CompTIA Cybersecurity Analyst+: Managing Risk

Cybersecurity    |    Intermediate
  • 14 videos | 1h 19m 4s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Risk is inevitable when relying on IT systems to manage data. Cybersecurity analysts can apply a variety of techniques to manage risk to an acceptable level. In this course, explore how risk management can minimize the impact of IT security events and discuss the relevance of recurring risk assessments and the use of a risk register. You will then consider risk treatments such as risk avoidance and risk transfer. Next, discover how to calculate the annual loss expectancy (ALE) and how this compares to the cost of security controls. Explore security control types such as preventative and compensating controls. Finally, you will look at how configuration management relates to IT security, how to establish security baselines and replicate cloud storage, and how to back up data to the cloud. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline how risk management can improve business operations including minimizing residual risk
    Identify the most relevant risks and record them in a risk register
    Determine when residual risk is acceptable
    Determine how risk avoidance fits into the corporate risk appetite
    Identify when risk should be outsourced to other parties
    Recognize how risk cannot always entirely be eliminated
  • Outline how the annual loss expectancy (ale) is calculated and how it compares to the cost of it security controls
    Identify the types of security control
    Define enterprise configuration management procedures and terms such as configuration management system (cms), configuration management database (cmdb), an configuration item (ci)
    Recognize which factors influence the crafting of various security baselines
    Enable microsoft azure storage account replication
    Register a windows server with microsoft azure for backup
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 17s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 9s
    After completing this video, you will be able to outline how risk management can improve business operations including minimizing residual risk. FREE ACCESS
  • Locked
    3.  Risk Assessments
    5m 57s
    Upon completion of this video, you will be able to identify the most relevant risks and record them in a risk register. FREE ACCESS
  • Locked
    4.  Risk Acceptance
    5m 42s
    After completing this video, you will be able to determine when residual risk is acceptable. FREE ACCESS
  • Locked
    5.  Risk Avoidance
    5m 14s
    Upon completion of this video, you will be able to determine how risk avoidance fits into the corporate risk appetite. FREE ACCESS
  • Locked
    6.  Risk Transfer
    6m 46s
    After completing this video, you will be able to identify when risk should be outsourced to other parties. FREE ACCESS
  • Locked
    7.  Risk Reduction
    7m 27s
    Upon completion of this video, you will be able to recognize how risk cannot always entirely be eliminated. FREE ACCESS
  • Locked
    8.  Annual Loss Expectancy (ALE)
    5m 43s
    After completing this video, you will be able to outline how the annual loss expectancy (ALE) is calculated and how it compares to the cost of IT security controls. FREE ACCESS
  • Locked
    9.  Security Control Types
    7m 9s
    Upon completion of this video, you will be able to identify the types of security control. FREE ACCESS
  • Locked
    10.  Configuration Management
    5m 54s
    After completing this video, you will be able to define enterprise configuration management procedures and terms such as configuration management system (CMS), configuration management database (CMDB), and configuration item (CI). FREE ACCESS
  • Locked
    11.  Establish Security Baselines
    6m 28s
    Upon completion of this video, you will be able to recognize which factors influence the crafting of various security baselines. FREE ACCESS
  • Locked
    12.  Enabling Cloud Storage Replication
    6m 4s
    Learn how to enable Microsoft Azure storage account replication. FREE ACCESS
  • Locked
    13.  Backing Up to the Cloud
    7m 17s
    Find out how to register a Windows Server with Microsoft Azure for backup. FREE ACCESS
  • Locked
    14.  Course Summary
    58s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)