Solved

ITIL/Cobit IT security management standard

Posted on 2013-06-10
4
227 Views
Last Modified: 2013-07-30
Can you give more details on this
0
Comment
Question by:cur
  • 2
  • 2
4 Comments
 
LVL 37

Accepted Solution

by:
Gerwin Jansen, EE MVE earned 220 total points
ID: 39234858
What are you looking for besides information like this:

http://en.wikipedia.org/wiki/COBIT
http://www.itil.org.uk/
0
 

Author Comment

by:cur
ID: 39236769
above is the only two security related ones  . Hacking
Certified Information Security Expert (CISEv2.0) ?
0
 
LVL 37

Assisted Solution

by:Gerwin Jansen, EE MVE
Gerwin Jansen, EE MVE earned 220 total points
ID: 39236994
I'm afraid I don't understand what you want, can you elaborate?
0
 

Author Comment

by:cur
ID: 39267431
what is the best to do on the security and later want to run the training for my Customers
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question