Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cgm a22005297i 4500 
003    OCoLC 
005    20240129213017.0 
006    m     o  c         
007    vz czazuu 
007    cr cnannnuuuuu 
008    230814s2023    xx 095        o   vleng d 
019    1404845559 
020    9781961356016|q(electronic video) 
020    1961356015|q(electronic video) 
029 1  AU@|b000075034004 
035    (OCoLC)1393485772|z(OCoLC)1404845559 
037    9781961356016|bO'Reilly Media 
040    ORMDA|beng|erda|epn|cORMDA|dORMDA 
049    INap 
082 04 005.8076 
082 04 005.8076|223/eng/20230814 
099    Streaming Video O’Reilly for Public Libraries 
245 00 CASP+ :|bpreparing for governance, risk, and compliance 
       domain.|h[O'Reilly electronic resource] 
250    [First edition]. 
264  1 [Place of publication not identified] :|bExpanding 
       Security,|c[2023] 
300    1 online resource (1 video file (1 hr., 35 min.)) :|bsound,
       color. 
306    013500 
336    two-dimensional moving image|btdi|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
344    digital|2rdatr 
347    video file|2rdaft 
380    Instructional films|2lcgft 
511 0  Dean Bushmiller, presenter. 
520    Dean Bushmiller will give you the easiest, best path to 
       learning the CompTIA CASP+ This certification qualifies 
       you to assess cyber readiness within an enterprise. You 
       will be able to design and implement the proper solutions 
       to ensure the organization is ready for the next attack. 
       You will have the knowledge and skills required to do the 
       following: For this part of the exam you will consider the
       impact of governance, risk, and compliance requirements 
       throughout the enterprise This course in the CASP series 
       covers the following topics: Governance, Risk, and 
       Compliance Given a set of requirements, apply appropriate 
       risk strategies Risk assessment Risk handling techniques 
       Risk types Risk management life cycle Risk tracking Risk 
       appetite Risk tolerance Policies and security practices 
       Explain importance of managing and mitigating vendor risk 
       Shared responsibility model Vendor lock-in and vendor 
       lockout Vendor viability Meeting client requirements 
       Support availability Geographical considerations Supply 
       chain visibility Incident reporting requirements Source 
       code escrows Ongoing vendor assessment tools Third-party 
       dependencies Technical considerations Explain compliance 
       frameworks and legal considerations, and IR organizational
       impact Security concerns of integrating diverse industries
       Data considerations Geographic considerations Third-party 
       attestation of compliance Regulations, accreditations, and
       standards Legal considerations Contract and agreement 
       types Explain importance of business continuity and 
       disaster recovery concepts Business impact analysis 
       Privacy impact assessment Disaster recovery plan Business 
       continuity plan Incident response plan Testing plans. 
588    Online resource; title from title details screen (O'Reilly,
       viewed August 14, 2023). 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
610 20 Computing Technology Industry Association|xExaminations
       |vStudy guides. 
650  0 Computer security|xExaminations|vStudy guides. 
650  0 Computer networks|xSecurity measures|xExaminations|vStudy 
       guides. 
655  7 Instructional films.|2lcgft 
655  7 Nonfiction films.|2lcgft 
655  7 Internet videos.|2lcgft 
700 1  Bushmiller, Dean,|epresenter. 
710 2  Expanding Security (Firm),|epublisher. 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/videos/~/9781961356016/?ar|zAvaialbe 
       on O'Reilly for Public Libraries 
994    92|bJFN