Marc Menninger
Author
Language
English
Description
Learn how to leverage the skills and experience you already have to transition from your current career to a lucrative and successful career in cybersecurity.
Cybersecurity continues to be one of the fastest-growing career fields, with thousands of jobs of all types going unfilled. If you’re eager to transition to a career in this vital industry but don’t know where to start, then this is the course for you. Instructor Marc Menninger—a cybersecurity...
Author
Language
Portuguese
Description
Saiba como proteger os dados da sua organização, até mesmo das ameaças de segurança cibernética mais desonestas. Examine as preocupações de segurança mais comuns e os vetores de ataque mais recentes.
À medida que a complexidade dos sistemas de tecnologia continuam a crescer, as ameaças de cibersegurança se tornam cada vez mais eficazes e prejudiciais. As manchetes de notícias anunciam regularmente enormes violações de dados e hacks...
Author
Language
Portuguese
Description
Aprenda a proteger os dados da sua empresa até mesmo contra as ameaças mais sorrateiras à cibersegurança. Examine as preocupações de segurança mais comuns, bem como os vetores de ataque mais recentes.
À medida que a complexidade dos sistemas de tecnologia continua aumentando, as ameaças à cibersegurança se tornam cada vez mais eficazes e prejudiciais. Periodicamente, as manchetes de notícias anunciam enormes violações de dados e ataques...
Author
Language
English
Description
Improve your information security program or prepare for compliance with the ISO 27001 standard by learning about the 93 Annex A security control requirements.
The Annex A controls in the ISO 27001 standard are used by organizations around the world to improve their information security programs and demonstrate good security practices to others. In this second part of his two-part ISO 27001 course, instructor Marc Menninger provides a comprehensive...
Author
Language
Nederlands
Description
Leer hoe u de gegevens van uw organisatie kunt beschermen tegen zelfs de meest sluwe bedreigingen voor cyberbeveiliging. Onderzoek de meest voorkomende veiligheidsproblemen en nieuwere aanvalsvectoren.
Naarmate IT-systemen steeds complexer worden, worden de bedreigingen voor cyberbeveiliging steeds effectiever en schadelijker. Nieuwskoppen maken regelmatig melding van enorme datalekken en geavanceerde hacks. Hoe komen deze aanvallers binnen en welke...
Author
Language
English
Description
Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.
As tech systems continue to grow in complexity, cybersecurity threats are becoming increasingly more effective and damaging. News headlines regularly announce enormous data breaches and sophisticated hacks. How are these attackers getting in, and what actions can you take to protect...
Author
Language
Español
Description
Aprende a proteger los datos de tu organización incluso de las amenazas de ciberseguridad más retorcidas. Examina los problemas de seguridad más comunes, así como los vectores de ataque más recientes.
A medida que los sistemas tecnológicos siguen creciendo en complejidad, las amenazas a la ciberseguridad son cada vez más eficaces y dañinas. Los titulares de las noticias anuncian regularmente enormes violaciones de datos y sofisticados hackeos....
Author
Language
Italiano
Description
Scopri come proteggere i dati della tua azienda anche dalle minacce alla sicurezza informatica più subdole. Esaminare i problemi di sicurezza più comuni e i vettori di attacco più recenti.
Poiché i sistemi IT continuano a crescere in complessità, le minacce alla sicurezza informatica stanno diventando sempre più efficaci e dannose. I titoli delle notizie annunciano regolarmente enormi violazioni dei dati e attacchi sofisticati. Come entrano...
Author
Language
Deutsch
Description
Erhalten Sie einen Überblick über die wichtigsten Cybersecurity-Bedrohungen.
Mit der zunehmenden Komplexität der IT-Landschaft werden auch die Bedrohungen für die Cybersicherheit vielfältiger, effektiver und schädlicher. Auch die Häufigkeit von Angriffen nimmt zu. Aber wie kommen diese Angreifer ins System und welche Maßnahmen können Sie ergreifen, um sich vor ihnen zu schützen? In diesem Kurs beschreibt Juliane Panzer, basierend auf einem...
Author
Language
English
Description
Improve your information security program or prepare for compliance with the ISO 27001 standard by learning about the 114 Annex A security control requirements.
The Annex A controls in the ISO 27001 standard are used by organizations around the world to improve their information security programs and demonstrate good security practices to others. In this second part of his two-part ISO 27001 course, instructor Marc Menninger provides a comprehensive...
Author
Language
English
Description
Learn what the ISO 27001-2022 standard is and how to comply with and get certified as compliant with this standard.
Discover why the ISO 27001-2022 standard is one of the most popular frameworks for building effective cybersecurity programs and learn what it takes to comply with and get certified as compliant with this standard. In this course, cybersecurity director Marc Menninger provides an overview of how to build an ISO 27001-2022-compliant...
