Featured

Intrusion Detection System (IDS) - Detective controls examples



Published
Watch full video -
Preventive, Detective & Corrective controls | Administrative, Physical & Technical measures
https://youtu.be/9iT-PwvhNWs

Topmost videos which you canot miss –

• Change Management: Ultimate step by step Guide for Auditors | Emergency vs Normal Change explained - https://youtu.be/H06O925j08w

• Access Control Models: Why cannot Discretionary Access Control override Mandatory Access Control? - https://youtu.be/kLGROzRAMlE

• Risk Management explained with real life examples. Risk Assessment and Risk Evaluation on 5X5 matrix - https://youtu.be/qxahneVJbcY

• Understanding Identification, Authentication, and Authorization in Security | - https://youtu.be/vVN5YjU0eBw

• Risk Appetite vs Risk Tolerance vs Risk Capacity | Differences explained with examples. Watch now - https://youtu.be/8kqBlXIHcLQ

• Demilitarized zone DMZ in Network Security | Role of Firewall in routing traffic | DMZ vs Extranet - https://youtu.be/OgfEK7R9uwk

• How I cleared my CRISC? ISACA CRISC Exam Success Tips: Domains, Strategy and Resources - https://youtu.be/V287mfjLBP0


• Three lines of Defense model | Risk Governance and Risk Management within three lines of defense
Category
Management
Be the first to comment