Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged cyber essentials

Rss Feed Group items tagged

tech writer

Cyber Essentials Webshop | IT Governance UK - 0 views

  •  
    Browse the leading Cyber Essentials webshop from IT Governance. Discover books, toolkits, training, software, & consultancy.
tech writer

Security Essentials Labs | Learning Tree - 0 views

  •  
    Security Essentials Labs | Learning Tree - CYBRScore Security Essentials Labs include 19 distinct, hands-on labs that prepare you with the essential principles of network security & risk management.
tech writer

Ethical Hacking Essentials Labs | Learning Tree - 0 views

  •  
    Ethical Hacking Essentials Labs | Learning Tree - CYBRScore Ethical Hacking Essentials Labs include 22 hands-on labs to prepare you to exploit networks to discover how to protect your system from attackers.
tech writer

Systems Security Professional Essentials Labs | Learning Tree - 0 views

  •  
    Systems Security Professional Essentials Labs | Learning Tree - CYBRScore Systems Security Essentials Labs include 32 hands-on labs on risk management, network security, identity & access management & security operations.
tech writer

Digital Media Forensics Essentials Labs | Learning Tree - 0 views

  •  
    Digital Media Forensics Essentials Labs | Learning Tree - CYBRScore Digital Media Forensics Essentials Labs include 19 hands-on labs that provide an introduction to media collection, imaging, and analysis.
tech writer

CYBRScore Network Essentials Lab Bundle | Learning Tree - 0 views

  •  
    CYBRScore Network Essentials Lab Bundle | Learning Tree - CYBRScore Network Essentials Labs include 16 hands-on labs focused on security to prep you to work with a variety of hardware, software & network configurations.
tech writer

NIS Regulations Documentation Toolkit | IT Governance UK - 0 views

  •  
    As an OES (operator of essential services), ensure you meet your legal requirements and fully comply with the NIS (Network and Information Systems) Regulations. Accelerate and simplify your compliance project with more than 100 pre-written, customizable document templates for NIS policies and procedures. Ensure you meet the requirements of the 14 high-level security principles to achieve compliance with the CAF (Cyber Assessment Framework). Developed by information security specialists, so you can be sure you're on the right track.  Guarantee full coverage of the Regulations with the comprehensive compliance tools, including the Gap Analysis tool, Business Impact Analysis tool, Risk Treatment Plan, and Training Record. This is an annual subscription product, however, you can cancel at any time. (T&Cs apply)
tech writer

NIS Regulations - A Pocket Guide for Operators of Essential Services | IT Governance UK - 0 views

  •  
    Gain a clear introduction to the NIS Regulations (The Network and Information Systems Regulations 2018) with this essential pocket guide, which explains: The objectives, principles, and indicators of good practice, and gives implementation guidance; The key requirements for OES (operators of essential services); and How to comply with the Regulations
tech writer

JavaScript Essentials for the Full Stack Developer Using ECMAScript | Learning Tree - 0 views

  •  
    JavaScript Essentials for the Full Stack Developer Using ECMAScript | Learning Tree - This Full Stack JavaScript developer course will teach you to write & debug client-side JavaScript to create modern pages for a variety of modern devices.
tech writer

Rust Essentials: Building Better Software | Learning Tree - 0 views

  •  
    Rust Essentials: Building Better Software | Learning Tree - Given the growth of the cloud infrastructure that is a sweet spot for Rust, and the continued support of developers and top-tier tech companies, Rust looks to have a rosy future and should be part of any current, or aspiring, systems developer's learning path. Rust is not only for systems developers, but data scientists also who are working with large simulation or machine learning models that require both accuracy and performance.
tech writer

Vulnerability Scanning Service | IT Governance UK - 0 views

  •  
    Fast, fully automated external vulnerability scan of your Internet-facing IT assets. Fast, fully automated front-line defence against cyber criminals and nation-state attackers. Low-cost, high-value, on-demand, do-it-yourself solution. Quickly identify exploitable vulnerabilities and misconfigurations in your websites, applications and infrastructure. Find more than 50,000 known vulnerabilities, such as misconfigured firewalls or unpatched software. Rerun scans as required to confirm successful remediation. Run unlimited monthly scans to ensure your infrastructure patches are up to date. Give customers confidence by displaying the 'Scanned by IT Governance' badge on your website. CREST-approved scanning service developed by our CREST-accredited security team. This is a monthly subscription product, but you can cancel at any time. (T&Cs apply)
tech writer

Certificate of Cloud Auditing Knowledge (CCAK) Certification Training | Learning Tree - 0 views

  •  
    Certificate of Cloud Auditing Knowledge (CCAK) Certification Training | Learning Tree - In this course, you will learn the essential principles of auditing cloud computing systems to successfully obtain the Certificate of Cloud Auditing Knowledge (CCAK).
tech writer

EC-Council Certified Threat Intelligence Analyst (C|TIA) | Learning Tree - 0 views

  •  
    EC-Council Certified Threat Intelligence Analyst (C|TIA) | Learning Tree - In this method-driven course, you will learn a holistic approach covering vast concepts concerning organizational threat intelligence that are highly essential while building effective threat intelligence that can secure organizations from future threats or attacks.
tech writer

Managing PKI Training | Learning Tree - 0 views

  •  
    Managing PKI Training | Learning Tree - In this Managing PKI training course, you gain essential skills for designing, creating, and maintaining a Public Key Infrastructure (PKI).
tech writer

Nine Steps to Success: An ISO 27001 Implementation Overview | IT Governance UK - 0 views

  •  
    The essential guide for anyone about to embark on an ISO 27001 implementation project, covering every step of the process from management buy-in to certification. A must-have guide from ISO 27001 expert Alan Calder to help you get to grips with the requirements of the Standard and make your ISO 27001 implementation project a success: Details the key steps of an ISO 27001 project from inception to certification. Explains each element of the ISO 27001 project in simple, non-technical language. An ideal guide for anyone tackling ISO 27001 implementation for the first time.
tech writer

NIS Regulations - A Pocket Guide for Digital Service Providers | IT Governance UK - 0 views

  •  
    Gain a clear understanding of the NIS Regulations (The Network and Information Systems Regulations 2018) with this essential pocket guide, which explains: Which DSPs (digital service providers) are within scope; The key requirements; and How guidance from international standards can assist with compliance.
tech writer

ISO/IEC 27017 2015 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27017:2015 - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services. ISO/IEC 27017:2015 - Information Technology - Security Techniques - Code of practice for Information Security Controls based on ISO/IEC 27002 for Cloud Services Standard. Guidelines for information security controls applicable to the provision and use of Cloud services. Essential information for organizations that want to provide Cloud services that can be incorporated into an ISO 27001-compliant information security management system (ISMS). Useful for organizations evaluating the security posture of potential Cloud service providers. Available in hardcopy and PDF formats.
tech writer

Patch Management Policy Template | IT Governance UK - 0 views

  •  
    Create a patch management policy in minutes with this easy-to-use, customisable template, which can be tailored to your organisation's requirements and processes.
‹ Previous 21 - 38 of 38
Showing 20 items per page