Solved

ITIL/Cobit IT security management standard

Posted on 2013-06-10
4
249 Views
Last Modified: 2013-07-30
Can you give more details on this
0
Comment
Question by:cur
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 38

Accepted Solution

by:
Gerwin Jansen, EE MVE earned 220 total points
ID: 39234858
What are you looking for besides information like this:

http://en.wikipedia.org/wiki/COBIT
http://www.itil.org.uk/
0
 

Author Comment

by:cur
ID: 39236769
above is the only two security related ones  . Hacking
Certified Information Security Expert (CISEv2.0) ?
0
 
LVL 38

Assisted Solution

by:Gerwin Jansen, EE MVE
Gerwin Jansen, EE MVE earned 220 total points
ID: 39236994
I'm afraid I don't understand what you want, can you elaborate?
0
 

Author Comment

by:cur
ID: 39267431
what is the best to do on the security and later want to run the training for my Customers
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Ways to assess https/ssl websites 3 119
RDP Sonicwall 8 105
Compromised PC? 17 263
Windows Folder Permissions 9 132
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question