CompTIA Cybersecurity Analyst+: Security Frameworks & Security Controls
Cyber Security
| Intermediate
- 16 videos | 57m 3s
- Includes Assessment
- Earns a Badge
Applying security best practices to IT system creation and deployment can go a long way in reducing the attack surface. Explore the security frameworks on which security control countermeasure are based.
WHAT YOU WILL LEARN
-
Explain how proper it governance results in secured it resourcesRecognize how regulatory compliance can influence security controlsApply nist's cybersecurity framework to your digital assetsApply iso security standards to harden your environmentRecognize how the togaf enterprise it architecture can increase efficiency of security controlsRecognize how to assess risk and apply effective security controls to mitigate that riskRecognize how to apply itil to increase the efficiency of it service deliveryIdentify physical security controls
-
Identify logical security controlsConfigure router acl rules to block icmp trafficIdentify administrative security controlsIdentify compensating security controlsRecognize the importance of continuous monitoringExplain how firmware must be accredited before universal trust is establishedIdentify factors related to conducting penetration testsList categories of security controls and threat mitigations
IN THIS COURSE
-
3m 1sAfter completing this video, you will be able to explain how proper IT governance results in secured IT resources. FREE ACCESS
-
3m 43sAfter completing this video, you will be able to recognize how compliance with regulations can influence security controls. FREE ACCESS
-
3m 4sFind out how to apply NIST's Cybersecurity Framework to your digital assets. FREE ACCESS
-
3m 13sDuring this video, you will learn how to apply ISO security standards to secure your environment. FREE ACCESS
-
4m 32sUpon completion of this video, you will be able to recognize how the TOGAF enterprise IT architecture can increase the efficiency of security controls. FREE ACCESS
-
3m 54sUpon completion of this video, you will be able to recognize how to assess risk and apply effective security controls to mitigate that risk. FREE ACCESS
-
2m 56sAfter completing this video, you will be able to recognize how to apply ITIL to increase the efficiency of IT service delivery. FREE ACCESS
-
3m 46sLearn how to identify physical security controls. FREE ACCESS
-
3m 18sTo identify logical security controls, consult a security specialist or look for information online. FREE ACCESS
-
4m 53sIn this video, you will learn how to configure router ACL rules to block ICMP traffic. FREE ACCESS
-
3m 36sIn this video, you will learn how to identify administrative security controls. FREE ACCESS
-
2m 32sLearn how to identify security controls that compensate for other controls that are not fully effective. FREE ACCESS
-
2m 54sUpon completion of this video, you will be able to recognize the importance of continuous monitoring. FREE ACCESS
-
4m 43sAfter completing this video, you will be able to explain how firmware must be accredited before universal trust is established. FREE ACCESS
-
4m 30sIn this video, learn how to identify factors related to conducting penetration tests. FREE ACCESS
-
2m 29sAfter completing this video, you will be able to list categories of security controls and identify threat mitigations. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.