Final Exam: Mitigating Security Risks
IT Security | Intermediate
- 1 Video | 15m 32s
- Includes Assessment
- Earns a Badge
Final Exam: Mitigating Security Risks will test your knowledge and application of the topics presented throughout the Mitigating Security Risks track of the Skillsoft Aspire Security Essentials for Decision Makers and Leaders Journey.
WHAT YOU WILL LEARN
compare and contrast the security risk of WFH and hybrid workplaceCompare Business Continuity and Disaster Recoverydefine an emergency action plandefine an incidentdefine a secure workplacedefine Incident Response Plan as the third step in BCPdescribe defense-in-depthdescribe the guidelines for conducting effective security training and security awareness building activities for employeesdescribe the guidelines to encourage employees to actively participate in maintaining the securitydescribe the ISO 27017 Cloud security principles to consider when formulating a Cloud security risk management plandescribe the layers of physical security that can prevent a physical security riskdescribe the methods to handle backdoor attacksdescribe the methods to handle zero-day vulnerabilitiesdescribe the methods used in effective reporting of security healthdescribe the network vulnerabilities that can turn into threats
describe the role of access control in securing datadescribe the role of effective communication and stakeholder engagement in managing security risks from internal stakeholdersdescribe the signs of security governancedescribe the threats to information security principlesillustrate using an example how to draft an Emergency Action planimplement the internal and perimeter security controlslist the benefits of security governancelist the best practices and guidelines to adopt for secure data managementlist the principles of social engineering attacks (Authority, Intimidation, Consensus, Scarcity, Urgency, Familiarity, Trust)list the steps in Business Continuity Planninglist the steps in the incident management processlist the tools that can be used for network security keeping monitoring, detection, and logging in contextlist the Types of IT Governance Frameworkslist the types of social engineering attacksrecognize the security concerns for an organization when its employees work in a hybrid workplace
IN THIS COURSE
1.Mitigating Security Risks33sUP NEXT
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.