Session & Risk Management

Cybersecurity
  • 13 Videos | 1h 14m 29s
  • Includes Assessment
  • Earns a Badge
Likes 46 Likes 46
A structured approach to security allows for the efficient management of security controls. In this 13-video course, you will explore assets, threats, vulnerabilities, risk management, user security and session management, data confidentiality, and encryption. Key concepts covered in this course include how to identify, assess, and prioritize risks; how to implement security controls to mitigate risk; and learning about account management actions that secure the environment. Next, learn how to use Group Policy to implement user account hardening and configure the appropriate password security settings for those accounts in accordance with organizational security policies; learn how HTTP session management can affect security; and observe how to harden web browsers and servers to use TLS (transport layer security). Then learn how centralized mobile device control can secure the environment; learn encryption techniques used to protect data; and observe how to configure a virtual private network (VPN) to protect data in motion. Finally, learn how to configure and implement file encryption to protect data at rest; and how to configure encryption and session management settings.

WHAT YOU WILL LEARN

  • recognize digital assets that have value to the organization along with related threats
    identify and prioritize risks
    implement security controls to mitigate risk
    describe account management actions that secure the environment
    use Group Policy to implement user account hardening
    recognize how HTTP session management can affect security
  • harden web browsers and servers to use TLS
    explain how centralized mobile device control can secure the environment
    recognize encryption techniques use to protect data
    configure a VPN to protect data in motion
    configure file encryption to protect data at rest
    configure encryption and session management settings

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 29s
    UP NEXT
  • Playable
    2. 
    Asset, Threats, and Vulnerabilities
    5m 20s
  • Locked
    3. 
    Risk Management
    5m
  • Locked
    4. 
    Map Risks to Risk Treatments
    4m 11s
  • Locked
    5. 
    User Account Management
    4m 33s
  • Locked
    6. 
    Deploy User Account Security Settings
    4m 59s
  • Locked
    7. 
    HTTP Session Management
    6m 49s
  • Locked
    8. 
    Configure SSL and TLS Settings
    4m 56s
  • Locked
    9. 
    Mobile Device Access Control
    7m 5s
  • Locked
    10. 
    Data Confidentiality
    6m 4s
  • Locked
    11. 
    Implement Encryption for Data in Motion
    8m 21s
  • Locked
    12. 
    Implement Encryption for Data at Rest
    4m 34s
  • Locked
    13. 
    Exercise: Session Management and Encryption
    5m 39s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 4 Likes 4  
Likes 9 Likes 9  
Likes 9 Likes 9  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE