Persiapan Ujian Sertifikasi Foresec Certified Network Security (FCNS) STMIK AMIKOM Purwokerto

Materi :

chapter 1

chapter 2

Chapter 3

Chapter 4

chapter 5

chapter 6

Chapter 7

Chapter 8

Chapter 9

 

Contoh Soal :

1-Post-Class_Quiz-Answer-2

2-Post-Class_Quiz-Answers

4-Post-Class_Quiz-Answers

9-Post-Class_Quiz-Answers-2

10-Post-Class_Quiz-Answers

Advertisements

FCNS – 9. Law and Ethics

In this chapter readers will learn to identify major national and international laws that relate to the practice of information security as well as come to understand the role of culture as it applies to ethics in information security.

In this material :

  1. Law and Ethics in Information Security
  2. The Legal Environment
  3. Ethical Concepts in Information Security
  4. Certifications and Professional Organizations
  5. Key U.S. Federal Agencies
  6. Organizational Liability and the Need for Counsel

Materi Download : 9. Law and Ethics
UU ITE Download : UNDANG-UNDANG REPUBLIK INDONESIA NOMOR 11 TAHUN 2008 TENTANG INFORMASI DAN TRANSAKSI ELEKTRONIK

FCNS – 8. Risk Management: Assessing and Controlling Risk

The eighth chapter of the text presents essential risk mitigation strategy options and opens the discussion of how to control risk.
This will include identifying risk control classification categories, using existing conceptual frameworks to evaluate risk controls, and formulating a cost benefit analysis.
Readers will learn how to maintain and perpetuate risk controls.
As a method to contrast the approach presented in the earlier parts of the chapter, the OCTAVE approach to managing risk is introduced.

Yang akan dibahas :

  1. Risk Control Strategies
  2. Risk Control Strategy Selection
  3. Feasibility Studies and Cost Benefit Analysis
  4. Risk Management Discussion Points
  5. Recommended Risk Control Practices

Materi Download : 8. Risk Management: Assessing and Controlling Risk

FCNS – 7. Risk Management: Identifying and Assessing Risk

Define risk management and its role in the organization
Begin using risk management techniques to identify and prioritize risk factors for information assets
Assess risk based on the likelihood of adverse events and the effects on information assets when events occur
Begin to document the results of risk identification

Download Materi : 7. Risk Management: Identifying and Assessing Risk

FCNS – 6. Security Management Models and Practices

In this chapter, readers will learn the components of the dominant information security management models, including :

  • U.S. government-sanctioned models, and how to customize them for a specific organization’s needs.
  • This knowledge will be extended as readers learn how to implement the fundamental elements of key information security management practices and gain an understanding of emerging trends in the certification and accreditation of U.S. federal IT systems.

There are :

  • Security Management Models
  • The Human Firewall Council recommends:
  • Security Management Practices
  • Emerging Trends in Certification and Accreditation

Download : 6. Security Management Models and Practices