CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling

CEH v12    |    Intermediate
  • 3 videos | 53m 42s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
At the end of the day, cybersecurity is all about understanding risk. In this course, you'll learn about how risk pertains to cybersecurity, risk levels, and how to use a risk matrix to visualize risk. You'll also examine the concept, practice, and phases of risk management, which can help you minimize the negative effects of risk. Next, you'll explore how using Cyber Threat Intelligence is a more proactive approach towards your cybersecurity defenses and the four types of CTI. Finally, you'll learn about using threat modeling to stop threats before they become security incidents and the five steps common to the threat modeling process. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize the formula to calculate risk
    recognize the tools used to help manage risk
    recognize the actions performed during risk management
    identify the phases of risk management
    Recognize high level cti categories
  • recognize low level cti categories
    Recognize the step-in threat modeling that deals with determining the security needs of the company
    recognize the steps to threat modeling
    recognize the tasks performed in each step of threat modeling

IN THIS COURSE

  • Locked
    1.  Risk and Risk Management
    17m 45s
    After completing this video, you will be able to describe risk as it pertains to cybersecurity, recognize the risk levels, use a risk matrix to visualize risk, recognize how risk management helps to minimize the negative effects of risk, and identify the five phases of risk management. FREE ACCESS
  • Locked
    2.  Cyber Threat Intelligence
    18m
    Upon completion of this video, you will be able to recognize the four types of Cyber Threat Intelligence (CTI) and how CTI can be an effective tool for creating stronger defenses. FREE ACCESS
  • Locked
    3.  Threat Modeling
    17m 57s
    After completing this video, you will be able to describe threat modeling and the five steps common to the threat modeling process. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.6 of 68 users Rating 4.6 of 68 users (68)