CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1
HUGO HOFFMAN
2 AUDIOBOOKS IN 1 DEAL!
BOOK 1 - INCIDENT MANAGEMENT HANDBOOK: BEGINNERS GUIDE TO INCIDENT MANAGEMENT PROCESSES AND PROCEDURES FOR OPERATIONSBOOK 2 - SECURITY MANAGEMENT ETHICS HANDBOOK: BEGINNERS GUIDE TO CYBERSECURITY FRAMEWORK AND SECURITY MANAGEMENT FUNCTIONS
In book 1 you will discover:
DEFINING INCIDENT RESPONSESBUSINESS CONTINUITY PLANPLANNING FOR DISASTER RECOVERYHOW TO CREATE AN INCIDENT RESPONSE TEAMIR TEAM ROLES AND RESPONSIBILITIESWHAT SKILLSET THE RESPONSE TEAM MUST HAVEHOW TO COMMUNICATE WITH IR STAKEHOLDERSHOW TO COMMUNICATE INCIDENT RESPONSESHOW TO MONITOR INCIDENT RESPONSE PERFORMANCEHOW TO ESCALATE AN INCIDENT
In book 2 you will discover:
SECURITY MANAGEMENT ETHICSDEFENSE IN DEPTHSECURITY CONTROL FUNCTIONS FUNDAMENTALSHOW TO ESTABLISH ORGANIZATIONAL GOVERNANCESECURITY STRATEGY & GOVERNANCE SCENARIO BASICSBUSINESS COMPLIANCE FUNDAMENTALSMANAGEMENT ROLES AND RESPONSIBILITIESHOW TO CREATE & STRUCTURE A SECURITY MANAGEMENT PROGRAMHOW TO DECRYPT THE RISK MANAGEMENT PROGRAMRISK STRATEGY & RISK MANAGEMENT SCENARIOHOW TO CONDUCT RISK ASSESSMENTS & HOW TO ASSESS RISKHOW TO RESPOND & MONITOR RISKRESILIENCY & BUSINESS IMPACT ANALYSISINCIDENT RESPONSE FUNDAMENTALSDISASTER RECOVERY & BUSINESS CONTINUITY★ Buy this Audiobook now and get started today! ★
Duration - 10h 54m.
Author - HUGO HOFFMAN.
Narrator - Khai Lannor.
Published Date - Sunday, 22 January 2023.
Copyright - © 2021 Hugo Hoffman ©.
Location:
United States
Description:
2 AUDIOBOOKS IN 1 DEAL! BOOK 1 - INCIDENT MANAGEMENT HANDBOOK: BEGINNERS GUIDE TO INCIDENT MANAGEMENT PROCESSES AND PROCEDURES FOR OPERATIONSBOOK 2 - SECURITY MANAGEMENT ETHICS HANDBOOK: BEGINNERS GUIDE TO CYBERSECURITY FRAMEWORK AND SECURITY MANAGEMENT FUNCTIONS In book 1 you will discover: DEFINING INCIDENT RESPONSESBUSINESS CONTINUITY PLANPLANNING FOR DISASTER RECOVERYHOW TO CREATE AN INCIDENT RESPONSE TEAMIR TEAM ROLES AND RESPONSIBILITIESWHAT SKILLSET THE RESPONSE TEAM MUST HAVEHOW TO COMMUNICATE WITH IR STAKEHOLDERSHOW TO COMMUNICATE INCIDENT RESPONSESHOW TO MONITOR INCIDENT RESPONSE PERFORMANCEHOW TO ESCALATE AN INCIDENT In book 2 you will discover: SECURITY MANAGEMENT ETHICSDEFENSE IN DEPTHSECURITY CONTROL FUNCTIONS FUNDAMENTALSHOW TO ESTABLISH ORGANIZATIONAL GOVERNANCESECURITY STRATEGY & GOVERNANCE SCENARIO BASICSBUSINESS COMPLIANCE FUNDAMENTALSMANAGEMENT ROLES AND RESPONSIBILITIESHOW TO CREATE & STRUCTURE A SECURITY MANAGEMENT PROGRAMHOW TO DECRYPT THE RISK MANAGEMENT PROGRAMRISK STRATEGY & RISK MANAGEMENT SCENARIOHOW TO CONDUCT RISK ASSESSMENTS & HOW TO ASSESS RISKHOW TO RESPOND & MONITOR RISKRESILIENCY & BUSINESS IMPACT ANALYSISINCIDENT RESPONSE FUNDAMENTALSDISASTER RECOVERY & BUSINESS CONTINUITY★ Buy this Audiobook now and get started today! ★ Duration - 10h 54m. Author - HUGO HOFFMAN. Narrator - Khai Lannor. Published Date - Sunday, 22 January 2023. Copyright - © 2021 Hugo Hoffman ©.
