CompTIA Cybersecurity Analyst+: Security Frameworks & Security Controls

Cyber Security    |    Intermediate
  • 16 videos | 57m 3s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 102 users Rating 4.6 of 102 users (102)
Applying security best practices to IT system creation and deployment can go a long way in reducing the attack surface. Explore the security frameworks on which security control countermeasure are based.

WHAT YOU WILL LEARN

  • Explain how proper it governance results in secured it resources
    Recognize how regulatory compliance can influence security controls
    Apply nist's cybersecurity framework to your digital assets
    Apply iso security standards to harden your environment
    Recognize how the togaf enterprise it architecture can increase efficiency of security controls
    Recognize how to assess risk and apply effective security controls to mitigate that risk
    Recognize how to apply itil to increase the efficiency of it service delivery
    Identify physical security controls
  • Identify logical security controls
    Configure router acl rules to block icmp traffic
    Identify administrative security controls
    Identify compensating security controls
    Recognize the importance of continuous monitoring
    Explain how firmware must be accredited before universal trust is established
    Identify factors related to conducting penetration tests
    List categories of security controls and threat mitigations

IN THIS COURSE

  • 3m 1s
    After completing this video, you will be able to explain how proper IT governance results in secured IT resources. FREE ACCESS
  • 3m 43s
    After completing this video, you will be able to recognize how compliance with regulations can influence security controls. FREE ACCESS
  • Locked
    3.  NIST
    3m 4s
    Find out how to apply NIST's Cybersecurity Framework to your digital assets. FREE ACCESS
  • Locked
    4.  ISO
    3m 13s
    During this video, you will learn how to apply ISO security standards to secure your environment. FREE ACCESS
  • Locked
    5.  TOGAF®
    4m 32s
    Upon completion of this video, you will be able to recognize how the TOGAF enterprise IT architecture can increase the efficiency of security controls. FREE ACCESS
  • Locked
    6.  SABSA
    3m 54s
    Upon completion of this video, you will be able to recognize how to assess risk and apply effective security controls to mitigate that risk. FREE ACCESS
  • Locked
    7.  ITIL
    2m 56s
    After completing this video, you will be able to recognize how to apply ITIL to increase the efficiency of IT service delivery. FREE ACCESS
  • Locked
    8.  Physical Controls
    3m 46s
    Learn how to identify physical security controls. FREE ACCESS
  • Locked
    9.  Logical Controls
    3m 18s
    To identify logical security controls, consult a security specialist or look for information online. FREE ACCESS
  • Locked
    10.  Configure Router ACL Rules
    4m 53s
    In this video, you will learn how to configure router ACL rules to block ICMP traffic. FREE ACCESS
  • Locked
    11.  Administrative Controls
    3m 36s
    In this video, you will learn how to identify administrative security controls. FREE ACCESS
  • Locked
    12.  Compensating Controls
    2m 32s
    Learn how to identify security controls that compensate for other controls that are not fully effective. FREE ACCESS
  • Locked
    13.  Continuous Monitoring of Controls
    2m 54s
    Upon completion of this video, you will be able to recognize the importance of continuous monitoring. FREE ACCESS
  • Locked
    14.  Hardware Trust
    4m 43s
    After completing this video, you will be able to explain how firmware must be accredited before universal trust is established. FREE ACCESS
  • Locked
    15.  Penetration Testing
    4m 30s
    In this video, learn how to identify factors related to conducting penetration tests. FREE ACCESS
  • Locked
    16.  Exercise: Mitigations and Security Control types
    2m 29s
    After completing this video, you will be able to list categories of security controls and identify threat mitigations. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 27 users Rating 4.4 of 27 users (27)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 120 users Rating 4.6 of 120 users (120)
Rating 4.5 of 164 users Rating 4.5 of 164 users (164)
Rating 4.4 of 4719 users Rating 4.4 of 4719 users (4719)