Mitigating Security Risks: Managing Information, Cloud, & Data Security Risks

IT Security    |    Intermediate
  • 17 videos | 1h 28m 56s
  • Includes Assessment
  • Earns a Badge
To lead security-related decisions in the right direction, those in specific job roles need to have a solid comprehension of the guidelines, measures, and best practices for effective security risk management. In this course, you'll learn how to manage various types of risks, including those related to information, cloud, and data. You'll explore key countermeasures to safeguard information and data both on-premises and in the cloud. You'll also examine best practices for cloud security, data management, access control, and backup. Additionally, you'll outline common security risk scenarios and the best ways to protect data and information, including from unintentional exposure. Lastly, you'll study how to use data science and AI to detect security threats.


  • Discover the key concepts covered in this course
    Describe the role of security controls in managing risks
    Describe the security control categories and types
    Define what's meant by the information security approach, defense in depth
    List and categorize key countermeasures for managing risks
    Outline the guidelines and best practices for ensuring information is secure
    Outline the guidelines and best practices for implementing security measures against common cloud security risks
    Describe the role of access control in securing data and list some common types of access control
    List the best practices and guidelines to adopt for making sure data is managed securely
  • Describe the role of digital signatures in securing information
    Define what's meant by data backup and list some backup types
    Describe why data backup is needed
    List the best practices and guidelines for backing up data
    Outline how unintentional data exposure happens and name some keys reasons why it happens
    Outline best practices for protecting data and information using common security risk scenarios
    Recognize how to use data science and ai to detect emerging security threats
    Summarize the key concepts covered in this course


