
Cybersecurity for Beginners
How to Apply the NIST Risk Management Framework
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.
Add to Cart failed.
Please try again later
Add to Wish List failed.
Please try again later
Remove from wishlist failed.
Please try again later
Adding to library failed
Please try again
Follow podcast failed
Please try again
Unfollow podcast failed
Please try again

Get 2 free audiobooks during trial.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.
Buy for $15.49
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use, License, and Amazon's Privacy Notice. Taxes where applicable.
-
Narrated by:
-
Scott Clem
-
By:
-
John Knowles
About this listen
Handling risk is one of the chief goals of organizations, mainly in the InfoSec program. Risk management delivers the vehicle for the balance between compliance and security. Businesses need to defend their data by launching and upholding an operational risk management platform. Organizations must considered their environment, resources, threats, and sensitivity of their data. In this book, you will learn the fundamentals of risk management with security, and how to deploy the RMF to efficiently deal with compliance and risk within your business.
Click "Buy Now" to get started today!
You will learn:
- Compliance, security, risk
- How to be compliant and secure
- Introduction to risk management framework
- Introduction to the NIST special publications
- Introduction to the RMF publications
- Understanding the cybersecurity framework
- Comprehending the CSF construction
- Comprehending the CSF tiers and profiles
- Essential RMF concepts
- Understanding risk tiers
- Understanding systems and authorization
- Introduction to roles and responsibilities
- Comprehending security and privacy in the RMF
- How to prepare for RMF
- How to prepare for organization-level tasks
- How to prepare for system-level tasks
- How to categorize information systems
- Comprehending RMF categorization tasks
- Understanding categorizing systems
- How to select security controls
- How to select controls and baselines
- How to implement security controls
- How to implement controls
- How to assess security controls
- Understanding RMF assess tasks
- How to assess systems
- How to authorize information systems
- How to monitor security controls
- How to monitor tasks
- How to monitor systems
Click "Buy Now" to get started today!
©2020 John Knowles (P)2020 John Knowles
adbl_web_global_use_to_activate_T1_webcro805_stickypopup
No reviews yet