Information Security Practices: Multi-year InfoSec Planning

InfoSec 2023    |    Beginner
  • 15 videos | 1h 17m 5s
  • Includes Assessment
  • Earns a Badge
Rating 4.0 of 7 users Rating 4.0 of 7 users (7)
There is no easy way to predict the future of information security. There are however strategies leaders can implement to better plan and prepare for future growth, security, and threats. In this course, examine potential information security threats, how complexity makes them challenging to predict and plan for, and the threats that ransomware, cybercrime, and the growing crime-as-a-service (CaaS) community pose. Next, discover how work shortages and voids created by skills gaps can cause major issues and the impact of recent global pandemics. Finally, explore operational technology, application container risks, and the evolving risks posed by artificial intelligence and machine learning. Upon completion, you'll be able to plan for the future as an InfoSec leader.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify potential information security threats and how complexity is making it challenging to predict and plan for
    List potential security technology predictions to plan for in the future
    Recognize how ransomware attacks will likely continue to increase
    Outline how to prepare for future cybercrime attacks
    Identify the threats posed by the ever-growing crime-as-a-service (caas) community
    Recognize the potential for future work shortages and voids created by skills gaps
    State how recent pandemics have impacted information security and how to prepare for future ones
  • Identify potential attacks on operational technology
    Outline how hijackers are likely to target application containers in the future
    Recognize the potential for internal cyber-related threats
    Identify how trend analysis is being used to determine the probability of threats
    Outline the evolving risks posed by artificial intelligence
    Identify the growing risks posed by machine learning
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 11s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 49s
    Upon completion of this video, you will be able to identify potential information security threats and how complexity is making it challenging to predict and plan for. FREE ACCESS
  • Locked
    3.  Security Technology Predictions
    4m 43s
    After completing this video, you will be able to list potential security technology predictions to plan for in the future. FREE ACCESS
  • Locked
    4.  Ransomware Attacks
    8m 5s
    In this video, you will recognize how ransomware attacks will likely continue to increase. FREE ACCESS
  • Locked
    5.  Cybercrime Attack Preparation
    8m 1s
    In this video, we will outline how to prepare for future cybercrime attacks. FREE ACCESS
  • Locked
    6.  Crime-as-a-Service (CaaS)
    6m 38s
    Upon completion of this video, you will be able to identify the threats posed by the ever-growing crime-as-a-service (CaaS) community. FREE ACCESS
  • Locked
    7.  Skills Gaps and Work Shortages
    5m 31s
    In this video, you will recognize the potential for future work shortages and voids created by skills gaps. FREE ACCESS
  • Locked
    8.  Global Pandemics
    8m 15s
    After completing this video, you will be able to state how recent pandemics have impacted information security and how to prepare for future ones. FREE ACCESS
  • Locked
    9.  Operational Technology Risks
    4m 17s
    Upon completion of this video, you will be able to identify potential attacks on operational technology. FREE ACCESS
  • Locked
    10.  Application Container Risks
    4m 50s
    In this video, we will outline how hijackers are likely to target application containers in the future. FREE ACCESS
  • Locked
    11.  Internal Cyber Threats
    5m 3s
    After completing this video, you will be able to recognize the potential for internal cyber-related threats. FREE ACCESS
  • Locked
    12.  Trend Analysis
    5m 55s
    In this video, you will identify how trend analysis is being used to determine the probability of threats. FREE ACCESS
  • Locked
    13.  Artificial Intelligence
    3m 27s
    Upon completion of this video, you will be able to outline the evolving risks posed by artificial intelligence. FREE ACCESS
  • Locked
    14.  Machine Learning
    4m 33s
    After completing this video, you will be able to identify the growing risks posed by machine learning. FREE ACCESS
  • Locked
    15.  Course Summary
    46s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 4.7 of 3 users Rating 4.7 of 3 users (3)
Rating 4.4 of 231 users Rating 4.4 of 231 users (231)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 2070 users Rating 4.4 of 2070 users (2070)
Rating 4.5 of 2 users Rating 4.5 of 2 users (2)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)