
- Autor:
- Alan Calder
- Sprecher:
- Archie (Male Synthesized Voice)
- Inhalt:
- Ungekürzt (Kapitelliste)
- Länge:
- 1:49 h
- Format:
- Mp3 Download (73 MB)
- Sprache:
- Englisch
- Verlag:
- IT Governance Publishing Ltd (2022)
- Genre:
- Computer
- Bewertung:
- Tags:
- Keine Tags
Trackliste
01 - Opening Credits | 0:15 | 1 MB |
---|---|---|
02 - Accompanying material | 0:25 | 1 MB |
03 - Introduction | 1:20 | 1 MB |
04 - Chapter 1 Information security and cyber security | 1:12 | 1 MB |
05 - Laws, regulations and contracts | 2:59 | 2 MB |
06 - Chapter 2 Threats and vulnerabilities | 3:04 | 2 MB |
07 - Technical threats | 7:41 | 5 MB |
08 - Defending against malware | 2:10 | 1 MB |
09 - Hacking | 6:16 | 4 MB |
10 - Insecure configuration | 5:04 | 3 MB |
11 - Chapter 3 Security by design | 4:58 | 3 MB |
12 - Example TalkTalk data breach | 1:37 | 1 MB |
13 - Chapter 4 Human threats | 2:09 | 1 MB |
14 - Social engineering | 6:21 | 4 MB |
15 - Staying safe online | 3:51 | 2 MB |
16 - Remote working | 4:10 | 2 MB |
17 - Example WannaCry | 2:53 | 1 MB |
18 - Chapter 5 Physical threats | 4:47 | 3 MB |
19 - Defence in depth | 2:16 | 1 MB |
20 - Physical security and mobile devices | 2:52 | 1 MB |
21 - Example KVM attacks | 3:17 | 2 MB |
22 - Chapter 6 Third-party threats | 0:42 | 1 MB |
23 - Supply chain threats | 11:26 | 7 MB |
24 - Example Target data breach | 2:24 | 1 MB |
25 - Chapter 7 Securing the organisation | 0:53 | 1 MB |
26 - Risk management | 3:42 | 2 MB |
27 - Controls | 4:44 | 3 MB |
28 - Chapter 8 Incident response and management | 3:47 | 2 MB |
29 - Continuity | 2:53 | 1 MB |
30 - Chapter 9 Standards and frameworks | 3:47 | 2 MB |
31 - Taking the first steps | 3:30 | 2 MB |
32 - Chapter 10 Conclusion | 1:13 | 1 MB |
33 - Closing Credits | 0:15 | 1 MB |