Все публикации

Security Operations 6-11: Vulnerability Validation

Security Operations 6-10: Reporting

Security Operations 6-9: Red Teams and Blue Teams

Security Operations 6-8: Penetration Testing (Pentesting)

Security Operations 6-7: Vulnerability Scanner Settings and Considerations

Security Operations 6-6: Vulnerability Scans

Security Operations 6-5: Discovering Application Vulnerabilities

Security Operations 6-4: Discovering Vulnerabilities

Security Operations 6-3: Common Vulnerability Scoring System (CVSS)

Security Operations 6-2: Common Vulnerabilities and Exposures (CVE)

Security Operations 6-1: Vulnerability Management

Security Operations 6-0: Module Intro

Security Operations 5-5: Decommissioning and Disposal

Security Operations 5-4: Monitoring and Asset tracking

Security Operations 5-3: Assignment and Accounting

Security Operations 5-2: Acquisition and Procurement

Security Operations 5-1: Asset Management

Security Operations 5-0: Module Intro

Security Operations 4-23: Planning and Prioritization

Security Operations 4-22: DEMO: ROI Worksheet

Security Operations 4-21: Calculating Return On Investment (ROI)

Security Operations 4-20: Cost-Benefit Analysis (CBA) Example

Security Operations 4-19: Trade-Off Analysis

Security Operations 4-18: Inherent and Residual Risk