Koetliso ea ho lekola likotsi tsa cyber

Khetholla le ho sireletsa thepa ea hau ea bohlokoa ka ho iketsetsa liteko tsa kotsi

Khetho ea 1 ea ho tobana le sefahleho le sefahleho

Thutong ena ea matsatsi a mabeli, barupeluoa ba ithuta ho etsa tlhahlobo ea ts'ireletso ea ts'ireletso ea tlhahisoleseling. Mokhoa oa rona o fa mekhatlo mokhoa o felletseng o shebaneng le matlotlo a tlhahisoleseling maemong a bona a ts'ebetso. U tla sebelisa sesebelisoa sa morao-rao sa taolo ea likotsi nakong ea thupelo.

Nakong ea thupelo eohle, o tla nka karolo ho ikoetliseng le lipuisanong tsa sehlopha, ho kenyeletsoa le mesebetsi ea boitsibiso ba kotsi, tlhahlobo le karabelo.

Kamora ho phethela thupelo, ba tlileng kopanong ba tla tseba ho:

  • Bokella le ho hlophisa tlhaiso-leseling e mabapi le kotsi ka lipuisano, litlhahlobo tsa litokomane le tlhahlobo ea tekheniki

  • Etsa litekanyetso tsa tlhahlobo ea kotsi

  • Khetholla, sekaseka le ho beha likotsi tsa ts'ireletso ea tlhahisoleseling pele.

  • Ntlafatsa mesebetsi ea taolo ea tlokotsi ka ho e bona maemong a kotsi

  • Utloisisa hore na hobaneng ho laola likotsi tsa ts'ebetso ho le bohlokoa ho laola likotsi tsa khoebo

  • Hlahisa maano a karabelo ea kotsi a loketseng litlhoko tsa mokhatlo

Ka ho tsepamisa maikutlo likotsing tsa ts'ebetso ea thepa ea tlhaiso-leseling, bankakarolo ba ithuta ho sheba tlhahlobo ea likotsi maemong a sepheo sa mokhatlo le mamello ea likotsi.

Khetho ea 2-Cyber ​​Risk Assessment Online Training

Molemo oa thupelo ea inthaneteng ke hore o ka emisa mohato o mong le o mong, ea ho ea kenya ts'ebetsong kapa ho etsa lipatlisiso ka seo o se hlokang pele o fetela mohato o latelang. Mokhoa ona o bolela hore qetellong ea thupelo; u tla be u qetile tlhahlobo ea hau ea kotsi ea cyber mokhatlong oa hau.

cyber_reconnaissance.png

There are nine modules in this course and cover the Eight Steps in Conducting a Cyber Risk Assessment.

 

Comes complete with all templates and training on how you conduct a Cyber Risk Assessment as per the Software Engineers Institute recommendations.

 

The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro™ method developed by the Carnegie Mellon University, Pittsburgh USA.

 

The OCTAVE Allegro™ approach provides the Public and Private Sectors a comprehensive methodology that focuses on information assets in their operational context. Cyber risks are identified and analysed based on where they originate, at the points where information is stored, transported, and processed. By focusing on operational risks to information assets, participants learn to view risk assessment in the context of the Public and Private Sectors strategic objectives and risk tolerances.

Ke mang ea lokelang ho etsa thupelo?

  • Batho ka bomong ba batlang ho iketsetsa litlhahlobo tsa kotsi ea ntlo

  • C-Suite, litsebi tsa Ts'ireletso, meralo ea tsoelo-pele ea khoebo, basebetsi ba ikobelang melao, batsamaisi ba likotsi le ba bang

  • Basebetsi ba hloka ho etsa tlhahlobo ea semmuso ea kotsi ho khotsofatsa litlhoko tsa PCI-DSS

  • Litheknoloji tsa Theknoloji ea Tlhahisoleseling tse batlang ho eketsa tsebo ea bona ka cybersecurity

Cyber Quote 3.png
Cyber Quote 29.png
Cyber Quote 23.png