Mitigating Security Risks: Managing Information, Cloud, & Data Security Risks

IT Security
  • 17 Videos | 1h 36m 26s
  • Includes Assessment
  • Earns a Badge
To lead security-related decisions in the right direction, those in specific job roles need to have a solid comprehension of the guidelines, measures, and best practices for effective security risk management. In this course, you'll learn how to manage various types of risks, including those related to information, cloud, and data. You'll explore key countermeasures to safeguard information and data both on-premises and in the cloud. You'll also examine best practices for cloud security, data management, access control, and backup. Additionally, you'll outline common security risk scenarios and the best ways to protect data and information, including from unintentional exposure. Lastly, you'll study how to use data science and AI to detect security threats.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe the role of security controls in managing risks
    describe the security control categories and types
    define what's meant by the information security approach, Defense in Depth
    list and categorize key countermeasures for managing risks
    outline the guidelines and best practices for ensuring information is secure
    outline the guidelines and best practices for implementing security measures against common cloud security risks
    describe the role of access control in securing data and list some common types of access control
    list the best practices and guidelines to adopt for making sure data is managed securely
  • describe the role of digital signatures in securing information
    define what's meant by data backup and list some backup types
    describe why data backup is needed
    list the best practices and guidelines for backing up data
    outline how unintentional data exposure happens and name some keys reasons why it happens
    outline best practices for protecting data and information using common security risk scenarios
    recognize how to use data science and AI to detect emerging security threats
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 45s
    UP NEXT
  • Playable
    2. 
    The Role of Security Controls in Risk Management
    8m 11s
  • Locked
    3. 
    Security Control Categories and Types
    8m 50s
  • Locked
    4. 
    How Defense in Depth Works
    6m 3s
  • Locked
    5. 
    Key Countermeasures for Security Risks
    2m 34s
  • Locked
    6. 
    Best Practices for Ensuring Information Security
    6m 51s
  • Locked
    7. 
    Best Practices for Cloud Security
    6m 35s
  • Locked
    8. 
    Access Control for Securing Data
    4m 15s
  • Locked
    9. 
    Secure Data Management Best Practices
    4m 15s
  • Locked
    10. 
    Digital Signatures for Securing Information
    4m 51s
  • Locked
    11. 
    The Role of Data Backup
    7m 31s
  • Locked
    12. 
    The Need for Data Backup
    4m 8s
  • Locked
    13. 
    Best Practices for Data Backup
    4m 33s
  • Locked
    14. 
    Unintentional Data Exposure
    7m 18s
  • Locked
    15. 
    Information and Data Protection Best Practices
    4m 1s
  • Locked
    16. 
    Data Science and AI for Security
    5m 45s
  • Locked
    17. 
    Course Summary
    1m 29s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE