Udemy – IT Audit Fundamentals | Introduction to Controls

Udemy – IT Audit Fundamentals | Introduction to Controls
English | Size: 400MB
Category: Tutorial


Learn foundational principles of IT audits and controls [Read more…]

PluralSight – Security Controls: CIS Controls Updated 2021/12/20

PluralSight – Security Controls-cis Controls Updated 20211220 Bookware-KNiSO
English | Size: 159.52 MB
Category: Tutorial


The Center for Internet Security (CIS) controls are critical to protecting the confidentiality, integrity, and availability of sensitive data. [Read more…]

Linkedin Learning – CompTIA Data+ (DA0-001) Cert Prep: Data Governance, Quality, and Controls

Linkedin Learning – CompTIA Data DA0-001 Cert Prep Data Governance Quality and Controls-XQZT
English | Size: 211.91 MB
Category: Tutorial


Explore the world of data governance as you prepare for the CompTIA Data+ (DAO-001) exam. Learn about data stewardship responsibilities, maintaining data quality, and more [Read more…]

Linkedin Learning – SSCP Cert Prep 2 Access Controls

Linkedin Learning – SSCP Cert Prep 2 Access Controls-XQZT
English | Size: 285.85 MB
Category: Tutorial


The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is an excellent entry point to a career in IT security. [Read more…]

Mastering Metasploit Exploit systems cover your tracks and bypass security controls with the Metasploit 5 0 framework 4th Ed

Mastering Metasploit Exploit systems cover your tracks and bypass security controls with the Metasploit 5.0 framework 4th Ed
English | Size: 298.70 MB
Category: Tutorial


Discover the next level of network defense and penetration testing with the Metasploit 5.0 framework [Read more…]

NIST 800-53: Introduction to Security and Privacy Controls | Cybrary

NIST 800-53: Introduction to Security and Privacy Controls | Cybrary
English | Size: 3.04 GB
Category: Tutorial


In this course, we will learn how 800-53 fits into the Risk Management Framework (RMF) since the knowledge is fundamental to understanding the importance of the security controls. After studying the steps in RMF, students will discover the history of the 800-53 document based on the revisions to the original. [Read more…]