Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Introduction................................................................................................................... Chapter 1 Objectives of Security Management........................................................ Chapter 2 How to support Security Goals................................................................. Chapter 3 Security Management Principles.............................................................. Chapter 4 Defense in Depth......................................................................................... Chapter 5 How to apply Security Controls................................................................ Chapter 6 Security Control Functions........................................................................ Chapter 7 How to establish Organizational Governance......................................... Chapter 8 Security Strategy & Governance Scenario............................................. Chapter 9 Information Security Relationships.......................................................... Chapter 10 Business, Compliance, and Security...................................................... Chapter 11 Management Roles and Responsibilities............................................... Chapter 12 Security Roles and Responsibilities....................................................... Chapter 13 How to create a Security Management Program................................. Chapter 14 Security Management Program Structure............................................ Chapter 15 How to decipher the Risk Management Program................................ Chapter 16 Risk Strategy Fundamentals................................................................... Chapter 17 Risk Management Scenario..................................................................... Chapter 18 Risk within the Organization................................................................... Chapter 19 How to conduct Risk Assessments......................................................... Chapter 20 How to assess risk.................................................................................... Chapter 21 How to respond to Risk............................................................................ Chapter 22 How to monitor Risk................................................................................. Chapter 23 Resiliency Concepts.................................................................................. Chapter 24 Business Impact Analysis......................................................................... Chapter 25 Business Impact Analysis......................................................................... Chapter 26 Incident Response..................................................................................... Chapter 27 Disaster Recovery..................................................................................... Chapter 28 Business Continuity Fundamentals........................................................ Chapter 29 Alternative Processing Sites................................................................... Chapter 30 How to maintain Business Continuity.................................................... Conclusion..................................................................................................................... Chapter 1 Understanding Compliance....................................................................... Chapter 2 Understanding Security............................................................................. Chapter 3 Understanding Risk.................................................................................... Chapter 4 Understanding Compliance vs. Security................................................. Chapter 5 How to be Compliant and Secure............................................................. Chapter 6 Introduction to Risk Management Framework...................................... Chapter 7 Introduction to the NIST Special Publications....................................... Chapter 8 Introduction to the RMF Publications...................................................... Chapter 9 Understanding the Cybersecurity Framework....................................... Chapter 10 Comprehending the CSF Construction.................................................. Chapter 11 Comprehending the CSF Tiers and Profiles......................................... Chapter 12 Essential RMF Concepts.......................................................................... Chapter 13 Understanding Risk Tiers........................................................................ Chapter 14 Understanding Systems and Authorization.......................................... Chapter 15 Introduction to Roles and Responsibilities........................................... Chapter 16 Comprehending Security and Privacy in the RMF.............................. Chapter 17 How to prepare for RMF.......................................................................... Chapter 18 How to prepare for Organization-level Tasks....................................... Chapter 19 How to prepare for System-level Tasks................................................. Chapter 20 How to Categorize Information Systems............................................... Chapter 21 Comprehending RMF Categorization Tasks......................................... Chapter 22 Understanding Categorizing Systems................................................... Chapter 23 How to Select Security Controls............................................................. Chapter 24 How to Select Controls and Baselines................................................... Chapter 25 How to Implement Security Controls.................................................... Chapter 26 How to Implement Controls.................................................................... Chapter 27 How to Assess Security Controls............................................................ Chapter 28 Understanding RMF Assess Tasks......................................................... Chapter 29 How to Assess Systems............................................................................ Chapter 30 How to Authorize Information Systems................................................. Chapter 31 How to Monitor Security Controls......................................................... Chapter 32 How to Monitor Tasks.............................................................................. Chapter 33 How to Monitor Systems......................................................................... Conclusion..................................................................................................................... Bonus Chapter 15 Most Common Network Security Threats................................. Introduction to Information Assets............................................................................. Chapter 1 How to Understand Asset Value............................................................... Chapter 2 How to place Value on the Company’s Information Assets.................. Chapter 3 How to Classify Information Assets.......................................................... Chapter 4 Information Asset and Risk Ownership................................................... Chapter 5 Understanding Information Asset and Risk Ownership........................ Chapter 6 Assigning Information Asset Value........................................................... Chapter 7 How to Assign Value to our company’s Assets....................................... Chapter 8 How to Determine Legal Requirements and Risk.................................. Chapter 9 Understanding FISMA and NIST.............................................................. Chapter 10 Understanding HIPAA.............................................................................. Chapter 11 Understanding PCI-DSS........................................................................... Chapter 12 Additional Regulatory Risk Management Requirements.................... Chapter 13 Introduction to Risk Management Governance.................................... Chapter 14 How to Describe Risk............................................................................... Chapter 15 Risk Strategy Basics................................................................................. Chapter 16 Understanding the component of risk................................................... Chapter 17 Understanding Likelihood....................................................................... Chapter 18 Understanding Impact............................................................................. Chapter 19 Understanding Risk as a whole.............................................................. Chapter 20 Risk Management Scenario..................................................................... Chapter 21 Internal and External Risk Factors........................................................ Chapter 22 Internal and External Influences on Risk.............................................. Chapter 23 Risk Scenarios........................................................................................... Chapter 24 Risk Assessments...................................................................................... Chapter 25 How to Conduct the NIST Assessment.................................................. Chapter 26 Quantitative and Qualitative Risk Analysis........................................... Chapter 27 How to Calculate Risk.............................................................................. Chapter 28 How to Reassess Risk............................................................................... Chapter 29 Risk Assessments Scenario..................................................................... Chapter 30 How to Implement Risk Response.......................................................... Chapter 31 Risk Response Option Basics.................................................................. Chapter 32 How to Analyse Cost & Benefit............................................................... Chapter 33 How to Prioritize Risk Response Options.............................................. Chapter 34 How to Respond to Risk........................................................................... Chapter 35 Introduction to Control Types................................................................. Chapter 36 Control Function Basics........................................................................... Chapter 37 Understanding Security Controls........................................................... Chapter 38 Control Standards Assessment, and Analysis....................................... Chapter 39 Understanding Control Effectiveness.................................................... Chapter 40 How to Integrate Information Risk into Business and IT................... Chapter 41 Understanding IT Risk............................................................................. Chapter 42 How to Integrate Business and IT Risk................................................. Chapter 43 Understanding Risk Factors.................................................................... Chapter 44 Understanding Risk Metrics................................................................... Chapter 45 How to Develop and Use KPIs................................................................ Chapter 46 How to Monitor Risk Factors.................................................................. Chapter 47 Understanding Risk Indicators............................................................... Chapter 48 Reporting Compliance Basics................................................................. Chapter 49 Reporting Likelihood and Impact Basics............................................... Chapter 50 How to Translate IT Risk to Business Risk........................................... Chapter 51 Risk Reports and Practices...................................................................... Conclusion..................................................................................................................... About John Knowles.......................................................................................................
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion