Dated: 31-10-2024
Layout
Chapter 1
Introduction to Information Security
Chapter 2
Typical Enterprise IT Architecture & Security Overlay
Chapter 3
Security Transformation Stage 1: Security Hardening Of IT Assets
Chapter 4
Security Transformation Stage 2: Vulnerability Management (VM) Program
Chapter 5
Security Transformation Stage 3: Security Engineering
Chapter 6
Security Transformation Stage 4: Security Governance
Chapter 7
Security Testing & Validation
Chapter 8
Successful Security Transformation