CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE: Volume 2 – Program Assessment & Development (Cybersecurity Masters Guides)
Successfully responding to modern cybersecurity threats requires a well-planned, organized, and tested incident management program based...
Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network...
This course is a fast-paced introduction to threat intelligence and attribution. It is designed to provide insight into attribution methodology...
Tim Herbert - Executive Vice President, Research & Market Intelligence at CompTIA
Timo Elliott - VP, Global Innovation Evangelist for SAP
Daniel Cohen Sason - SW Manager - IoT Cyber Security at Check Point Software Technologies, Ltd.