Assessing and Mitigating Security Risks
The capacity to perform risk management is crucial for anyone hoping to defend their networks and resources. This course will teach you about risk policy, assessment, analysis, and mitigation of your networks.
What you'll learn
With so many threats and vulnerabilities in today's infrastructures, creating an impregnable framework is nearly impossible. Therefore, it is every IT security professionals' responsibility to make important decisions and take action to best safeguard data and assets. In this course, Assessing and Mitigating Security Risks, you will gain an understanding of risk management and how it can enable thoughtful and focused defense strategies. First, you will learn about the landscape, what risk assessment is, and how it can be conducted successfully. Next, you will learn about mitigation and controls. Finally, you will delve into tools and resources that can help your company get a jump start on protecting your network. When you are finished with this course, you will have the knowledge necessary to respond to incidents and mitigate those security threats.
Table of contents
- Understanding What This Course Is About 5m
- Understanding the Landscape 3m
- It's an IT issue 5m
- The Landscape: Malware 4m
- The Landscape: Ransomware 4m
- The Landscape: Mobile Devices 4m
- The Landscape: Kinetic Attacks 4m
- The Attacker's Mentality 6m
- The Attacker's Mindset 2m
- The Mindset on Social Engineering 9m
- The Mindset on Cloud Storage 5m
- The Mindset on Mobile Devices 5m
- The Mindset on Kinetic Attack Vectors 4m
- Summary 1m
- Introduction to Successful Risk Assessments 2m
- How to ID an Incident 3m
- Handling Incidents 4m
- Need for Incident Response 2m
- Goals for Incident Response 2m
- What's the Plan? 4m
- How Do We Handle It? 10m
- Training & Awareness 6m
- Managing It All 2m
- The Team 2m
- Best Practices 5m
- The Checklist 2m
- Summary 2m
- Mitigation and Controls Introduction 2m
- Authorized and Unauthorized Devices & Software 3m
- Secure Configurations: Systems 1m
- Vulnerability Assessment, Remediation, Administrative Privileges 2m
- Audit Logs & Malware 2m
- Application Security & Skill Assessment 5m
- Data Recovery & Secure Configuration: Network Devices 3m
- Boundary Defense & Data Protection 2m
- Wireless Access Control, Account Control & Monitoring 3m
- Incident Response, Management & Penetration Tests 3m
- Summary 1m