Cybersecurity Awareness and Threat Vectors
Cybersecurity
| Beginner
- 20 Videos | 42m 24s
- Includes Assessment
- Earns a Badge
Cybersecurity is often defined as the protection of computer systems and networks from unauthorized or unwanted information disclosure, theft or damage. In this course, explore the potential impacts of a personal or business security breach, and discover the fundamentals of the confidentiality, integrity, and availability triad. Explore how baselining can be used to better understand an IT environment and learn to differentiate between natural, malicious human, chemical, and non-malicious threats. Explore security concerns as they relate to internal and external human activity, and discover how to identify drivers for security controls. Explore common functions and purposes of security controls and discover the importance of testing corrective controls in place. Lastly, explore how to differentiate between quantitative and qualitative risk analysis, as well as between data in motion and data at rest. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
discuss how the loss of the Internet or identity theft impact your lifedescribe the potential impact of a personal or business security breachprovide an overview of the confidentiality, integrity, and availability triadrecognize extensions of the CIA triad including non-repudiation and accountabilityprovide an overview of group id's and shared accounts and how they relate to security practicesprovide of an overview of baselining an how it can be used to better understand an IT environmentdiscuss whether internal personnel or external attackers are the biggest threatlist security concerns as they relates to external human activitylist security concerns as they relates to internal human activityprovide an overview of internal administrative controls and how they can be used to manage personnel
-
differentiate between natural, malicious human, chemical, and non-malicious threatsdiscuss and list drivers for security controls?list common functions and purposes of security controlsrecognize the importance of testing corrective controls in placedescribe situations in which to compensate security controlsprovide an overview of hacking and differentiate between hacking and penetration testingdiscuss who should authorize penetration testing and where should it startrecognize the benefits of performing risk management processesdifferentiate between quantitative and qualitative risk analysisdifferentiate between data in motion and data at rest
IN THIS COURSE
-
1.The Impact of Cyber Events2m 10sUP NEXT
-
2.Importance of Cybersecurity1m 22s
-
3.Confidentiality, Integrity, and Availability1m 24s
-
4.Extension of the CIA triad1m 33s
-
5.Group IDs and Shared Accounts1m 2s
-
6.Security Baselines1m 38s
-
7.Threat Considerations1m 25s
-
8.External Human Threats2m 32s
-
9.Internal Human Threats2m 26s
-
10.Internal Administrative Controls4m 54s
-
11.Types of Threats1m 35s
-
12.Security Drivers51s
-
13.Security Controls1m 58s
-
14.Corrective Control Testing50s
-
15.Security Control Compensation1m 45s
-
16.Hacking Fundamentals2m 20s
-
17.Penetration Testing Considerations1m 11s
-
18.Risk Management2m 51s
-
19.Quantitative vs. Qualitative Risk Analysis6m 15s
-
20.Data in Motion vs. Data at Rest2m 23s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.