Security Essentials Labs | Learning Tree - CYBRScore Security Essentials Labs include 19 distinct, hands-on labs that prepare you with the essential principles of network security & risk management.
Ethical Hacking Essentials Labs | Learning Tree - CYBRScore Ethical Hacking Essentials Labs include 22 hands-on labs to prepare you to exploit networks to discover how to protect your system from attackers.
Systems Security Professional Essentials Labs | Learning Tree - CYBRScore Systems Security Essentials Labs include 32 hands-on labs on risk management, network security, identity & access management & security operations.
Digital Media Forensics Essentials Labs | Learning Tree - CYBRScore Digital Media Forensics Essentials Labs include 19 hands-on labs that provide an introduction to media collection, imaging, and analysis.
CYBRScore Network Essentials Lab Bundle | Learning Tree - CYBRScore Network Essentials Labs include 16 hands-on labs focused on security to prep you to work with a variety of hardware, software & network configurations.
As an OES (operator of essential services), ensure you meet your legal requirements and fully comply with the NIS (Network and Information Systems) Regulations.
Accelerate and simplify your compliance project with more than 100 pre-written, customizable document templates for NIS policies and procedures.
Ensure you meet the requirements of the 14 high-level security principles to achieve compliance with the CAF (Cyber Assessment Framework).
Developed by information security specialists, so you can be sure you're on the right track.
Guarantee full coverage of the Regulations with the comprehensive compliance tools, including the Gap Analysis tool, Business Impact Analysis tool, Risk Treatment Plan, and Training Record.
This is an annual subscription product, however, you can cancel at any time. (T&Cs apply)
Gain a clear introduction to the NIS Regulations (The Network and Information Systems Regulations 2018) with this essential pocket guide, which explains:
The objectives, principles, and indicators of good practice, and gives implementation guidance;
The key requirements for OES (operators of essential services); and
How to comply with the Regulations
JavaScript Essentials for the Full Stack Developer Using ECMAScript | Learning Tree - This Full Stack JavaScript developer course will teach you to write & debug client-side JavaScript to create modern pages for a variety of modern devices.
Rust Essentials: Building Better Software | Learning Tree - Given the growth of the cloud infrastructure that is a sweet spot for Rust, and the continued support of developers and top-tier tech companies, Rust looks to have a rosy future and should be part of any current, or aspiring, systems developer's learning path. Rust is not only for systems developers, but data scientists also who are working with large simulation or machine learning models that require both accuracy and performance.
Fast, fully automated external vulnerability scan of your Internet-facing IT assets.
Fast, fully automated front-line defence against cyber criminals and nation-state attackers.
Low-cost, high-value, on-demand, do-it-yourself solution.
Quickly identify exploitable vulnerabilities and misconfigurations in your websites, applications and infrastructure.
Find more than 50,000 known vulnerabilities, such as misconfigured firewalls or unpatched software.
Rerun scans as required to confirm successful remediation.
Run unlimited monthly scans to ensure your infrastructure patches are up to date.
Give customers confidence by displaying the 'Scanned by IT Governance' badge on your website.
CREST-approved scanning service developed by our CREST-accredited security team.
This is a monthly subscription product, but you can cancel at any time. (T&Cs apply)
Certificate of Cloud Auditing Knowledge (CCAK) Certification Training | Learning Tree - In this course, you will learn the essential principles of auditing cloud computing systems to successfully obtain the Certificate of Cloud Auditing Knowledge (CCAK).
EC-Council Certified Threat Intelligence Analyst (C|TIA) | Learning Tree - In this method-driven course, you will learn a holistic approach covering vast concepts concerning organizational threat intelligence that are highly essential while building effective threat intelligence that can secure organizations from future threats or attacks.
Managing PKI Training | Learning Tree - In this Managing PKI training course, you gain essential skills for designing, creating, and maintaining a Public Key Infrastructure (PKI).
The essential guide for anyone about to embark on an ISO 27001 implementation project, covering every step of the process from management buy-in to certification.
A must-have guide from ISO 27001 expert Alan Calder to help you get to grips with the requirements of the Standard and make your ISO 27001 implementation project a success:
Details the key steps of an ISO 27001 project from inception to certification.
Explains each element of the ISO 27001 project in simple, non-technical language.
An ideal guide for anyone tackling ISO 27001 implementation for the first time.
Gain a clear understanding of the NIS Regulations (The Network and Information Systems Regulations 2018) with this essential pocket guide, which explains:
Which DSPs (digital service providers) are within scope;
The key requirements; and
How guidance from international standards can assist with compliance.
ISO/IEC 27017:2015 - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services.
ISO/IEC 27017:2015 - Information Technology - Security Techniques - Code of practice for Information Security Controls based on ISO/IEC 27002 for Cloud Services Standard.
Guidelines for information security controls applicable to the provision and use of Cloud services.
Essential information for organizations that want to provide Cloud services that can be incorporated into an ISO 27001-compliant information security management system (ISMS).
Useful for organizations evaluating the security posture of potential Cloud service providers.
Available in hardcopy and PDF formats.
Create a patch management policy in minutes with this easy-to-use, customisable template, which can be tailored to your organisation's requirements and processes.