Cybersecurity Awareness: Exposure to Security Risks

Cybersecurity    |    Beginner
  • 11 Videos | 1h 43m 20s
  • Includes Assessment
  • Earns a Badge
There are security issues everywhere. Managers must keep abreast of security risks and threats. In this course, you'll identify standard security risks and their origins. You'll also learn about more diverse types of security issues and the potential threats to an organization's security. You'll be given examples from daily life that expose us to security risks. To wrap up, you'll outline effective methods to reduce common security risks that render organizations vulnerable via different channels.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    list and describe the critical information security issues -confidentiality, integrity, availability, authentication, non-repudiation, privacy, and trust
    recognize the standard security threats to an organization
    differentiate using examples what exposure, threat or risk, security attack, exploits or breach of security, and impact/severity mean
    illustrate using examples common actions from daily work-life that expose people to security risks
    recognize the importance of threat identification and describe the concepts of threat modeling and threat identification sources and methods
  • define the STRIDE model in the context of threat identification
    define the PASTA threat modeling method and its stages
    identify why and how security is everyone’s responsibility
    list different methods to reduce security risks
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    2m 4s
    UP NEXT
  • Playable
    2. 
    Primary Information Security Issues
    13m 54s
  • Locked
    3. 
    Foremost Security Threats to an Organization
    11m 40s
  • Locked
    4. 
    Examples of Threats, Risks, and Exposure
    6m 19s
  • Locked
    5. 
    How Exposure to Security Risks Occur
    11m
  • Locked
    6. 
    The Importance of Threat Identification
    15m 49s
  • Locked
    7. 
    The STRIDE Model for Threat Identification
    8m 54s
  • Locked
    8. 
    The PASTA Threat Model and Its Stages
    7m 16s
  • Locked
    9. 
    Placing Responsibility for Security
    8m 10s
  • Locked
    10. 
    Methods to Reduce Security Risks
    11m 25s
  • Locked
    11. 
    Course Summary
    2m 19s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.