Ethical Hacker: Risk Assessment

IT Security    |    Intermediate
  • 10 videos | 46m 23s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Ethical hacking is about testing the risk level of an organization. In order to perform effective, professional ethical hacking, a knowledge of risk is essential. In this 10-video course, you will discover how to use the Common Vulnerability Scoring System (CVSS) and how to apply risk management concepts and evaluate risk in accordance with common standards. Key concepts covered in this course include learning to calculate risk levels in a quantitative manner, the preliminary step done in any risk assessment; learning to identify and implement specific responses to risk assess security vulnerabilities by using CVSS; and utilizing the CIA triangle (confidentiality, integrity. and availability) and the McCumber cube to assess risks and threats. Next, learn to apply risk management standards according to NIST 800-37; evaluate security in accordance with ISO/IEC 18045; and learn the COBIT 5 standard, a widely-known standard and way of modeling risk and security. Finally, learn to use Damage, Reproducibility, Exploitability, Affected Users, Discoverability (DREAD), Process for Attack Simulation and Threat Analysis (PASTA), and other risk models.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Calculate risk levels in a quantitative manner
    Identify and implement specific responses to risk
    Assess security vulnerabilities using cvss
    Utilize the cia triangle and the mccumber cube to assess risks and threats
  • Apply risk management standards according to nist 800-37
    Evaluate security in accordance with iso/iec 18045
    Describe the cobit 5 standard
    Describe and use dread, pasta, and other risk models
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 26s
  • 6m 35s
    Learn how to calculate risk levels quantitatively. FREE ACCESS
  • Locked
    3.  Risk Responses
    7m 40s
    Find out how to identify and implement specific responses to risks. FREE ACCESS
  • Locked
    4.  Common Vulnerability Scoring System
    5m 32s
    In this video, you will learn how to assess security vulnerabilities using the Common Vulnerability Scoring System. FREE ACCESS
  • Locked
    5.  Understanding Threats
    5m 33s
    Find out how to use the CIA triangle and the McCumber cube to assess risks and threats. FREE ACCESS
  • Locked
    6.  NIST 800-37 Risk Management
    7m
    In this video, learn how to apply risk management standards according to the National Institute of Standards and Technology's 800-37. FREE ACCESS
  • Locked
    7.  ISO/IEC 18045
    3m 37s
    Find out how to evaluate security in accordance with ISO/IEC 18045. FREE ACCESS
  • Locked
    8.  COBIT
    4m 7s
    Upon completion of this video, you will be able to describe the COBIT 5 standard. FREE ACCESS
  • Locked
    9.  Risk Models
    3m 50s
    After completing this video, you will be able to describe and use DREAD, PASTA, and other risk models. FREE ACCESS
  • Locked
    10.  Course Summary
    1m 5s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 215 users Rating 4.6 of 215 users (215)
Rating 4.6 of 102 users Rating 4.6 of 102 users (102)
Rating 4.7 of 16 users Rating 4.7 of 16 users (16)