December 2020
Intermediate to advanced
361 pages
6h 26m
English
| 2FA | Two-factor authentication |
| AD | Active Directory |
| BCM | Business continuity management |
| BCMS | Business continuity management system |
| BEC | Business email compromise |
| BIA | Business impact analysis |
| BYOD | Bring your own device |
| CPRA | California Privacy Rights Act |
| CIA | Confidentiality, integrity and availability |
| CISA | US Cybersecurity and Infrastructure Security Agency |
| CISO | Chief information security officer |
| COBIT® | Control Objectives for Information and Related Technology |
| CRF | IT Governance Cyber Resilience Framework |
| CSF | NIST Cybersecurity Framework |
| CVE® | Common Vulnerabilities and Exposures |
| CVSS | Common Vulnerability Scoring System |
| DDoS | Distributed denial of service |
| DES | Data Encryption ... |