Session & Risk Management
Cybersecurity
| Intermediate
- 13 Videos | 1h 8m 59s
- Includes Assessment
- Earns a Badge
A structured approach to security allows for the efficient management of security controls. In this 13-video course, you will explore assets, threats, vulnerabilities, risk management, user security and session management, data confidentiality, and encryption. Key concepts covered in this course include how to identify, assess, and prioritize risks; how to implement security controls to mitigate risk; and learning about account management actions that secure the environment. Next, learn how to use Group Policy to implement user account hardening and configure the appropriate password security settings for those accounts in accordance with organizational security policies; learn how HTTP session management can affect security; and observe how to harden web browsers and servers to use TLS (transport layer security). Then learn how centralized mobile device control can secure the environment; learn encryption techniques used to protect data; and observe how to configure a virtual private network (VPN) to protect data in motion. Finally, learn how to configure and implement file encryption to protect data at rest; and how to configure encryption and session management settings.
WHAT YOU WILL LEARN
-
recognize digital assets that have value to the organization along with related threatsidentify and prioritize risksimplement security controls to mitigate riskdescribe account management actions that secure the environmentuse Group Policy to implement user account hardeningrecognize how HTTP session management can affect security
-
harden web browsers and servers to use TLSexplain how centralized mobile device control can secure the environmentrecognize encryption techniques use to protect dataconfigure a VPN to protect data in motionconfigure file encryption to protect data at restconfigure encryption and session management settings
IN THIS COURSE
-
1.Course Overview1m 29sUP NEXT
-
2.Asset, Threats, and Vulnerabilities5m 20s
-
3.Risk Management5m
-
4.Map Risks to Risk Treatments4m 11s
-
5.User Account Management4m 33s
-
6.Deploy User Account Security Settings4m 59s
-
7.HTTP Session Management6m 49s
-
8.Configure SSL and TLS Settings4m 56s
-
9.Mobile Device Access Control7m 5s
-
10.Data Confidentiality6m 4s
-
11.Implement Encryption for Data in Motion8m 21s
-
12.Implement Encryption for Data at Rest4m 34s
-
13.Exercise: Session Management and Encryption5m 39s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.