Certified in Cybersecurity (CC): Core Security Principles & Risk Management

(ISC)² CC    |    Beginner
  • 11 videos | 32m 50s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 266 users Rating 4.7 of 266 users (266)
It is of high importance that organizations operate upon a solid foundation of security principles, concepts, and risk management. It is impossible to reduce security risk until core security and risk management principles are defined. In this course, explore the elements of the confidentiality, integrity, and availability (CIA) triad, along with the essentials of authentication and using non-repudiation services. Next, examine what risk is and the terminology surrounding risk management, threats, and vulnerability. Finally, learn about risk assessment, identification, and treatment and compare qualitative and quantitative risk analysis. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of the cia triad (confidentiality, integrity, and availability)
    Identify authentication essentials including something you know, have, and are with biometrics
    Outline the use of non-repudiation from the gdpr perspective, usually accomplished with digital signing
    Define risk and identify information security risk elements
    Outline risk management terminology such as assets, vulnerability, threats, likelihood, and impact
  • Assess and identify risks that are common to modern enterprises
    Outline risk treatment and handling methods including acceptance, avoidance, mitigation, and transference
    Define qualitative risk analysis methodology which is a subjective way to produce heat maps and tables for decision-makers
    Define quantitative risk analysis which uses objective mathematical models for the decision-makers
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 51s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 48s
    After completing this video, you will be able to provide an overview of the CIA triad (confidentiality, integrity, and availability). FREE ACCESS
  • Locked
    3.  Authentication Essentials
    4m 22s
    During this video, you will learn how to identify authentication essentials including something you know, have, and are with biometrics. FREE ACCESS
  • Locked
    4.  Non-repudiation
    2m 11s
    Upon completion of this video, you will be able to outline the use of non-repudiation from the GDPR perspective, usually accomplished with digital signing. FREE ACCESS
  • Locked
    5.  Defining Risk
    3m
    After completing this video, you will be able to define risk and identify information security risk elements. FREE ACCESS
  • Locked
    6.  Risk Management Terminology
    2m 46s
    Upon completion of this video, you will be able to outline risk management terminology such as assets, vulnerability, threats, likelihood, and impact. FREE ACCESS
  • Locked
    7.  Risk Assessment and Identification
    3m 8s
    During this video, you will learn how to assess and identify risks that are common to modern enterprises . FREE ACCESS
  • Locked
    8.  Risk Treatment
    3m 37s
    Upon completion of this video, you will be able to outline risk treatment and handling methods including acceptance, avoidance, mitigation, and transference. FREE ACCESS
  • Locked
    9.  Qualitative Risk Analysis
    3m 34s
    During this video, you will learn how to define qualitative risk analysis methodology which is a subjective way to produce heat maps and tables for decision-makers. FREE ACCESS
  • Locked
    10.  Quantitative Risk Analysis
    3m 3s
    After completing this video, you will be able to define quantitative risk analysis which uses objective mathematical models for the decision-makers. FREE ACCESS
  • Locked
    11.  Course Summary
    31s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.6 of 215 users Rating 4.6 of 215 users (215)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 4.7 of 27 users Rating 4.7 of 27 users (27)
Rating 4.6 of 29 users Rating 4.6 of 29 users (29)