Final Exam: Mitigating Security Risks

IT Security    |    Intermediate
  • 1 Video | 15m 32s
  • Includes Assessment
  • Earns a Badge
Final Exam: Mitigating Security Risks will test your knowledge and application of the topics presented throughout the Mitigating Security Risks track of the Skillsoft Aspire Security Essentials for Decision Makers and Leaders Journey.

WHAT YOU WILL LEARN

  • compare and contrast the security risk of WFH and hybrid workplace
    Compare Business Continuity and Disaster Recovery
    define an emergency action plan
    define an incident
    define a secure workplace
    define Incident Response Plan as the third step in BCP
    describe defense-in-depth
    describe the guidelines for conducting effective security training and security awareness building activities for employees
    describe the guidelines to encourage employees to actively participate in maintaining the security
    describe the ISO 27017 Cloud security principles to consider when formulating a Cloud security risk management plan
    describe the layers of physical security that can prevent a physical security risk
    describe the methods to handle backdoor attacks
    describe the methods to handle zero-day vulnerabilities
    describe the methods used in effective reporting of security health
    describe the network vulnerabilities that can turn into threats
  • describe the role of access control in securing data
    describe the role of effective communication and stakeholder engagement in managing security risks from internal stakeholders
    describe the signs of security governance
    describe the threats to information security principles
    illustrate using an example how to draft an Emergency Action plan
    implement the internal and perimeter security controls
    list the benefits of security governance
    list the best practices and guidelines to adopt for secure data management
    list the principles of social engineering attacks (Authority, Intimidation, Consensus, Scarcity, Urgency, Familiarity, Trust)
    list the steps in Business Continuity Planning
    list the steps in the incident management process
    list the tools that can be used for network security keeping monitoring, detection, and logging in context
    list the Types of IT Governance Frameworks
    list the types of social engineering attacks
    recognize the security concerns for an organization when its employees work in a hybrid workplace

IN THIS COURSE

  • Playable
    1. 
    Mitigating Security Risks
    33s
    UP NEXT

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 7 Likes 7  
Likes 1 Likes 1  
Likes 3 Likes 3