Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged government

Rss Feed Group items tagged

tech writer

Cyber Essentials Plus Additional Device Testing | IT Governance UK - 0 views

  •  
    Cyber Essentials Plus Certification - Additional Device Testing: Purchase testing for up to 40 additional devices for your Cyber Essentials Plus on-site assessment. Delivered by one of the founding Cyber Essentials certification bodies, which remains one of the largest in the UK.
tech writer

Cyber Essentials Plus Internal Retest | IT Governance UK - 0 views

  •  
    Retake your Cyber Essentials Plus test. Delivered by one of the founding Cyber Essentials certification bodies, which remains one of the largest in the UK.
tech writer

Cyber Essentials Plus Vulnerability Scan Additional IPs | IT Governance UK - 0 views

  •  
    Retake or purchase additional external vulnerability scans for continued Cyber Essentials certification. Purchase additional IP addresses for your vulnerability scans (available in bundles of 16 ) in order to meet the requirements of Cyber Essentials Plus certification. Delivered by one of the founding certification bodies that remains one of the largest in the UK.
tech writer

Cyber Essentials vulnerability rescan | IT Governance UK - 0 views

  •  
    The external vulnerability rescan is for organizations that failed their initial Cyber Essentials Plus certification external vulnerability scan. A single rescan covers 16 IP addresses. Buy additional external vulnerability scans for Cyber Essentials certification if you failed your initial scans.
tech writer

Cyber Essentials Toolkit | IT Governance UK - 0 views

  •  
    This toolkit includes all the necessary procedures and processes for ensuring that the controls you are implementing are aligned to the requirements of the Cyber Essentials Scheme. Designed to reflect the requirements of the Cyber Essentials scheme. Built on expert knowledge from numerous cyber security implementation projects. Ensure that the controls you are implementing are aligned to the requirements of the Cyber Essentials scheme. Access, manage and amend your documents from anywhere with Internet access, via our DocumentKits platform. This is an annual subscription product, however, you can cancel at any time. (T&Cs apply)
tech writer

Cyber Essentials Gap Analysis Tool | IT Governance UK - 0 views

  •  
    Identify the controls you need to put in place to meet the requirements of the Cyber Essentials scheme and monitor your progress towards compliance. Fully updated for the 2022 changes, this tool enables you to identify the controls that you need to put in place to meet the requirements of the Cyber Essentials scheme and monitors your progress towards compliance.
tech writer

Patch Management Policy Template | IT Governance UK - 0 views

  •  
    Create a patch management policy in minutes with this easy-to-use, customisable template, which can be tailored to your organisation's requirements and processes.
tech writer

ISO/IEC 27002 2013 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27002:2013 guides the implementation of controls in Annex A in ISO/IEC 27001. ISO/IEC 27002:2013 - Information Technology - Security Techniques - Code of practice for information security controls Standard. The International Standard supports the implementation of an Information Security Management System (ISMS) based on the requirements of ISO 27001.
tech writer

ISO/IEC 27004 2016 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27004:2016 - Information Technology - Security techniques - information security management - measurement Standard. ISO/IEC 27004:2016 guides to help organizations evaluate the performance and effectiveness of an implemented ISMS (information security management system), as mandated in section 9.1 of ISO/IEC 27001:2013.
tech writer

ISO/IEC 27005 2018 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27005:2018, Information technology - Security techniques - Information security risk management Standard. The ISO/IEC 27005:2018 standard supports the information security risk management processes specified in ISO/IEC 27001.
tech writer

ISO/IEC 27013 2015 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27013:2015 - Information Technology - Security Techniques - Guidelines for integrated Implementation of ISO/IEC 27001 and ISO/IEC 20000-1 Standard. The international Standard for information security and service management system integration and implementation.
tech writer

The Art of Cyber Security - A practical guide to winning the war on cyber crime | IT Go... - 0 views

  •  
    This book is about cyber security, but it's also about so much more; it's about giving you the skills to think creatively about your role in the cyber security industry. A comprehensive and well-researched review of how cyber security and data protection is perceived by industry practitioners and the public. Challenges readers to reconsider the discipline of cyber security and view it from a fresh perspective. Analyses Sun Tzu's The Art of War and how Tzu's teachings can be applied to cyber security.
tech writer

ISO 22301 BCMS Lead Implementer (CBC LI) Exam Voucher | IT Governance UK - 0 views

