Session & Risk Management

Cybersecurity    |    Intermediate
  • 13 videos | 1h 8m 59s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 178 users Rating 4.4 of 178 users (178)
A structured approach to security allows for the efficient management of security controls. In this 13-video course, you will explore assets, threats, vulnerabilities, risk management, user security and session management, data confidentiality, and encryption. Key concepts covered in this course include how to identify, assess, and prioritize risks; how to implement security controls to mitigate risk; and learning about account management actions that secure the environment. Next, learn how to use Group Policy to implement user account hardening and configure the appropriate password security settings for those accounts in accordance with organizational security policies; learn how HTTP session management can affect security; and observe how to harden web browsers and servers to use TLS (transport layer security). Then learn how centralized mobile device control can secure the environment; learn encryption techniques used to protect data; and observe how to configure a virtual private network (VPN) to protect data in motion. Finally, learn how to configure and implement file encryption to protect data at rest; and how to configure encryption and session management settings.

WHAT YOU WILL LEARN

  • Recognize digital assets that have value to the organization along with related threats
    Identify and prioritize risks
    Implement security controls to mitigate risk
    Describe account management actions that secure the environment
    Use group policy to implement user account hardening
    Recognize how http session management can affect security
  • Harden web browsers and servers to use tls
    Explain how centralized mobile device control can secure the environment
    Recognize encryption techniques use to protect data
    Configure a vpn to protect data in motion
    Configure file encryption to protect data at rest
    Configure encryption and session management settings

IN THIS COURSE

  • 1m 29s
  • 5m 20s
    After completing this video, you will be able to recognize digital assets that have value to the organization, along with related threats. FREE ACCESS
  • Locked
    3.  Risk Management
    5m
    In this video, you will identify and prioritize risks. FREE ACCESS
  • Locked
    4.  Map Risks to Risk Treatments
    4m 11s
    In this video, you will learn how to implement security controls to mitigate risk. FREE ACCESS
  • Locked
    5.  User Account Management
    4m 33s
    Upon completion of this video, you will be able to describe account management actions that secure the environment. FREE ACCESS
  • Locked
    6.  Deploy User Account Security Settings
    4m 59s
    To harden user accounts, find out how to use Group Policy. FREE ACCESS
  • Locked
    7.  HTTP Session Management
    6m 49s
    After completing this video, you will be able to recognize how HTTP session management can affect security. FREE ACCESS
  • Locked
    8.  Configure SSL and TLS Settings
    4m 56s
    In this video, learn how to harden web browsers and servers to use TLS. FREE ACCESS
  • Locked
    9.  Mobile Device Access Control
    7m 5s
    After completing this video, you will be able to explain how centralized mobile device control can secure the environment. FREE ACCESS
  • Locked
    10.  Data Confidentiality
    6m 4s
    Upon completion of this video, you will be able to recognize encryption techniques used to protect data. FREE ACCESS
  • Locked
    11.  Implement Encryption for Data in Motion
    8m 21s
    In this video, you will learn how to configure a VPN to protect data in motion. FREE ACCESS
  • Locked
    12.  Implement Encryption for Data at Rest
    4m 34s
    In this video, find out how to configure file encryption to protect data at rest. FREE ACCESS
  • Locked
    13.  Exercise: Session Management and Encryption
    5m 39s
    In this video, you will learn how to configure encryption and session management settings. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.3 of 6 users Rating 4.3 of 6 users (6)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.9 of 17 users Rating 4.9 of 17 users (17)
Rating 4.6 of 71 users Rating 4.6 of 71 users (71)
Rating 4.6 of 369 users Rating 4.6 of 369 users (369)