در حال بارگذاری
24 ژانویه 2021
300 مگابایت
12445 بازدید

SEC566: Implementing and Auditing the Critical Security Controls – In-Depth

SEC566 [ PDF= 2016 ]

In the last couple of years it has become obvious that in the world of information security, the offense is outperforming the defense. Even though budgets increase and management pays more attention to the risks of data loss and system penetration, data is still being lost and systems are still being penetrated. Over and over people are asking, “What can we practically do to protect our information?” The answer has come in the form of 20 information assurance controls known as the Consensus Audit Guidelines (CAG).

Syllabus SEC566

SEC566.1: Introduction and Overview of the 20 Critical Controls

SEC566.2: Critical Controls 3, 4, 5 and 6

SEC566.3: Critical Controls 7, 8, 9, 10 and 11

SEC566.4: Critical Controls 12, 13, 14 and 15

SEC566.5: Critical Controls 16, 17, 18, 19 and 20