Cybersecurity Awareness: Exposure to Security Risks
Cybersecurity
| Beginner
- 11 videos | 1h 38m 42s
- Includes Assessment
- Earns a Badge
There are security issues everywhere. Managers must keep abreast of security risks and threats. In this course, you'll identify standard security risks and their origins. You'll also learn about more diverse types of security issues and the potential threats to an organization's security. You'll be given examples from daily life that expose us to security risks. To wrap up, you'll outline effective methods to reduce common security risks that render organizations vulnerable via different channels.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseList and describe the critical information security issues -confidentiality, integrity, availability, authentication, non-repudiation, privacy, and trustRecognize the standard security threats to an organizationDifferentiate using examples what exposure, threat or risk, security attack, exploits or breach of security, and impact/severity meanIllustrate using examples common actions from daily work-life that expose people to security risksRecognize the importance of threat identification and describe the concepts of threat modeling and threat identification sources and methods
-
Define the stride model in the context of threat identificationDefine the pasta threat modeling method and its stagesIdentify why and how security is everyone’s responsibilityList different methods to reduce security risksSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 4sIn this video, you'll learn more about your instructor and this course. In this course, you'll learn about risks, threats, and security issues that exist in an organization. You will learn about security risks and their origins, and you'll learn about different types of security risks and threats you could be exposed to. FREE ACCESS
-
13m 47sIn this video, you'll learn the reasons for information security issues. These include not prioritizing security for regulatory compliance, not aligning security to business objectives, not keeping your infrastructure up and running, and ignoring the risk management approach. Next, you'll look at security issue examples. Then, you will take a look at what can be impacted by a security threat. This includes confidentiality, integrity, and availability. FREE ACCESS
-
11m 40sIn this video, you will learn to recognize the standard security threats to an organization. Basically, a threat is defined as an activity that has the potential to cause harm to a computer system. Simply put, a security threat is a malicious attempt to disrupt the operations of one or more systems. You'll learn that the categories of security threats include human error, malicious activities, and natural disasters. The video provides examples of each. FREE ACCESS
-
6m 19sIn this video, you will look at examples of threats, risks, and exposures. You will look at diagrams to explain these terms. Finally, the video provides you with examples of each of these. FREE ACCESS
-
11mIn this video, you will look at examples of risk exposures. You will learn how common actions employees perform expose organizations to risk. This includes things like using public Wi-Fi, sharing passwords, writing down passwords, clicking on unknown links, and reusing passwords. FREE ACCESS
-
15m 49sIn this video, you will recognize the importance of threat identification. Threat identification is a method of determining a list of sources that may exploit a system's vulnerabilities. You will learn to ask the right questions to identify a threat and you will learn why these questions are crucial. FREE ACCESS
-
8m 54sIn this video, you will learn more about the STRIDE model. STRIDE is a threat modeling method that can help identify potential threats. STRIDE stands for spoofing, tampering, reputation, information disclosure, denial of service, and elevation of privileges. You will learn more about each of these. FREE ACCESS
-
7m 16sIn this video, you will learn more about the PASTA model. PASTA is a risk assessment approach focused on creating countermeasures. It stands for Process for Attack Simulation and Threat Analysis. In PASTA, stage one is defining objectives. Stage two is defining the technical scope. Stage three is applying analysis. Stage four is threat analysis. Stage five is vulnerability analysis. Stage six is attack modeling. Finally, stage seven is risk analysis. FREE ACCESS
-
8m 10sIn this video, you will learn that security is everyone's responsibility. You have already learned that organizations have different security roles. However, no matter what roles exist within an organization, everyone is responsible for keeping information safe. FREE ACCESS
-
11m 25sIn this video, you will learn methods for reducing security risks. You will learn it’s important to keep your software up-to-date. You'll also learn that antivirus applications must be installed and up-to-date. Critical data should be backed up regularly, and employees must be trained on security practices. You’ll learn about using multi-factor authentication. Finally, you’ll why managers must perform background checks when hiring new employees and perform SIEM, security information and event management event logging. FREE ACCESS
-
2m 19sIn this video, you will summarize what you've learned in the course. You've learned about the basic concepts of security issues. You learned about security threats to an organization, examples of threats, risks, and exposures, and what happens when exposed to security risks. You also learned about the importance of threat identification. You learned the STRIDE and PASTA models, and you learned how security is everyone's responsibility. You also learned how to reduce security risks. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.