The Cyber Security Practice
Threat Scenarios
Security Testing - Port Scanning
Security Testing - Vulnerability Scanning
Security Testing - Penetration Testing
Secure Development
Log Monitoring
Log Monitoring - Sources
Log Monitoring Tools
The Incident Handling Process
Incident vs Event
The Incident Response Plan
Security Review
Security Review Criteria
Security Review Types
Compliance Schedule and Reporting
Registers
Consults, E. (2023). Cybersecurity Management Webinar 2 Cybersecurity – Warriors and Critics by Jeremy Koster. Afribary. Retrieved from https://track.afribary.com/books/cybersecurity-management-webinar-2-cybersecurity-warriors-and-critics-by-jeremy-koster
Consults, Education "Cybersecurity Management Webinar 2 Cybersecurity – Warriors and Critics by Jeremy Koster" Afribary. Afribary, 14 Mar. 2023, https://track.afribary.com/books/cybersecurity-management-webinar-2-cybersecurity-warriors-and-critics-by-jeremy-koster. Accessed 26 Dec. 2024.
Consults, Education . "Cybersecurity Management Webinar 2 Cybersecurity – Warriors and Critics by Jeremy Koster". Afribary, Afribary, 14 Mar. 2023. Web. 26 Dec. 2024. < https://track.afribary.com/books/cybersecurity-management-webinar-2-cybersecurity-warriors-and-critics-by-jeremy-koster >.
Consults, Education . "Cybersecurity Management Webinar 2 Cybersecurity – Warriors and Critics by Jeremy Koster" Afribary (2023). Accessed December 26, 2024. https://track.afribary.com/books/cybersecurity-management-webinar-2-cybersecurity-warriors-and-critics-by-jeremy-koster