Linux has become a staple for many organizational IT environments, due to its reliability and capacity to handle heavy duty tasks for enterprise servers. Unfortunately, attackers have also turned their gazes towards Linux servers, with the valuable data they store and networks they support. Many Linux environments continue to remain unprotected because they were thought to be immune to cyber threats for many years.
This course is designed to teach you Linux security basics that are easy to implement …
Do you feel like you’re fighting harder for customers’ business today than ever before? Ever wondered why you feel that way? It’s because customers have more control in today’s as-a-service world. They have more options and you’re one amongst many. Molding your offerings and value propositions to the way our customers buy today is the best way to keep your existing customer base, as well as growing it. Read this guide to learn a new approach that will help you successfully …
In this second session of our series on risk management, GRC expert Gerard Scheitlin reviews common risk measurement methodologies, along with a discussion of developing risk metrics and a risk appetite. The utilization of a data-driven approach to identifying and quantifying risk will be covered.
After watching this session, you will be familiar with:
• Utilizing common risk metric and quantification techniques
• Developing a risk appetite and …