Author
Language
English
Description
Explore how to build an effective cybersecurity program in compliance with the ISO 27001 standard.
If you’re an information security manager, your day-to-day work life depends on meeting recognized standards of practice. In this new two-part course, instructor Marc Menninger takes a closer look at what the ISO 27001 standard is and why it’s used around the world to build information security programs that work. Discover why the ISO 27001 standard...
Author
Language
English
Description
Interested in finding a cybersecurity job? Join expert Marc Menninger to find out how to launch a successful career in cybersecurity.
Demand for cybersecurity professionals has never been higher—and it's only projected to keep growing. Interested in finding a job in this exciting new field? Or simply advancing to the next level? Cybersecurity expert Marc Menninger explains how to launch and develop a successful career in cybersecurity, regardless...
Author
Language
Polish
Description
Dowiedz się, jak chronić dane organizacji przed najbardziej wyrafinowanymi zagrożeniami cyberbezpieczeństwa. Przeanalizuj najczęstsze problemy z bezpieczeństwem, a także nowsze wektory ataków.
Wraz ze wzrostem złożoności systemów informatycznych zagrożenia cyberbezpieczeństwa stają się coraz bardziej sprawne i szkodliwe. Nagłówki wiadomości regularnie informują o ogromnych naruszeniach bezpieczeństwa danych i wyrafinowanych włamaniach....
Author
Language
Français
Description
Découvrez comment protéger les données de votre organisation contre les menaces de cybersécurité les plus insidieuses. Examinez les problèmes de sécurité les plus courants ainsi que les vecteurs d'attaque les plus récents.
À mesure que les systèmes technologiques continuent de gagner en complexité, les menaces de cybersécurité deviennent de plus en plus efficaces et destructrices. Les gros titres de l'actualité annoncent régulièrement...
Author
Language
English
Description
Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.
This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze...
17) 网络安全:威胁一览
Author
Language
中文(繁體)
Description
了解如何保护企业数据免受邪恶网络安全威胁的影响。了解最常见的安全问题以及新出现的攻击媒介。
随着科技系统的复杂性不断增加,网络安全威胁也越来越能产生切实的后果,且具有破坏性。重大的数据泄露和高超的黑客攻击时常见诸报端。这些攻击者是如何乘虚而入的?你可以采取哪些措施加以防范呢?在这个课程中,马克·门宁格将介绍一些最常见的网络威胁,包括网络钓鱼、勒索软件、深度伪造、非托管的物联网设备、商业电子邮件欺诈等。他还会介绍减少或消除这些威胁所产生影响的最佳应对措施。...
18) サイバーセキュリティ脅威の現状
Author
Language
日本語
Description
このコースでは、甚大な被害をもたらすサイバーセキュリティ脅威から組織を守るために、具体的な脅威の種類や攻撃者がとる侵入手段、最適な対策について解説します。
技術システムの複雑な成長に伴ってサイバー攻撃の手法は絶えず進化し続け、ますます深刻な影響を与えるようになっています。このコースでは、甚大な被害をもたらすサイバーセキュリティ脅威から組織を守るために、具体的な脅威の種類や攻撃者がとる侵入手口、最適な対策について解説します。フィッシングやランサムウェア、ディープフェイク、セキュリティ対策が不十分なIoTデバイス、ビジネスメール詐欺(BEC)など、よく見られるサイバーセキュリティ脅威の危険性を具体的に説明します。また、こうした脅威による影響を緩和し、排除するために最適な対策や、脅威にさらされるリスクを確実に減らすための戦略も紹介します。...
Author
Language
Indonesian
Description
Pelajari cara melindungi data organisasi Anda dari ancaman keamanan siber yang paling licik sekalipun. Memeriksa masalah keamanan yang paling umum serta vektor serangan yang lebih baru.
Karena sistem TI terus tumbuh dalam kompleksitas, ancaman keamanan siber menjadi semakin efektif dan berbahaya. Berita utama secara teratur mengumumkan pelanggaran data yang sangat besar dan peretasan yang canggih. Bagaimana penyerang ini masuk, dan tindakan apa yang...
Author
Language
Türkçe
Description
Kuruluşunuzun verilerini en sinsi siber güvenlik tehditlerinden bile nasıl koruyacağınızı öğrenin. En yaygın güvenlik endişelerinin yanı sıra daha yeni saldırı vektörlerini inceleyin.
BT sistemleri karmaşık bir şekilde büyümeye devam ettikçe, siber güvenlik tehditleri giderek daha etkili ve zarar verici hale geliyor. Haber manşetleri düzenli olarak muazzam veri ihlallerini ve karmaşık hack'leri duyuruyor. Bu saldırganlar...