Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

ITIL/Cobit IT security management standard

Posted on 2013-06-10
4
Medium Priority
?
267 Views
Last Modified: 2013-07-30
Can you give more details on this
0
Comment
Question by:cur
  • 2
  • 2
4 Comments
 
LVL 38

Accepted Solution

by:
Gerwin Jansen, EE MVE earned 880 total points
ID: 39234858
What are you looking for besides information like this:

http://en.wikipedia.org/wiki/COBIT
http://www.itil.org.uk/
0
 

Author Comment

by:cur
ID: 39236769
above is the only two security related ones  . Hacking
Certified Information Security Expert (CISEv2.0) ?
0
 
LVL 38

Assisted Solution

by:Gerwin Jansen, EE MVE
Gerwin Jansen, EE MVE earned 880 total points
ID: 39236994
I'm afraid I don't understand what you want, can you elaborate?
0
 

Author Comment

by:cur
ID: 39267431
what is the best to do on the security and later want to run the training for my Customers
0

Featured Post

Prepare for your VMware VCP6-DCV exam.

Josh Coen and Jason Langer have prepared the latest edition of VCP study guide. Both authors have been working in the IT field for more than a decade, and both hold VMware certifications. This 163-page guide covers all 10 of the exam blueprint sections.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
2017 was a scary year for cyber security.  Hear what our security experts say that hackers have in store for us in 2018.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

581 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question