Fundamentals of information security methodologies
·34 words·1 min
Table of Contents
M2SSIC @ University of Lorraine
Course material>
Course material
Parts | Slides |
---|---|
Part 1 | Cyber Security players - from Hackers, to CISOs and beyond |
Part 2 | Information Security Policy - THE tool for today’s (C)ISO |