Language:
English
Opening Credits
Duration:00:00:19
Opening credits
Duration:00:00:20
Intended audience
Duration:00:01:55
Introduction
Duration:00:03:02
Chapter 1 how to define and classify incidents
Duration:00:15:48
Chapter 2 how to prepare policy and plans for incident management
Duration:00:08:24
Chapter 3 defining incident responses
Duration:00:10:32
Chapter 4 business continuity plan
Duration:00:10:28
Chapter 5 planning for disaster recovery
Duration:00:16:47
Chapter 6 how to create an incident response team
Duration:00:07:36
Chapter 7 ir team roles and responsibilities
Duration:00:08:39
Chapter 8 what skillset the response team must have
Duration:00:07:41
Chapter 9 how to train the ir team
Duration:00:06:04
Chapter 10 what tools and equipment should the ir team have
Duration:00:08:34
Chapter 11 how to communicate with ir stakeholders
Duration:00:13:29
Chapter 12 how to communicate incident responses
Duration:00:12:43
Chapter 13 how to monitor incident response performance
Duration:00:03:41
Chapter 14 how to escalate an incident
Duration:00:09:34
Chapter 15 how to collect data
Duration:00:05:55
Chapter 16 close threat fundamentals
Duration:00:03:47
Chapter 17 containment concerns
Duration:00:03:47
Chapter 18 containment practices
Duration:00:17:42
Chapter 19 how to contain incidents
Duration:00:04:21
Chapter 20 how to investigate an incident
Duration:00:05:57
Chapter 21 investigators roles and skills
Duration:00:10:18
Chapter 22 legal and regulatory considerations
Duration:00:08:46
Chapter 23 how to collect evidence
Duration:00:12:29
Chapter 24 incident analysis fundamentals
Duration:00:04:59
Chapter 25 how to report an the investigation
Duration:00:05:52
Chapter 26 forensics analysis fundamentals
Duration:00:05:18
Chapter 27 how to test an ir plan
Duration:00:08:18
Chapter 28 how to execute an ir test
Duration:00:17:04
Chapter 29 post response fundamentals
Duration:00:08:53
Chapter 30 how to upgrade controls
Duration:00:06:38
Chapter 31 how to reassess risk
Duration:00:11:19
Chapter 32 how to evaluate the response
Duration:00:07:40
Chapter 33 fisma and nist fundamentals
Duration:00:05:53
Chapter 34 hipaa & pci dss fundamentals
Duration:00:08:11
Chapter 35 additional regulatory risk management requirements
Duration:00:05:23
Conclusion
Duration:00:10:36
Closing credits
Duration:00:00:29
Chapter 1 security management ethics
Duration:00:25:39
Chapter 2 defense in depth
Duration:00:09:19
Chapter 3 security control functions fundamentals
Duration:00:10:18
Chapter 4 how to establish organizational governance
Duration:00:08:23
Chapter 5 security strategy & governance scenario basics
Duration:00:08:04
Chapter 6 business compliance fundamentals
Duration:00:07:34
Chapter 7 management roles and responsibilities
Duration:00:11:44
Chapter 8 how to create & structure a security management program
Duration:00:13:21
Chapter 9 how to decrypt the risk management program
Duration:00:08:40
Chapter 10 risk strategy & risk management scenario
Duration:00:11:26
Chapter 11 how to conduct risk assessments & how to assess risk
Duration:00:07:31
Chapter 12 how to respond & monitor risk
Duration:00:08:32
Chapter 13 resiliency & business impact analysis
Duration:00:19:48
Chapter 14 incident response fundamentals
Duration:00:15:23
Chapter 15 disaster recovery & business continuity
Duration:00:28:05
Chapter 16 well known cybercriminals
Duration:01:56:36
About the author
Duration:00:01:04
Ending Credits
Duration:00:00:28