Text
Cyber security basics: protect your organization by applying the fundamentals
Table of contents:
0. Back to basics
Building a foundation
Demystifying IT security
Using a risk based approach
General security concepts
Security maturity levels
Section one: Protect
Endpoint protection
Network protection
User awareness and education
Section two: Detect
Continous monitoring
Network activity
Vulnerability scanning
Cyber intelligence
Section three: Respond
Event handling
Incident respons
Change management
Section four: conclusion
Final thoughts
Protect
Detect
Respond
No other version available