Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions
Risk management, the process by which organizations identify, analyze, and mitigate potential threats, is a fundamental skill for any cybersecurity professional. This comprehensive course will teach you the components of risk management, the roles and responsibilities of each player, and how to put...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Video |
Sprache: | English |
Veröffentlicht: |
[Place of publication not identified]
O'Reilly Media, Inc.
2024
|
Ausgabe: | [First edition]. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000ngm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-100859402 | ||
003 | DE-627-1 | ||
005 | 20240227122213.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 240227s2024 xx ||| |o o ||eng c | ||
035 | |a (DE-627-1)100859402 | ||
035 | |a (DE-599)KEP100859402 | ||
035 | |a (ORHE)0636920973287 | ||
035 | |a (DE-627-1)100859402 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 658.4/78 |2 23/eng/20240130 | |
245 | 1 | 0 | |a Cybersecurity risk management |b identify, analyze, and mitigate threats to inform business decisions |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b O'Reilly Media, Inc. |c 2024 | |
300 | |a 1 online resource (1 video file (4 hr., 56 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed January 30, 2024) | ||
520 | |a Risk management, the process by which organizations identify, analyze, and mitigate potential threats, is a fundamental skill for any cybersecurity professional. This comprehensive course will teach you the components of risk management, the roles and responsibilities of each player, and how to put it all together to make smart business decisions. You will build the vocabulary and searching skills needed to identify the specific vulnerabilities and threats that are slowing down your mission as well as the ability to communicate about them effectively. What you'll learn and how you can apply it: Be able to apply risk management techniques to your organization Have a firm understanding of cybersecurity risk management Understand the technical risk inventory Be able to consolidate multiple risk analysis reports into a single risk management report This course is for you because: You're a cybersecurity professional. You want a solid foundation and practical skills of risk management. You're looking to move into a new role from a technologist to a cybersecurity professional with an emphasis on core skills important to cybersecurity. Risk Assessment is an adjacent knowledge base that you would like to understand better. Prerequisites: Knowledge of cybersecurity concepts and protocols Knowledge of network security methodologies CompTIA Network+ certification or equivalent knowledge Knowledge of the following: ports, protocols, services, OSI layers, routing, switching, IP addressing, wired and wireless networking infrastructure, network operations, and network troubleshooting tools. | ||
650 | 0 | |a Cyberterrorism | |
650 | 0 | |a Cyberspace |x Security measures | |
650 | 0 | |a Risk management | |
650 | 4 | |a Cyberterrorisme | |
650 | 4 | |a Gestion du risque | |
650 | 4 | |a risk management | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Bushmiller, Dean |e MitwirkendeR |4 ctb | |
710 | 2 | |a O'Reilly (Firm), |e Verlag |4 pbl | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0636920973287/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-100859402 |
---|---|
_version_ | 1818767372679380992 |
adam_text | |
any_adam_object | |
author2 | Bushmiller, Dean |
author2_role | ctb |
author2_variant | d b db |
author_facet | Bushmiller, Dean |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)100859402 (DE-599)KEP100859402 (ORHE)0636920973287 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03351ngm a22005052 4500</leader><controlfield tag="001">ZDB-30-ORH-100859402</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240227122213.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240227s2024 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100859402</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP100859402</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0636920973287</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100859402</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23/eng/20240130</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity risk management</subfield><subfield code="b">identify, analyze, and mitigate threats to inform business decisions</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">O'Reilly Media, Inc.</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 video file (4 hr., 56 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Risk management, the process by which organizations identify, analyze, and mitigate potential threats, is a fundamental skill for any cybersecurity professional. This comprehensive course will teach you the components of risk management, the roles and responsibilities of each player, and how to put it all together to make smart business decisions. You will build the vocabulary and searching skills needed to identify the specific vulnerabilities and threats that are slowing down your mission as well as the ability to communicate about them effectively. What you'll learn and how you can apply it: Be able to apply risk management techniques to your organization Have a firm understanding of cybersecurity risk management Understand the technical risk inventory Be able to consolidate multiple risk analysis reports into a single risk management report This course is for you because: You're a cybersecurity professional. You want a solid foundation and practical skills of risk management. You're looking to move into a new role from a technologist to a cybersecurity professional with an emphasis on core skills important to cybersecurity. Risk Assessment is an adjacent knowledge base that you would like to understand better. Prerequisites: Knowledge of cybersecurity concepts and protocols Knowledge of network security methodologies CompTIA Network+ certification or equivalent knowledge Knowledge of the following: ports, protocols, services, OSI layers, routing, switching, IP addressing, wired and wireless networking infrastructure, network operations, and network troubleshooting tools.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorisme</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion du risque</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bushmiller, Dean</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">O'Reilly (Firm),</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0636920973287/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-100859402 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:48:50Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 video file (4 hr., 56 min.)) sound, color. |
psigel | ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | O'Reilly Media, Inc. |
record_format | marc |
spelling | Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions [First edition]. [Place of publication not identified] O'Reilly Media, Inc. 2024 1 online resource (1 video file (4 hr., 56 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed January 30, 2024) Risk management, the process by which organizations identify, analyze, and mitigate potential threats, is a fundamental skill for any cybersecurity professional. This comprehensive course will teach you the components of risk management, the roles and responsibilities of each player, and how to put it all together to make smart business decisions. You will build the vocabulary and searching skills needed to identify the specific vulnerabilities and threats that are slowing down your mission as well as the ability to communicate about them effectively. What you'll learn and how you can apply it: Be able to apply risk management techniques to your organization Have a firm understanding of cybersecurity risk management Understand the technical risk inventory Be able to consolidate multiple risk analysis reports into a single risk management report This course is for you because: You're a cybersecurity professional. You want a solid foundation and practical skills of risk management. You're looking to move into a new role from a technologist to a cybersecurity professional with an emphasis on core skills important to cybersecurity. Risk Assessment is an adjacent knowledge base that you would like to understand better. Prerequisites: Knowledge of cybersecurity concepts and protocols Knowledge of network security methodologies CompTIA Network+ certification or equivalent knowledge Knowledge of the following: ports, protocols, services, OSI layers, routing, switching, IP addressing, wired and wireless networking infrastructure, network operations, and network troubleshooting tools. Cyberterrorism Cyberspace Security measures Risk management Cyberterrorisme Gestion du risque risk management Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Bushmiller, Dean MitwirkendeR ctb O'Reilly (Firm), Verlag pbl TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/0636920973287/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions Cyberterrorism Cyberspace Security measures Risk management Cyberterrorisme Gestion du risque risk management Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
title | Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions |
title_auth | Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions |
title_exact_search | Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions |
title_full | Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions |
title_fullStr | Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions |
title_full_unstemmed | Cybersecurity risk management identify, analyze, and mitigate threats to inform business decisions |
title_short | Cybersecurity risk management |
title_sort | cybersecurity risk management identify analyze and mitigate threats to inform business decisions |
title_sub | identify, analyze, and mitigate threats to inform business decisions |
topic | Cyberterrorism Cyberspace Security measures Risk management Cyberterrorisme Gestion du risque risk management Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Cyberterrorism Cyberspace Security measures Risk management Cyberterrorisme Gestion du risque risk management Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
url | https://learning.oreilly.com/library/view/-/0636920973287/?ar |
work_keys_str_mv | AT bushmillerdean cybersecurityriskmanagementidentifyanalyzeandmitigatethreatstoinformbusinessdecisions AT oreillyfirm cybersecurityriskmanagementidentifyanalyzeandmitigatethreatstoinformbusinessdecisions |