Все публикации

Security Operations 6-5: Discovering Application Vulnerabilities

Security Operations 6-4: Discovering Vulnerabilities

Security Operations 6-3: Common Vulnerability Scoring System (CVSS)

Security Operations 6-2: Common Vulnerabilities and Exposures (CVE)

Security Operations 6-1: Vulnerability Management

Security Operations 6-0: Module Intro

Security Operations 5-5: Decommissioning and Disposal

Security Operations 5-4: Monitoring and Asset tracking

Security Operations 5-3: Assignment and Accounting

Security Operations 5-2: Acquisition and Procurement

Security Operations 5-1: Asset Management

Security Operations 5-0: Module Intro

Security Operations 4-23: Planning and Prioritization

Security Operations 4-22: DEMO: ROI Worksheet

Security Operations 4-21: Calculating Return On Investment (ROI)

Security Operations 4-20: Cost-Benefit Analysis (CBA) Example

Security Operations 4-19: Trade-Off Analysis

Security Operations 4-18: Inherent and Residual Risk

Security Operations 4-17: Risk Mitigation and Controls

Security Operations 4-16: Risk Management Strategies

Security Operations 4-14: Annualized Loss Expectancy (ALE) and Annual Rate of Occurrence (ARO)

Security Operations 4-13: Single-Loss Expectancy (SLE) and Exposure Factor (EF)

Security Operations 4-10: DEMO: Risk Register and Analysis

Security Operations 4-9: Qualitative Risk Analysis