Cybersecurity Awareness: Exposure to Security Risks

Cybersecurity    |    Beginner
  • 11 videos | 1h 38m 42s
  • Includes Assessment
  • Earns a Badge
Likes 32 Likes 32
There are security issues everywhere. Managers must keep abreast of security risks and threats. In this course, you'll identify standard security risks and their origins. You'll also learn about more diverse types of security issues and the potential threats to an organization's security. You'll be given examples from daily life that expose us to security risks. To wrap up, you'll outline effective methods to reduce common security risks that render organizations vulnerable via different channels.


  • discover the key concepts covered in this course
    list and describe the critical information security issues -confidentiality, integrity, availability, authentication, non-repudiation, privacy, and trust
    recognize the standard security threats to an organization
    differentiate using examples what exposure, threat or risk, security attack, exploits or breach of security, and impact/severity mean
    illustrate using examples common actions from daily work-life that expose people to security risks
    recognize the importance of threat identification and describe the concepts of threat modeling and threat identification sources and methods
  • define the STRIDE model in the context of threat identification
    define the PASTA threat modeling method and its stages
    identify why and how security is everyone’s responsibility
    list different methods to reduce security risks
    summarize the key concepts covered in this course


  • 2m 4s
    In this video, you'll learn more about your instructor and this course. In this course, you'll learn about risks, threats, and security issues that exist in an organization. You will learn about security risks and their origins, and you'll learn about different types of security risks and threats you could be exposed to.  FREE ACCESS
  • 13m 47s
    In this video, you'll learn the reasons for information security issues. These include not prioritizing security for regulatory compliance, not aligning security to business objectives, not keeping your infrastructure up and running, and ignoring the risk management approach. Next, you'll look at security issue examples. Then, you will take a look at what can be impacted by a security threat. This includes confidentiality, integrity, and availability. FREE ACCESS
  • Locked
    3.  Foremost Security Threats to an Organization
    11m 40s
    In this video, you will learn to recognize the standard security threats to an organization. Basically, a threat is defined as an activity that has the potential to cause harm to a computer system. Simply put, a security threat is a malicious attempt to disrupt the operations of one or more systems.  You'll learn that the categories of security threats include human error, malicious activities, and natural disasters. The video provides examples of each.  FREE ACCESS
  • Locked
    4.  Examples of Threats, Risks, and Exposure
    6m 19s
    In this video, you will look at examples of threats, risks, and exposures. You will look at diagrams to explain these terms. Finally, the video provides you with examples of each of these.  FREE ACCESS
  • Locked
    5.  How Exposure to Security Risks Occur
    In this video, you will look at examples of risk exposures. You will learn how common actions employees perform expose organizations to risk. This includes things like using public Wi-Fi, sharing passwords, writing down passwords, clicking on unknown links, and reusing passwords.  FREE ACCESS
  • Locked
    6.  The Importance of Threat Identification
    15m 49s
    In this video, you will recognize the importance of threat identification. Threat identification is a method of determining a list of sources that may exploit a system's vulnerabilities. You will learn to ask the right questions to identify a threat and you will learn why these questions are crucial. FREE ACCESS
  • Locked
    7.  The STRIDE Model for Threat Identification
    8m 54s
    In this video, you will learn more about the STRIDE model. STRIDE is a threat modeling method that can help identify potential threats. STRIDE stands for spoofing, tampering, reputation, information disclosure, denial of service, and elevation of privileges. You will learn more about each of these.  FREE ACCESS
  • Locked
    8.  The PASTA Threat Model and Its Stages
    7m 16s
    In this video, you will learn more about the PASTA model. PASTA is a risk assessment approach focused on creating countermeasures. It stands for Process for Attack Simulation and Threat Analysis. In PASTA, stage one is defining objectives. Stage two is defining the technical scope. Stage three is applying analysis. Stage four is threat analysis. Stage five is vulnerability analysis. Stage six is attack modeling. Finally, stage seven is risk analysis.  FREE ACCESS
  • Locked
    9.  Placing Responsibility for Security
    8m 10s
    In this video, you will learn that security is everyone's responsibility. You have already learned that organizations have different security roles. However, no matter what roles exist within an organization, everyone is responsible for keeping information safe.  FREE ACCESS
  • Locked
    10.  Methods to Reduce Security Risks
    11m 25s
    In this video, you will learn methods for reducing security risks. You will learn it’s important to keep your software up-to-date. You'll also learn that antivirus applications must be installed and up-to-date. Critical data should be backed up regularly, and employees must be trained on security practices. You’ll learn about using multi-factor authentication. Finally, you’ll why managers must perform background checks when hiring new employees and perform SIEM, security information and event management event logging.  FREE ACCESS
  • Locked
    11.  Course Summary
    2m 19s
    In this video, you will summarize what you've learned in the course. You've learned about the basic concepts of security issues. You learned about security threats to an organization, examples of threats, risks, and exposures, and what happens when exposed to security risks. You also learned about the importance of threat identification. You learned the STRIDE and PASTA models, and you learned how security is everyone's responsibility. You also learned how to reduce security risks.  FREE ACCESS


Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.