CEH v11: Risk Management, Cyber Threat Intelligence & Threat Modeling

Ethical Hacker v11    |    Intermediate
  • 4 videos | 51m 41s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 68 users Rating 4.6 of 68 users (68)
At the end of the day, cybersecurity is all about understanding risk. In this course, you'll learn about how risk pertains to cybersecurity, risk levels, and how to use a risk matrix to visualize risk. You'll also examine the concept, practice, and phases of risk management, which can help you minimize the negative effects of risk. Next, you'll explore how using Cyber Threat Intelligence is a more proactive approach towards your cybersecurity defenses and the four types of CTI. Finally, you'll learn about using threat modeling to stop threats before they become security incidents and the five steps common to the threat modeling process. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize the formula to calculate risk
    recognize the tools used to help manage risk
    Recognize the actions performed during risk management
    identify the phases of risk management
    Recognize low level cti categories
  • recognize high level cti categories
    Recognize the step in threat modeling that deals with determining the security needs of the company
    recognize the tasks performed in each step of threat modeling
    recognize the steps to threat modeling

IN THIS COURSE

  • Locked
    1.  Risk
    11m 41s
    Upon completion of this video, you will be able to recognize the tools used to help manage risk. FREE ACCESS
  • Locked
    2.  Risk Management
    11m 15s
    Learn how to identify the phases of risk management. FREE ACCESS
  • Locked
    3.  Cyber Threat Intelligence
    13m 14s
    Upon completion of this video, you will be able to recognize high-level CTI categories. FREE ACCESS
  • Locked
    4.  Threat Modeling
    15m 32s
    After completing this video, you will be able to recognize the step in threat modeling that deals with determining the security requirements of the company. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 62 users Rating 4.7 of 62 users (62)
Rating 4.8 of 30 users Rating 4.8 of 30 users (30)
Rating 4.6 of 25 users Rating 4.6 of 25 users (25)