Linked e-resources

Details

Cybersecurity for Beginners
The Basics of Hacking and Penetration Testing
Hacking for Dummies
Networking All-in-One for Dummies
Effective Cyber Security
Malware
Firewalls
Cryptography
Control physical and logical access to assets
Manage the Identification and Authentication of People, Devices, And Services
Integrate Identity as A Third-Party Service
Implement and Manage Authorization Mechanisms
Managing the Identity and Access Provisioning Life Cycle
Conduct Security Control Testing
Collect Security Process Data
Recovery Strategies for Database
Analyze Test Output and Generate A Report
Ensure Appropriate Asset Retention
Determine Information and Security Controls.

Browse Subjects

Show more subjects...

Statistics

from
to
Export