December 2020
Intermediate to advanced
361 pages
6h 26m
English
Chapter 1: The threat landscape
Chapter 2: Information and cyber security
Chapter 4: Regulatory and contractual requirements
4.1 International data privacy laws
4.2 Cyber security requirements for critical infrastructure
Chapter 5: Implementing cyber security
5.3 The IT Governance Cyber Resilience Framework (CRF)
Part 2: Threats and vulnerabilities
Chapter 6: The anatomy of threats