Certified in Cybersecurity (CC): Security Best Practices & Security Awareness

Cybersecurity    |    Beginner
  • 8 videos | 24m 42s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 29 users Rating 4.6 of 29 users (29)
A mature and successful organization will follow guidance and best practices to better secure all resources. Stakeholders at every level must understand their roles and responsibilities for contributing to a secure environment. In this course, the learner will begin by exploring common security policies, including acceptable use policies (AUPs) and remote access policies. You will then review the processes of configuration and change management. Finally, you will explore security awareness programs and topics, and the security awareness training life cycle. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Compare common security policies such as acceptable use policy (aup) and remote access policy
    Outline the configuration management practice including configuration management databases
    Outline the change management practice for standard, normal, and emergency changes as well as patch management
  • Define security awareness and recognize the critical need for global participation of all stakeholders
    Recognize common awareness training topics including anti-phishing campaigns and no tailgating policies
    Outline the security training life cycle and modalities including phases and techniques for training delivery
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 44s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 15s
    After completing this video, you will be able to compare common security policies such as acceptable use policy (AUP) and remote access policy. FREE ACCESS
  • Locked
    3.  Configuration Management
    2m 56s
    Upon completion of this video, you will be able to outline the configuration management practice including configuration management databases. FREE ACCESS
  • Locked
    4.  Change Management
    5m 46s
    After completing this video, you will be able to outline the change management practice for standard, normal, and emergency changes as well as patch management. FREE ACCESS
  • Locked
    5.  Overview of Security Awareness
    2m 22s
    During this video, you will learn how to define security awareness and recognize the critical need for global participation of all stakeholders. FREE ACCESS
  • Locked
    6.  Common Awareness Training Topics
    2m 46s
    Upon completion of this video, you will be able to recognize common awareness training topics including anti-phishing campaigns and no tailgating policies. FREE ACCESS
  • Locked
    7.  Security Awareness Training Life Cycle
    2m 36s
    After completing this video, you will be able to outline the security training life cycle and modalities including phases and techniques for training delivery. FREE ACCESS
  • Locked
    8.  Course Summary
    19s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 91 users Rating 4.6 of 91 users (91)
Rating 4.4 of 38 users Rating 4.4 of 38 users (38)
Rating 4.6 of 56 users Rating 4.6 of 56 users (56)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 292 users Rating 4.5 of 292 users (292)
Rating 4.6 of 91 users Rating 4.6 of 91 users (91)
Rating 4.6 of 2143 users Rating 4.6 of 2143 users (2143)