Cyber Security Risk Management Audiolibro Por David Tuffley arte de portada

Cyber Security Risk Management

A University Level Course with Workshop Exercises

Muestra de Voz Virtual

Obtén 30 días de Standard gratis

$8.99 al mes después de que termine la prueba. Cancela en cualquier momento
Pruébalo por $0.00
Más opciones de compra

Cyber Security Risk Management

De: David Tuffley
Narrado por: Virtual Voice
Pruébalo por $0.00

$8.99 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por $14.95

Compra ahora por $14.95

Background images

Este título utiliza narración de voz virtual

Voz Virtual es una narración generada por computadora para audiolibros..
Cybersecurity Standards and Frameworks: A Comprehensive Guide to Resilient Cyber Defense

Cyber threats do not wait for organisations to get ready. But the organisations that have done the work — that have built the frameworks, trained the people, and stress-tested the processes — are the ones that survive.

Cyber Security Risk Management is the comprehensive, university-level course text for professionals and students who need more than a surface acquaintance with cybersecurity. It is for those who need to understand the discipline deeply enough to practise it — to make real decisions, implement real controls, and build organisations that are genuinely resilient in the face of an adversarial digital landscape.

Written by David Tuffley PhD, a Senior Lecturer in ICT at Griffith University with three decades of research and professional experience, this book draws on the most authoritative sources in the field — NIST, ISO, CIS, OWASP, GDPR, HIPAA, PCI DSS, ASD, and more — and synthesises them into a structured, ten-module learning programme that takes you from foundational principles to advanced operational practice.

The journey begins where it must: with standards and frameworks. NIST CSF, ISO 27001/27002, NIST SP 800-53, and the CIS Critical Security Controls are not just listed and described here — they are explained in terms of how they work together, why they differ, and how a practitioner chooses between them for a given organisational context. This is the kind of nuanced, applied understanding that no checklist can provide.

Risk management receives dedicated, rigorous treatment across multiple modules. The NIST Risk Management Framework's seven-step lifecycle, the ISO 31000 principles, qualitative and quantitative risk assessment methods, vulnerability management processes, and third-party risk management are all covered in the depth that operational practice demands. Because risk is not a one-time exercise — it is a continuous discipline, and this book treats it as such.

The modules on identity and access management, data protection and privacy, and network and application security address the operational core of most cybersecurity roles. You will work through authentication architectures, PKI and key management, GDPR and Privacy Act compliance, firewall and IDS/IPS design, network segmentation, the OWASP Top 10, and secure coding practices within the software development lifecycle.

Security operations — the SOC, SIEM systems, incident response planning, digital forensics, and continuous threat monitoring — receive a full module, as does sector-specific compliance: NERC CIP for energy, FISMA and HIPAA for healthcare, the ASD Essential 8 and ISM for defence and government, PCI DSS for financial transactions, and the Zero Trust model mandated under Executive Order 14028.

The book concludes with a forward-looking examination of cybersecurity maturity models — the C2M2 and the Essential Eight Maturity Model — alongside a practical guide to career pathways, professional certifications, ethical obligations, and codes of conduct in the cybersecurity profession.

Every module includes structured workshop exercises built around realistic scenarios, making this text equally suited to formal university study and professional development within an organisation. The exercises do not test recall — they build the analytical and strategic thinking that separates practitioners from technicians.

This is the book for the cybersecurity student who intends to be taken seriously, the practitioner seeking a comprehensive professional reference, and the organisation that understands that security is not a product you purchase but a capability you build.

Build it properly. This book shows you how.

Informática Seguridad y Cifrado Seguridad para computadora Hackeo Ciberseguridad Administración de riesgos Resiliencia
adbl_web_anon_alc_button_suppression_c

Las personas que vieron esto también vieron:

Cybersecurity Bible Audiolibro Por Shawn Walker arte de portada
Cybersecurity Bible De: Shawn Walker
Todavía no hay opiniones