  •  
    Certified ISO 22301 BCMS Lead Implementer (CBC LI) Exam Voucher: Pay the fee to take the Certified ISO 22301 BCMS Lead Implementer (CBC LI) exam online. This is a 90-minute ISO 17024-certificated multiple-choice exam set by IBITGQ. Please note that this exam voucher is valid for 12 months. All candidates must have the Google Chrome browser installed. Order now and receive a confirmation email within 48 business hours outlining the next steps for sitting the exam.
tech writer

Certified Ethical Hacker (CEH) v11 Training Course | IT Governance UK - 0 views

  •  
    Achieve Certified Ethical Hacker (CEH) v11. Build a career as a penetration tester. Learn attack strategies, tactics, tools, and countermeasures. Build your ethical hacking (penetration testing) career with the Certified Ethical Hacker (CEH) v11 qualification, recognized by employers worldwide. Learn the attack strategies, tactics, technology, tools, and motivations used by criminal hackers. Our Ely / Online course provides the flexibility of attending our certified COVID-19 secure training center or booking as an online delegate. Learn from anywhere with our Live Online and Self-Paced options that allow you to study your way, keeping travel and costs down to a minimum. Find out more. Successful completion of this five-day course and including the exam leads to the EC-Council CEH qualification and 35 CPD points.
tech writer

CEH Training Course & Practical Exam | IT Governance UK - 0 views

  •  
    Certified Ethical Hacker (CEH) Training Course and CEH Practical Exam: Get into the mindset of a criminal hacker with this five-day CEH training course. Learn from anywhere - choose whether you attend our courses Live Online or in person. Find out more. Our Classroom / Live Online option allows you to study your way, keeping travel and costs down to a minimum. This combination course will equip you with ethical hacking skills, and improve your knowledge of risks and vulnerabilities. Successful completion of the course and including exams leads to the internationally recognized Certified Ethical Hacker certification and CEH Practical, and 35 CPD/CPE points. The CEH exam voucher is included in the course, but the exam will need to be taken in your own time.
tech writer

Certified Ethical Hacker (CEH) Practical Exam | IT Governance UK - 0 views

  •  
    Certified Ethical Hacker (CEH) Practical Exam: Fully accredited, a practical exam by the EC-Council. Adds value to your CEH certification by proving your ethical hacking skills and abilities. The exam can be taken from the comfort of your own home or office. Once you pass the exam, you will be certified as a CEH Practical.
tech writer

EC-Council iLabs | IT Governance UK - 0 views

  •  
    With more than 400 complete exercises and counting, EC-Council iLabs cover ethical hacking, computer forensics, penetration testing, secure coding, and disaster recovery. It is the most comprehensive and feature-rich virtual learning environment currently on the market. You will have six months' access to the EC-Council virtual lab environment for CEH.
tech writer

IT Governance USA Books - 0 views

  •  
    Browse ITGP Books in the leading UK and international IT GRC bookstore [ITGP, ITGP Books, IT GRC Books]
tech writer

EU General Data Protection Regulation (GDPR) Documentation Toolkit | IT Governance USA - 0 views

  •  
    Created by lawyers and practitioners, the GDPR Toolkit gives you the documentation and templates you need to achieve fast, cost-effective compliance. The GDPR toolkit you can trust - created by lawyers and practitioners so you can rely on the content. Pre-filled GDPR documentation pack so you can meet GDPR requirements quickly and avoid expensive consultancy fees. 80+ GDPR templates, including policies, procedures, and checklists, so you know everything is covered - easily demonstrate GDPR compliance while reducing implementation costs. Over 3,000 other customers - so you know you're in good company. The GDPR Toolkit can also be used for a CCPA compliance project! The GDPR and CCPA share many requirements, which means that you can tackle both compliance projects at the same time. The GDPR toolkit will help you put together the necessary privacy policies and procedures you need to tackle CCPA compliance much faster and more cost-effectively than starting from scratch.
tech writer

What is Business Continuity Management (BCM)? | IT Governance USA - 0 views

  •  
    What is Business Continuity Management (BCM)? Find out more about this form of risk management and learn how to protect your organization. [Business continuity, disaster recovery, PAS56, PAS 56, BS25999, BS 25999, bcp, drp, ISO22301, iso 22301, bs 25999]
« First ‹ Previous 221 - 240 of 253 Next ›
Showing 20 items per page