Linux has become a staple for many organizational IT environments, due to its reliability and capacity to handle heavy duty tasks for enterprise servers. Unfortunately, attackers have also turned their gazes towards Linux servers, with the valuable data they store and networks they support. Many Linux environments continue to remain unprotected because they were thought to be immune to cyber threats for many years.
This course is designed to teach you Linux security basics that are easy to implement …
In this second session of our series on risk management, GRC expert Gerard Scheitlin reviews common risk measurement methodologies, along with a discussion of developing risk metrics and a risk appetite. The utilization of a data-driven approach to identifying and quantifying risk will be covered.
After watching this session, you will be familiar with:
• Utilizing common risk metric and quantification techniques
• Developing a risk appetite and …