Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Introduction...................................................................................................................
Chapter 1 Objectives of Security Management........................................................
Chapter 2 How to support Security Goals.................................................................
Chapter 3 Security Management Principles..............................................................
Chapter 4 Defense in Depth.........................................................................................
Chapter 5 How to apply Security Controls................................................................
Chapter 6 Security Control Functions........................................................................
Chapter 7 How to establish Organizational Governance.........................................
Chapter 8 Security Strategy & Governance Scenario.............................................
Chapter 9 Information Security Relationships..........................................................
Chapter 10 Business, Compliance, and Security......................................................
Chapter 11 Management Roles and Responsibilities...............................................
Chapter 12 Security Roles and Responsibilities.......................................................
Chapter 13 How to create a Security Management Program.................................
Chapter 14 Security Management Program Structure............................................
Chapter 15 How to decipher the Risk Management Program................................
Chapter 16 Risk Strategy Fundamentals...................................................................
Chapter 17 Risk Management Scenario.....................................................................
Chapter 18 Risk within the Organization...................................................................
Chapter 19 How to conduct Risk Assessments.........................................................
Chapter 20 How to assess risk....................................................................................
Chapter 21 How to respond to Risk............................................................................
Chapter 22 How to monitor Risk.................................................................................
Chapter 23 Resiliency Concepts..................................................................................
Chapter 24 Business Impact Analysis.........................................................................
Chapter 25 Business Impact Analysis.........................................................................
Chapter 26 Incident Response.....................................................................................
Chapter 27 Disaster Recovery.....................................................................................
Chapter 28 Business Continuity Fundamentals........................................................
Chapter 29 Alternative Processing Sites...................................................................
Chapter 30 How to maintain Business Continuity....................................................
Conclusion.....................................................................................................................
Chapter 1 Understanding Compliance.......................................................................
Chapter 2 Understanding Security.............................................................................
Chapter 3 Understanding Risk....................................................................................
Chapter 4 Understanding Compliance vs. Security.................................................
Chapter 5 How to be Compliant and Secure.............................................................
Chapter 6 Introduction to Risk Management Framework......................................
Chapter 7 Introduction to the NIST Special Publications.......................................
Chapter 8 Introduction to the RMF Publications......................................................
Chapter 9 Understanding the Cybersecurity Framework.......................................
Chapter 10 Comprehending the CSF Construction..................................................
Chapter 11 Comprehending the CSF Tiers and Profiles.........................................
Chapter 12 Essential RMF Concepts..........................................................................
Chapter 13 Understanding Risk Tiers........................................................................
Chapter 14 Understanding Systems and Authorization..........................................
Chapter 15 Introduction to Roles and Responsibilities...........................................
Chapter 16 Comprehending Security and Privacy in the RMF..............................
Chapter 17 How to prepare for RMF..........................................................................
Chapter 18 How to prepare for Organization-level Tasks.......................................
Chapter 19 How to prepare for System-level Tasks.................................................
Chapter 20 How to Categorize Information Systems...............................................
Chapter 21 Comprehending RMF Categorization Tasks.........................................
Chapter 22 Understanding Categorizing Systems...................................................
Chapter 23 How to Select Security Controls.............................................................
Chapter 24 How to Select Controls and Baselines...................................................
Chapter 25 How to Implement Security Controls....................................................
Chapter 26 How to Implement Controls....................................................................
Chapter 27 How to Assess Security Controls............................................................
Chapter 28 Understanding RMF Assess Tasks.........................................................
Chapter 29 How to Assess Systems............................................................................
Chapter 30 How to Authorize Information Systems.................................................
Chapter 31 How to Monitor Security Controls.........................................................
Chapter 32 How to Monitor Tasks..............................................................................
Chapter 33 How to Monitor Systems.........................................................................
Conclusion.....................................................................................................................
Bonus Chapter 15 Most Common Network Security Threats.................................
Introduction to Information Assets.............................................................................
Chapter 1 How to Understand Asset Value...............................................................
Chapter 2 How to place Value on the Company’s Information Assets..................
Chapter 3 How to Classify Information Assets..........................................................
Chapter 4 Information Asset and Risk Ownership...................................................
Chapter 5 Understanding Information Asset and Risk Ownership........................
Chapter 6 Assigning Information Asset Value...........................................................
Chapter 7 How to Assign Value to our company’s Assets.......................................
Chapter 8 How to Determine Legal Requirements and Risk..................................
Chapter 9 Understanding FISMA and NIST..............................................................
Chapter 10 Understanding HIPAA..............................................................................
Chapter 11 Understanding PCI-DSS...........................................................................
Chapter 12 Additional Regulatory Risk Management Requirements....................
Chapter 13 Introduction to Risk Management Governance....................................
Chapter 14 How to Describe Risk...............................................................................
Chapter 15 Risk Strategy Basics.................................................................................
Chapter 16 Understanding the component of risk...................................................
Chapter 17 Understanding Likelihood.......................................................................
Chapter 18 Understanding Impact.............................................................................
Chapter 19 Understanding Risk as a whole..............................................................
Chapter 20 Risk Management Scenario.....................................................................
Chapter 21 Internal and External Risk Factors........................................................
Chapter 22 Internal and External Influences on Risk..............................................
Chapter 23 Risk Scenarios...........................................................................................
Chapter 24 Risk Assessments......................................................................................
Chapter 25 How to Conduct the NIST Assessment..................................................
Chapter 26 Quantitative and Qualitative Risk Analysis...........................................
Chapter 27 How to Calculate Risk..............................................................................
Chapter 28 How to Reassess Risk...............................................................................
Chapter 29 Risk Assessments Scenario.....................................................................
Chapter 30 How to Implement Risk Response..........................................................
Chapter 31 Risk Response Option Basics..................................................................
Chapter 32 How to Analyse Cost & Benefit...............................................................
Chapter 33 How to Prioritize Risk Response Options..............................................
Chapter 34 How to Respond to Risk...........................................................................
Chapter 35 Introduction to Control Types.................................................................
Chapter 36 Control Function Basics...........................................................................
Chapter 37 Understanding Security Controls...........................................................
Chapter 38 Control Standards Assessment, and Analysis.......................................
Chapter 39 Understanding Control Effectiveness....................................................
Chapter 40 How to Integrate Information Risk into Business and IT...................
Chapter 41 Understanding IT Risk.............................................................................
Chapter 42 How to Integrate Business and IT Risk.................................................
Chapter 43 Understanding Risk Factors....................................................................
Chapter 44 Understanding Risk Metrics...................................................................
Chapter 45 How to Develop and Use KPIs................................................................
Chapter 46 How to Monitor Risk Factors..................................................................
Chapter 47 Understanding Risk Indicators...............................................................
Chapter 48 Reporting Compliance Basics.................................................................
Chapter 49 Reporting Likelihood and Impact Basics...............................................
Chapter 50 How to Translate IT Risk to Business Risk...........................................
Chapter 51 Risk Reports and Practices......................................................................
Conclusion.....................................................................................................................
About John Knowles.......................................................................................................
← Prev
Back
Next →
← Prev
Back
Next →