LEADER 00000cgm a22005297i 4500 003 OCoLC 005 20240129213017.0 006 m o c 007 vz czazuu 007 cr cnannnuuuuu 008 230814s2023 xx 095 o vleng d 019 1404845559 020 9781961356016|q(electronic video) 020 1961356015|q(electronic video) 029 1 AU@|b000075034004 035 (OCoLC)1393485772|z(OCoLC)1404845559 037 9781961356016|bO'Reilly Media 040 ORMDA|beng|erda|epn|cORMDA|dORMDA 049 INap 082 04 005.8076 082 04 005.8076|223/eng/20230814 099 Streaming Video O’Reilly for Public Libraries 245 00 CASP+ :|bpreparing for governance, risk, and compliance domain.|h[O'Reilly electronic resource] 250 [First edition]. 264 1 [Place of publication not identified] :|bExpanding Security,|c[2023] 300 1 online resource (1 video file (1 hr., 35 min.)) :|bsound, color. 306 013500 336 two-dimensional moving image|btdi|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 344 digital|2rdatr 347 video file|2rdaft 380 Instructional films|2lcgft 511 0 Dean Bushmiller, presenter. 520 Dean Bushmiller will give you the easiest, best path to learning the CompTIA CASP+ This certification qualifies you to assess cyber readiness within an enterprise. You will be able to design and implement the proper solutions to ensure the organization is ready for the next attack. You will have the knowledge and skills required to do the following: For this part of the exam you will consider the impact of governance, risk, and compliance requirements throughout the enterprise This course in the CASP series covers the following topics: Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans. 588 Online resource; title from title details screen (O'Reilly, viewed August 14, 2023). 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 610 20 Computing Technology Industry Association|xExaminations |vStudy guides. 650 0 Computer security|xExaminations|vStudy guides. 650 0 Computer networks|xSecurity measures|xExaminations|vStudy guides. 655 7 Instructional films.|2lcgft 655 7 Nonfiction films.|2lcgft 655 7 Internet videos.|2lcgft 700 1 Bushmiller, Dean,|epresenter. 710 2 Expanding Security (Firm),|epublisher. 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/videos/~/9781961356016/?ar|zAvaialbe on O'Reilly for Public Libraries 994 92|bJFN