Cybersecurity Awareness and Threat Vectors

Cybersecurity    |    Beginner
  • 20 videos | 42m 24s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 215 users Rating 4.6 of 215 users (215)
Cybersecurity is often defined as the protection of computer systems and networks from unauthorized or unwanted information disclosure, theft or damage. In this course, explore the potential impacts of a personal or business security breach, and discover the fundamentals of the confidentiality, integrity, and availability triad. Explore how baselining can be used to better understand an IT environment and learn to differentiate between natural, malicious human, chemical, and non-malicious threats. Explore security concerns as they relate to internal and external human activity, and discover how to identify drivers for security controls. Explore common functions and purposes of security controls and discover the importance of testing corrective controls in place. Lastly, explore how to differentiate between quantitative and qualitative risk analysis, as well as between data in motion and data at rest. This course was originally created by Global Knowledge (GK).

WHAT YOU WILL LEARN

  • Discuss how the loss of the internet or identity theft impact your life
    Describe the potential impact of a personal or business security breach
    Provide an overview of the confidentiality, integrity, and availability triad
    Recognize extensions of the cia triad including non-repudiation and accountability
    Provide an overview of group id's and shared accounts and how they relate to security practices
    Provide of an overview of baselining an how it can be used to better understand an it environment
    Discuss whether internal personnel or external attackers are the biggest threat
    List security concerns as they relates to external human activity
    List security concerns as they relates to internal human activity
    Provide an overview of internal administrative controls and how they can be used to manage personnel
  • Differentiate between natural, malicious human, chemical, and non-malicious threats
    Discuss and list drivers for security controls?
    List common functions and purposes of security controls
    Recognize the importance of testing corrective controls in place
    Describe situations in which to compensate security controls
    Provide an overview of hacking and differentiate between hacking and penetration testing
    Discuss who should authorize penetration testing and where should it start
    Recognize the benefits of performing risk management processes
    Differentiate between quantitative and qualitative risk analysis
    Differentiate between data in motion and data at rest

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 91 users Rating 4.6 of 91 users (91)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 182 users Rating 4.6 of 182 users (182)
Rating 4.6 of 1571 users Rating 4.6 of 1571 users (1571)
Rating 4.4 of 116 users Rating 4.4 of 116 users (116)