Security Management: A Case Study
Security management encompasses a number of verticals, dealing with the day to day, developing programs, maintaining compliance and managing risk. This course covers what's important when starting up a cyber-security initiative.
What you'll learn
Implementing a security program can be a daunting task. There are a lot of pieces to the puzzle that must be addressed ranging from knowing what assets and data you want to protect, assessing vulnerabilities, threats and risk, to developing budgets and maintaining compliance. In this course, Security Management: A Case Study, you'll learn about defining goals, regulatory and compliance objectives, and determining risk. First, you'll review the key elements to developing a business case needed for funding a security program. Next, you'll look at defining metrics and showing ROI. Finally, you'll put the information learned throughout the Security Management Path into context When you’re finished with this course, you will have the proper context for the many skills and topics covered throughout the security management path.
Table of contents
- Purpose of This Course 3m
- What's in Scope for This Course? 3m
- The New CEO and Things to Consider 1m
- Taking Inventory 2m
- Business Outcomes Drive Technology Decisions 1m
- Taking a Phased Approach 1m
- Identify Most Critical and Work Down 2m
- Process Should Be Focused on Security 2m
- Capability Maturity Model 2m
- Risk Tolerance 1m
- Training 1m
- Privacy and Data Security Compliance Challenges 5m
- Regulatory Examples 2m
- Introduction 1m
- Where to Start 2m
- Where to Focus 2m
- Wired Brain Coffee's Infrastructure 1m
- Getting the Right Visibility 1m
- Business Impact Analysis 1m
- Assessing Risk and Vulnerability Types 3m
- Assessing Wired Brain Coffee's Risks 3m
- Risk Management and Common Frameworks 2m
- Essentials of Testing 2m
- Compliance Accountability 2m
- Data Classification 2m
- Creating the Culture of Compliance 2m
- Introduction 1m
- Risk Assessments 1m
- Risk Assessment Frameworks, Colocation, and Hybrid Cloud Security 3m
- Gathering and Correlating Information 2m
- Where and How Intelligence Adds Value 1m
- Establishing the Business Case 1m
- Elements of WBC's Business Case 2m
- Business Case Example and ROI 2m
- Establishing Metrics and Showing Value 2m