Skip to content

Dated: 31-10-2024

Layout

Chapter 1

Introduction to Information Security

Chapter 2

Typical Enterprise IT Architecture & Security Overlay

Chapter 3

Security Transformation Stage 1: Security Hardening Of IT Assets

Chapter 4

Security Transformation Stage 2: Vulnerability Management (VM) Program

Chapter 5

Security Transformation Stage 3: Security Engineering

Chapter 6

Security Transformation Stage 4: Security Governance

Chapter 7

Security Testing & Validation

Chapter 8

Successful Security Transformation