Linked e-resources
Details
Table of Contents
Cybersecurity for Beginners
The Basics of Hacking and Penetration Testing
Hacking for Dummies
Networking All-in-One for Dummies
Effective Cyber Security
Malware
Firewalls
Cryptography
Control physical and logical access to assets
Manage the Identification and Authentication of People, Devices, And Services
Integrate Identity as A Third-Party Service
Implement and Manage Authorization Mechanisms
Managing the Identity and Access Provisioning Life Cycle
Conduct Security Control Testing
Collect Security Process Data
Recovery Strategies for Database
Analyze Test Output and Generate A Report
Ensure Appropriate Asset Retention
Determine Information and Security Controls.
The Basics of Hacking and Penetration Testing
Hacking for Dummies
Networking All-in-One for Dummies
Effective Cyber Security
Malware
Firewalls
Cryptography
Control physical and logical access to assets
Manage the Identification and Authentication of People, Devices, And Services
Integrate Identity as A Third-Party Service
Implement and Manage Authorization Mechanisms
Managing the Identity and Access Provisioning Life Cycle
Conduct Security Control Testing
Collect Security Process Data
Recovery Strategies for Database
Analyze Test Output and Generate A Report
Ensure Appropriate Asset Retention
Determine Information and Security Controls.