Solved

ITIL/Cobit IT security management standard

Posted on 2013-06-10
4
217 Views
Last Modified: 2013-07-30
Can you give more details on this
0
Comment
Question by:cur
  • 2
  • 2
4 Comments
 
LVL 37

Accepted Solution

by:
Gerwin Jansen earned 220 total points
ID: 39234858
What are you looking for besides information like this:

http://en.wikipedia.org/wiki/COBIT
http://www.itil.org.uk/
0
 

Author Comment

by:cur
ID: 39236769
above is the only two security related ones  . Hacking
Certified Information Security Expert (CISEv2.0) ?
0
 
LVL 37

Assisted Solution

by:Gerwin Jansen
Gerwin Jansen earned 220 total points
ID: 39236994
I'm afraid I don't understand what you want, can you elaborate?
0
 

Author Comment

by:cur
ID: 39267431
what is the best to do on the security and later want to run the training for my Customers
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cloud connection query 2 75
Cisco ACS TACACS server - adding a secondary 2 62
Allow X-Forwarded-For Headers to Site or No? 3 57
Compromised PC? 17 168
In every aspect, security is essential for your business, and for that matter you need to always keep an eye on it. The same can be said about your computer network system too. Your computer network is prone to various malware and security threats t…
BIND is the most widely used Name Server. A Name Server is the one that translates a site name to it's IP address. There is a new bug in BIND (https://kb.isc.org/article/AA-01272), affecting all versions of BIND 9 from BIND 9.1.0 (inclusive) thro…
This is a video describing the growing solar energy use in Utah. This is a topic that greatly interests me and so I decided to produce a video about it.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now