  • 1m 45s
    In this video, you’ll learn more about your instructor and the course. In this course, you’ll learn about managing various types of risks including information, cloud, and data. You’ll also learn about key countermeasures to safeguard information and data in on-premise and cloud environments. You’ll also learn best practices for information security and security of the cloud. You’ll also learn about data management and backup for securing data and about common security risk scenarios. FREE ACCESS
  • 8m 11s
    In this video, you’ll learn more about the security controls you can use for information protection and the protection of assets within the organization. You’ll also learn about the selection process of security controls. Security control is a method of protecting information and assets. Anything you have within your organization is called an asset. Some of your assets store information, which is another form of assets. All of these must be protected. FREE ACCESS
  • Locked
    3.  Security Control Categories and Types
    8m 50s
    In this video, you’ll learn more about security control categories. You’ll also learn about different types of security controls. Security controls are divided into three categories. These are administrative, technical, and physical. Administrative are procedures and policies you put in place to protect your assets. Technical controls are designed to restrict access to systems. They’re security methods to protect information and assets. Physical security controls control physical access to assets within the organization. FREE ACCESS
  • Locked
    4.  How Defense in Depth Works
    6m 3s
    In this video, you’ll learn more about defense in depth. You’ll learn defense in depth is a concept in which you have many defensive security controls implemented to protect data and applications in the network. Because the sophistication of threats is increasing every day, you must have a layer of defense known as the defense in depth. You must apply security at all levels within the network to protect your data. FREE ACCESS
  • Locked
    5.  Key Countermeasures for Security Risks
    2m 34s
    In this video, you’ll learn more about types of countermeasures. You’ll learn countermeasures are the same three categories of security controls you’ve already learned. These are administrative, technical, and physical. Here, you’ll examine the types of countermeasures you have within each category to handle security risks. In the administrative category, you have training, disaster recovery plans, recruitment policies, separation of duties, incident response plans, and security policies. FREE ACCESS
  • Locked
    6.  Best Practices for Ensuring Information Security
    6m 51s
    In this video, you’ll learn more about best practices for ensuring information security. First, you’ll learn about encrypting all confidential data. Whenever you want to secure confidentiality and integrity of data, you need to ensure you encrypt that data. Next, you’ll want to avoid opening emails from unknown senders. Then, you’ll learn more about connecting to secure wireless networks only. FREE ACCESS
  • Locked
    7.  Best Practices for Cloud Security
    6m 35s
    In this video, you’ll learn more about best practices for cloud security. First, you’ll learn to use data protection policies. No matter what kind of data you have, you must ensure you have the optimal level of data protection. You need to protect this data from security breaches, loss or theft, and from application vulnerabilities that may lead to a security breach. Next, you’ll need to encrypt confidential data in the cloud environment. FREE ACCESS
  • Locked
    8.  Access Control for Securing Data
    4m 15s
    In this video, you’ll learn more about access control and different type of access controls. First, you’ll learn what access control is. Access control is a method that allows or denies access based on certain conditions on a set of data. Access control can be implemented at the operating system, applications, or network level. Access control requires the user to first be authenticated and then authorized. FREE ACCESS
  • Locked
    9.  Secure Data Management Best Practices
    4m 15s
    In this video, you’ll learn more about Secure Data Management best practices. First, you must classify data within the organization. Different organizations have different kinds of data classification. You can define your own data classification depending on what you use. Next, you’ll want to use access control to limit access to the data. You must maintain access control to limit its access only to legitimate users. You should also enable encryption. FREE ACCESS
  • Locked
    10.  Digital Signatures for Securing Information
    4m 51s
    In this video, you’ll learn more about the Digital Signature and its relation to security. You’ll also learn what digital signatures are used for. A digital signature is an electronic signature that encrypts documents. A digital signature encrypts the document. The only two people who can open that particular document are the sender and the receiver. The concept of the digital signature is based on the public key infrastructure which uses two sets of keys. FREE ACCESS
  • Locked
    11.  The Role of Data Backup
    7m 31s
    In this video, you’ll learn more about what data backup is. You’ll also take a look at different types of data backup. Data backup is a method of copying files and folders from one location to another. Data backup is also used for archiving old files and folders that are no longer required. Data backup can also be done with the help of an application. FREE ACCESS
  • Locked
    12.  The Need for Data Backup
    4m 8s
    In this video, you’ll learn more about the need for data backup. One of the fundamental reasons you would need data backup is because you want to safeguard important files and folders. If you didn’t backup that data and accidentally deleted an important file or a folder, you would need a method of restoring it. Or, if there was a natural or man-made disaster, your systems could be destroyed, and you need that data backup. FREE ACCESS
  • Locked
    13.  Best Practices for Data Backup
    4m 33s
    In this video, you’ll learn more about best practices for data backup. The first best practice you’ll learn is the 3-2-1 backup strategy. With this strategy, at least three copies of data are created. These are three backup copies. Two should be retained locally and the third should be sent to an off-site location. You should also store backup remotely. Next, you’ll want to perform regular backups using a clearly defined backup policy. FREE ACCESS
  • Locked
    14.  Unintentional Data Exposure
    7m 18s
    In this video, you’ll learn more about unintentional data exposure. You’ll discover that in some cases, accidental or unintentional data exposure takes place when an application or an individual unintentionally exposes data. Now, in this case, nobody has attacked the organization. No security breach has taken place. But there is unintentional data exposure, and it’s the result of data not being protected properly. FREE ACCESS
  • Locked
    15.  Information and Data Protection Best Practices
    4m 1s
    In this video, you’ll learn more about data protection, what it is, and best practices for data protection. You’ll learn data protection is a method that uses practices, best practices, safeguards, and rules to protect information. There are three core principles of data protection. You must protect the confidentiality of the information. You must protect the integrity of the information. And you must protect the availability of the information. These three components comprise CIA triad. FREE ACCESS
  • Locked
    16.  Data Science and AI for Security
    5m 45s
    In this video, you’ll learn more about the role of data science and artificial intelligence or AI in security. These are necessary because threats are evolving too quickly. Because the threat actors are always coming up with new methods and new types of threats a manual intervention using traditional technology won’t stop these threats. Humans cannot possibly review all the threats that are being generated around the world today, so automatic methods are necessary. FREE ACCESS
  • Locked
    17.  Course Summary
    1m 29s
    In this video, you’ll summarize what you’ve learned in the course. In this course, you’ve covered the basic concepts of guidelines for managing information, cloud, and data security risks. You learned about security controls, defense in depth, key countermeasures for security risks, best practices for ensuring information security, and best practices for cloud security. You also learned about access control, secure data management, digital signatures, and data backups. FREE ACCESS


Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.