This chapter explains how to manage information security policies, describes roles and responsibilities related to information security, identifies the components of risk management, and shows how to create polices related to information security policy, governance, and risk management.
This chapter introduces the trusted computer base and the ways in which systems can be evaluated to assess the level of security to help you prepare for the CISSP exam.
Tim Warner introduces the CISSP Video Mentor computer-based training (CBT) product, authored by the legendary information security trainer and consultant Shon Harris.
Ed Tittel compares some of the most popular security certifications.
Several of my recent blog posts have described materials aimed at the latest Linux+/LPIC-1 exams; here I do likewise for the latest and greatest versions of the Red Hat Enterprise Linux 7 exams for the Red Hat Certified Engineer (RHCE) and Red Hat Certified System Administrator (RHCSA) credentials.
Launching today - Cisco Press Cisco Live Sweepstakes 2015!
Train effectively – train immediately with Video Courses from Pearson IT Certification.
Expert author and presenter Sander van Vugt takes certification candidates on a two week journey in a new virtual workshop series on RHCSA and RHCE exam essentials.
Topics range from creating advanced Apache configurations to troublehsooting, and setting up an iSCSI environment with target and initiator.
Next session begins Feb 26th and runs every week through end of April!