Certified in Cybersecurity (CC): Core Security Principles & Risk Management
(ISC)² CC
| Beginner
- 11 videos | 32m 50s
- Includes Assessment
- Earns a Badge
It is of high importance that organizations operate upon a solid foundation of security principles, concepts, and risk management. It is impossible to reduce security risk until core security and risk management principles are defined. In this course, explore the elements of the confidentiality, integrity, and availability (CIA) triad, along with the essentials of authentication and using non-repudiation services. Next, examine what risk is and the terminology surrounding risk management, threats, and vulnerability. Finally, learn about risk assessment, identification, and treatment and compare qualitative and quantitative risk analysis. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of the cia triad (confidentiality, integrity, and availability)Identify authentication essentials including something you know, have, and are with biometricsOutline the use of non-repudiation from the gdpr perspective, usually accomplished with digital signingDefine risk and identify information security risk elementsOutline risk management terminology such as assets, vulnerability, threats, likelihood, and impact
-
Assess and identify risks that are common to modern enterprisesOutline risk treatment and handling methods including acceptance, avoidance, mitigation, and transferenceDefine qualitative risk analysis methodology which is a subjective way to produce heat maps and tables for decision-makersDefine quantitative risk analysis which uses objective mathematical models for the decision-makersSummarize the key concepts covered in this course
IN THIS COURSE
-
51sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
5m 48sAfter completing this video, you will be able to provide an overview of the CIA triad (confidentiality, integrity, and availability). FREE ACCESS
-
4m 22sDuring this video, you will learn how to identify authentication essentials including something you know, have, and are with biometrics. FREE ACCESS
-
2m 11sUpon completion of this video, you will be able to outline the use of non-repudiation from the GDPR perspective, usually accomplished with digital signing. FREE ACCESS
-
3mAfter completing this video, you will be able to define risk and identify information security risk elements. FREE ACCESS
-
2m 46sUpon completion of this video, you will be able to outline risk management terminology such as assets, vulnerability, threats, likelihood, and impact. FREE ACCESS
-
3m 8sDuring this video, you will learn how to assess and identify risks that are common to modern enterprises . FREE ACCESS
-
3m 37sUpon completion of this video, you will be able to outline risk treatment and handling methods including acceptance, avoidance, mitigation, and transference. FREE ACCESS
-
3m 34sDuring this video, you will learn how to define qualitative risk analysis methodology which is a subjective way to produce heat maps and tables for decision-makers. FREE ACCESS
-
3m 3sAfter completing this video, you will be able to define quantitative risk analysis which uses objective mathematical models for the decision-makers. FREE ACCESS
-
31sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.