Cybersecurity Awareness and Threat Vectors

Cybersecurity    |    Beginner
  • 20 Videos | 43m 54s
  • Includes Assessment
  • Earns a Badge
Likes 1 Likes 1
Cybersecurity is often defined as the protection of computer systems and networks from unauthorized or unwanted information disclosure, theft or damage. In this course, explore the potential impacts of a personal or business security breach, and discover the fundamentals of the confidentiality, integrity, and availability triad. Explore how baselining can be used to better understand an IT environment and learn to differentiate between natural, malicious human, chemical, and non-malicious threats. Explore security concerns as they relate to internal and external human activity, and discover how to identify drivers for security controls. Explore common functions and purposes of security controls and discover the importance of testing corrective controls in place. Lastly, explore how to differentiate between quantitative and qualitative risk analysis, as well as between data in motion and data at rest.

WHAT YOU WILL LEARN

  • discuss how the loss of the Internet or identity theft impact your life
    describe the potential impact of a personal or business security breach
    provide an overview of the confidentiality, integrity, and availability triad
    recognize extensions of the CIA triad including non-repudiation and accountability
    provide an overview of group id's and shared accounts and how they relate to security practices
    provide of an overview of baselining an how it can be used to better understand an IT environment
    discuss whether internal personnel or external attackers are the biggest threat
    list security concerns as they relates to external human activity
    list security concerns as they relates to internal human activity
    provide an overview of internal administrative controls and how they can be used to manage personnel
  • differentiate between natural, malicious human, chemical, and non-malicious threats
    discuss and list drivers for security controls?
    list common functions and purposes of security controls
    recognize the importance of testing corrective controls in place
    describe situations in which to compensate security controls
    provide an overview of hacking and differentiate between hacking and penetration testing
    discuss who should authorize penetration testing and where should it start
    recognize the benefits of performing risk management processes
    differentiate between quantitative and qualitative risk analysis
    differentiate between data in motion and data at rest

IN THIS COURSE

  • Playable
    1. 
    The Impact of Cyber Events
    2m 10s
    UP NEXT
  • Playable
    2. 
    Importance of Cybersecurity
    1m 22s
  • Locked
    3. 
    Confidentiality, Integrity, and Availability
    1m 24s
  • Locked
    4. 
    Extension of the CIA triad
    1m 33s
  • Locked
    5. 
    Group IDs and Shared Accounts
    1m 2s
  • Locked
    6. 
    Security Baselines
    1m 38s
  • Locked
    7. 
    Threat Considerations
    1m 25s
  • Locked
    8. 
    External Human Threats
    2m 32s
  • Locked
    9. 
    Internal Human Threats
    2m 26s
  • Locked
    10. 
    Internal Administrative Controls
    4m 54s
  • Locked
    11. 
    Types of Threats
    1m 35s
  • Locked
    12. 
    Security Drivers
    51s
  • Locked
    13. 
    Security Controls
    1m 58s
  • Locked
    14. 
    Corrective Control Testing
    50s
  • Locked
    15. 
    Security Control Compensation
    1m 45s
  • Locked
    16. 
    Hacking Fundamentals
    2m 20s
  • Locked
    17. 
    Penetrati