video file (4 hr., 56 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Risk management, the process by which organizations identify, analyze, and mitigate potential threats, is a fundamental skill for any cybersecurity professional. This comprehensive course will teach you the components of risk management, the roles and responsibilities of each player, and how to put it all together to make smart business decisions. You will build the vocabulary and searching skills needed to identify the specific vulnerabilities and threats that are slowing down your mission as well as the ability to communicate about them effectively. What you'll learn and how you can apply it: Be able to apply risk management techniques to your organization Have a firm understanding of cybersecurity risk management Understand the technical risk inventory Be able to consolidate multiple risk analysis reports into a single risk management report This course is for you because: You're a cybersecurity professional. You want a solid foundation and practical skills of risk management. You're looking to move into a new role from a technologist to a cybersecurity professional with an emphasis on core skills important to cybersecurity. Risk Assessment is an adjacent knowledge base that you would like to understand better. Prerequisites: Knowledge of cybersecurity concepts and protocols Knowledge of network security methodologies CompTIA Network+ certification or equivalent knowledge Knowledge of the following: ports, protocols, services, OSI layers, routing, switching, IP addressing, wired and wireless networking infrastructure, network operations, and network troubleshooting tools.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorisme</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion du risque</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bushmiller, Dean</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">O'Reilly (Firm),</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0636920973287/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-100859402
illustrated Not Illustrated
indexdate 2024-12-18T08:48:50Z
institution BVB
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 video file (4 hr., 56 min.)) sound, color.
psigel ZDB-30-ORH
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher O'Reilly Media, Inc.
record_format marc
spelling Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions
[First edition].
[Place of publication not identified] O'Reilly Media, Inc. 2024
1 online resource (1 video file (4 hr., 56 min.)) sound, color.
zweidimensionales bewegtes Bild tdi rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
Risk management, the process by which organizations identify, analyze, and mitigate potential threats, is a fundamental skill for any cybersecurity professional. This comprehensive course will teach you the components of risk management, the roles and responsibilities of each player, and how to put it all together to make smart business decisions. You will build the vocabulary and searching skills needed to identify the specific vulnerabilities and threats that are slowing down your mission as well as the ability to communicate about them effectively. What you'll learn and how you can apply it: Be able to apply risk management techniques to your organization Have a firm understanding of cybersecurity risk management Understand the technical risk inventory Be able to consolidate multiple risk analysis reports into a single risk management report This course is for you because: You're a cybersecurity professional. You want a solid foundation and practical skills of risk management. You're looking to move into a new role from a technologist to a cybersecurity professional with an emphasis on core skills important to cybersecurity. Risk Assessment is an adjacent knowledge base that you would like to understand better. Prerequisites: Knowledge of cybersecurity concepts and protocols Knowledge of network security methodologies CompTIA Network+ certification or equivalent knowledge Knowledge of the following: ports, protocols, services, OSI layers, routing, switching, IP addressing, wired and wireless networking infrastructure, network operations, and network troubleshooting tools.
Cyberterrorism
Cyberspace Security measures
Risk management
Cyberterrorisme
Gestion du risque
risk management
Instructional films
Nonfiction films
Internet videos
Films de formation
Films autres que de fiction
Vidéos sur Internet
Bushmiller, Dean MitwirkendeR ctb
O'Reilly (Firm), Verlag pbl
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/0636920973287/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions
Cyberterrorism
Cyberspace Security measures
Risk management
Cyberterrorisme
Gestion du risque
risk management
Instructional films
Nonfiction films
Internet videos
Films de formation
Films autres que de fiction
Vidéos sur Internet
title Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions
title_auth Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions
title_exact_search Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions
title_full Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions
title_fullStr Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions
title_full_unstemmed Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions
title_short Cybersecurity risk management
title_sort cybersecurity risk management identify analyze and mitigate threats to inform business decisions
title_sub identify, analyze, and mitigate threats to inform business decisions
topic Cyberterrorism
Cyberspace Security measures
Risk management
Cyberterrorisme
Gestion du risque
risk management
Instructional films
Nonfiction films
Internet videos
Films de formation
Films autres que de fiction
Vidéos sur Internet
topic_facet Cyberterrorism
Cyberspace Security measures
Risk management
Cyberterrorisme
Gestion du risque
risk management
Instructional films
Nonfiction films
Internet videos
Films de formation
Films autres que de fiction
Vidéos sur Internet
url https://learning.oreilly.com/library/view/-/0636920973287/?ar
work_keys_str_mv AT bushmillerdean cybersecurityriskmanagementidentifyanalyzeandmitigatethreatstoinformbusinessdecisions
AT oreillyfirm cybersecurityriskmanagementidentifyanalyzeandmitigatethreatstoinformbusinessdecisions