Mitigating Security Risks: Information, Cloud, & Data Security Risk Considerations

IT Security
  • 11 Videos | 59m 52s
  • Includes Assessment
  • Earns a Badge
To keep your organization's data secure, you need to know why your data is at risk and how to protect it using established principles and standards. In this course, you'll explore commonly used techniques to compromise data and how international best practices can help protect against these breaches. You'll start by examining three fundamental information security principles, which define information security policy and help identify risks. You'll then outline data breach methods and identify the targets of these threats. Next, you'll investigate what's meant by 'the human factor' and why it's key to any attack. You'll then study how technologies to secure data and information work under the hood. Moving on, you'll outline primary worldwide information security regulations and governance frameworks. Lastly, you'll examine why the ISO 27017 cloud security principles need to be considered when formulating a cloud security risk management plan.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe commonly used methods to compromise information security
    list three fundamental information security principles
    describe some threats to information security principles
    recognize through examples how the human factor is a key source of data theft
    state some key technologies to secure data and information
  • identify the key worldwide information security regulations and governance frameworks
    describe the need for cloud security
    describe the benefits of cloud security
    outline the ISO 27017 cloud security principles that should be considered when formulating a cloud security risk management plan
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 46s
    UP NEXT
  • Playable
    2. 
    Common Methods for Data Compromise
    8m 46s
  • Locked
    3. 
    Fundamental Information Security Principles
    5m 12s
  • Locked
    4. 
    Threats to Information Security Principles
    5m 55s
  • Locked
    5. 
    The Human Factor as a Source of Data Theft
    5m 39s
  • Locked
    6. 
    Technologies to Secure Data
    6m 48s
  • Locked
    7. 
    Security Regulations & Governance Frameworks
    4m 38s
  • Locked
    8. 
    The Need for Cloud Security
    5m 8s
  • Locked
    9. 
    Benefits of Cloud Security
    6m 15s
  • Locked
    10. 
    ISO 27017 Cloud Security Principles
    3m 57s
  • Locked
    11. 
    Course Summary
    1m 19s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.