NIST 800 Cybersecurity Series
Written by bruce brown and Brown Brown
Narrated by Frank Block
()
About this series
This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process. It is written by someone in the field in layman's terms with practical use in mind. This book is not a replacement for the NIST 800 special publications, it is a supplemental resource that will give context and meaning to the controls for organizations and cybersecurity professionals tasked with interpreting the security controls.
Titles in the series (2)
- RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
1
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications such as the ISC2 CGRC.
- RMF ISSO: NIST 800-53 Controls: NIST 800 Control Families in Each RMF Step
2
This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process. It is written by someone in the field in layman's terms with practical use in mind. This book is not a replacement for the NIST 800 special publications, it is a supplemental resource that will give context and meaning to the controls for organizations and cybersecurity professionals tasked with interpreting the security controls.
Related to NIST 800 Cybersecurity
Related audiobooks
RMF ISSO: NIST 800-53 Controls: NIST 800 Control Families in Each RMF Step Rating: 0 out of 5 stars0 ratingsRMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Rating: 0 out of 5 stars0 ratingsThe Security Consultant's Handbook Rating: 0 out of 5 stars0 ratingsISO 27001 Controls – A guide to implementing and auditing Rating: 0 out of 5 stars0 ratingsRedefining Work Health and Safety: Systems, Strategies, and Progressive Approaches Rating: 0 out of 5 stars0 ratingsNIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 5 out of 5 stars5/5Rethinking IT Security: What Needs to Be Said — How Can We Solve the IT Security Problem Long Term? Rating: 0 out of 5 stars0 ratingsHow Cyber Security Can Protect Your Business: A guide for all stakeholders Rating: 0 out of 5 stars0 ratingsGray Hat: Vulnerability Scanning & Penetration Testing Rating: 0 out of 5 stars0 ratingsSecurity Chaos Engineering: Sustaining Resilience in Software and Systems Rating: 0 out of 5 stars0 ratingsHow to Build a Cyber-Resilient Organization Rating: 0 out of 5 stars0 ratingsISO27001/ISO27002:2013: A Pocket Guide Rating: 0 out of 5 stars0 ratingsA Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsKey Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO’s Guide to Protecting the Digital World Rating: 0 out of 5 stars0 ratingsZero Trust Security: Building Cyber Resilience & Robust Security Postures Rating: 0 out of 5 stars0 ratingsSee Yourself in Cyber: Security Careers Beyond Hacking Rating: 0 out of 5 stars0 ratingsISO/IEC 27001:2022: An introduction to information security and the ISMS standard Rating: 5 out of 5 stars5/5Network And Security Fundamentals For Ethical Hackers: Advanced Network Protocols, Attacks, And Defenses Rating: 0 out of 5 stars0 ratingsCybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsDefensive Cyber Mastery: Expert Strategies for Unbeatable Personal and Business Security Rating: 5 out of 5 stars5/5Pre-Accident Investigations: An Introduction to Organizational Safety Rating: 5 out of 5 stars5/5Defense In Depth: Network Security And Cyber Resilience Rating: 0 out of 5 stars0 ratingsThe Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Rating: 0 out of 5 stars0 ratingsThe Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsCyber Auditing Unleashed: Advanced Security Strategies For Ethical Hackers Rating: 0 out of 5 stars0 ratingsCISSP: A Comprehensive Beginners Guide on the Information Systems Security Rating: 0 out of 5 stars0 ratingsCreating and Maintaining an Electrical Safety Structure: Duties of Management and Chief Responsible Electrical Specialists Rating: 0 out of 5 stars0 ratingsNIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsHacking For Dummies, 7th Edition Rating: 5 out of 5 stars5/5
Enterprise Applications For You
DeFi and the Future of Finance Rating: 4 out of 5 stars4/5Business Intelligence For Dummies Rating: 4 out of 5 stars4/5Python for Beginners: A Crash Course Guide to Learn Python in 1 Week Rating: 4 out of 5 stars4/5Sweet Spot UX: Communicating User Experience to Stakeholders, Decision Makers and Other Humans Rating: 5 out of 5 stars5/5Computer Science Beginners Crash Course: Coding Data, Python, Algorithms & Hacking Rating: 4 out of 5 stars4/5AWS: The Most Complete Guide to Amazon Web Services from Beginner to Advanced Level Rating: 3 out of 5 stars3/5Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems Rating: 5 out of 5 stars5/5Microsoft Teams For Dummies Rating: 0 out of 5 stars0 ratingsExcel: The Complete Ultimate Comprehensive Step-By-Step Guide To Learn Excel Programming Rating: 0 out of 5 stars0 ratingsFundamentals of Data Engineering: Plan and Build Robust Data Systems Rating: 5 out of 5 stars5/5Managing Humans: Biting and Humorous Tales of a Software Engineering Manager Rating: 4 out of 5 stars4/5Building Microservices: Designing Fine-Grained Systems Rating: 4 out of 5 stars4/5Learn Power BI - Second Edition: A comprehensive, step-by-step guide for beginners to learn real-world business intelligence Rating: 0 out of 5 stars0 ratingsAnalytics: The Agile Way Rating: 5 out of 5 stars5/5Accounting and QuickBooks – 2 in 1: Learn How to Use Small Business Bookkeeping Software for Beginners Rating: 0 out of 5 stars0 ratingsBasic Python in Finance: How to Implement Financial Trading Strategies and Analysis using Python Rating: 5 out of 5 stars5/5The Get to the Point! Guide to Using Microsoft Word 2021 and Word for Microsoft Office 365 on Windows and Mac Rating: 0 out of 5 stars0 ratingsPhotoshop: Your Ultimate Beginner Guide To Learning Adobe Photoshop Basics Rating: 5 out of 5 stars5/5Big Data: How the Information Revolution Is Transforming Our Lives Rating: 0 out of 5 stars0 ratingsArtificial Intelligence Bundle: 3 Books in 1 Rating: 0 out of 5 stars0 ratingsAgile Project Management: Learn the Most Important Concepts and Tools of Agile Project Management Rating: 5 out of 5 stars5/5Site Reliability Engineering: How Google Runs Production Systems Rating: 5 out of 5 stars5/5Kubernetes: The Updated Guide to Master Kubernetes for Everyone Rating: 3 out of 5 stars3/5Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today's Businesses Rating: 3 out of 5 stars3/5Lean Analytics: How to Use Data to Track, Optimize, Improve and Accelerate Your Startup Business Rating: 2 out of 5 stars2/5
Related categories
Reviews for NIST 800 Cybersecurity
0 ratings0 reviews