NSF-CICI | SAC-PA
News
About
Team
Tutorials
Resources
Workshops
Sponsors
Feedback
NSF - Cybersecurity Innovation for Cyberinfrastructure (CICI)
SAC-PA: Towards
S
ecurity
A
ssured
C
yberinfrastructure in
P
ennsylvani
a
Tutorials of Topics in Cybersecurity Management /Compliance & Cyber Forensics/Operations
Table of Contents
1. Security Management- Quick Introduction
2. Security Planning - An Overview
3. Information Security Policy
4. Developing a Secure Program - For An Organization
5. Security Management Models/Practices and Certification/Accreditation
6. Contingency Planning: Incidence Response, Business Continuity Plans, Disaster Recovery
7. SETA: Security Awareness and Training Program - For An Organization
8. Digital Forensics - A Quick Overview
9. Cybersecurity Operation Center (CSoC)
10. Protection Mechanisms - Access, IDS, Firewalls, Auditing
11. Information Security Project Management
12. Legal and Ethical Issues for Organizational Security
Security Management- Quick Introduction
Security Planning - An Overview
Information Security Policy
Developing a Secure Program - For An Organization
Contingency Planning: Incidence Response, Business Continuity Plans, Disaster Recovery
SETA: Security Awareness and Training Program - For An Organization
Digital Forensics - A Quick Overview
Security Management Models/Practices and Certification/Accreditation
Cybersecurity Operation Center (CSoC)
Protection Mechanisms - Access, IDS, Firewalls, Auditing
Information Security Project Management
Legal and Ethical Issues for Organizational Security