8,49 €
8,49 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
8,49 €
8,49 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
Als Download kaufen
8,49 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
Jetzt verschenken
8,49 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
  • Format: ePub

This book is a guide for Network professionals to understand real-world information security scenarios. It offers a systematic approach to prepare for security assessments including process security audits, technical security audits and Penetration tests. This book aims at training preemptive security to network professionals in order to improve their understanding of security infrastructure and policies.
With our network being exposed to a whole plethora of security threats, all technical and non-technical people are expected to be aware of security processes. Every security assessment
…mehr

  • Geräte: eReader
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 8.79MB
Produktbeschreibung
This book is a guide for Network professionals to understand real-world information security scenarios. It offers a systematic approach to prepare for security assessments including process security audits, technical security audits and Penetration tests. This book aims at training preemptive security to network professionals in order to improve their understanding of security infrastructure and policies.

With our network being exposed to a whole plethora of security threats, all technical and non-technical people are expected to be aware of security processes. Every security assessment (technical/ non-technical) leads to new findings and the cycle continues after every audit. This book explains the auditor's process and expectations and also helps an organisation prepare for any type of audit and minimise security findings.

It follows a lifecycle approach to information security by understanding:

  • Why we need Information security
  • How we can implement
  • How to operate securely and maintain a secure posture
  • How to face audits


Contents

  • Basics of Information Security
  • Threat Paradigm
  • Information Security Controls
  • Decoding Policies Standards Procedures & Guidelines
  • Network security design
  • Know your assets
  • Implementing Network Security
  • Secure Change Management
  • Vulnerability and Risk Management
  • Access Control
  • Capacity Management
  • Log Management
  • Network Monitoring
  • Information Security Audit
  • Technical Compliance Audit
  • Penetration Testing



Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, CY, CZ, D, DK, EW, E, FIN, F, GR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.