Cybersecurity Awareness and Threat Vectors
Cybersecurity
| Beginner
- 20 videos | 42m 24s
- Includes Assessment
- Earns a Badge
Cybersecurity is often defined as the protection of computer systems and networks from unauthorized or unwanted information disclosure, theft or damage. In this course, explore the potential impacts of a personal or business security breach, and discover the fundamentals of the confidentiality, integrity, and availability triad. Explore how baselining can be used to better understand an IT environment and learn to differentiate between natural, malicious human, chemical, and non-malicious threats. Explore security concerns as they relate to internal and external human activity, and discover how to identify drivers for security controls. Explore common functions and purposes of security controls and discover the importance of testing corrective controls in place. Lastly, explore how to differentiate between quantitative and qualitative risk analysis, as well as between data in motion and data at rest. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Discuss how the loss of the internet or identity theft impact your lifeDescribe the potential impact of a personal or business security breachProvide an overview of the confidentiality, integrity, and availability triadRecognize extensions of the cia triad including non-repudiation and accountabilityProvide an overview of group id's and shared accounts and how they relate to security practicesProvide of an overview of baselining an how it can be used to better understand an it environmentDiscuss whether internal personnel or external attackers are the biggest threatList security concerns as they relates to external human activityList security concerns as they relates to internal human activityProvide an overview of internal administrative controls and how they can be used to manage personnel
-
Differentiate between natural, malicious human, chemical, and non-malicious threatsDiscuss and list drivers for security controls?List common functions and purposes of security controlsRecognize the importance of testing corrective controls in placeDescribe situations in which to compensate security controlsProvide an overview of hacking and differentiate between hacking and penetration testingDiscuss who should authorize penetration testing and where should it startRecognize the benefits of performing risk management processesDifferentiate between quantitative and qualitative risk analysisDifferentiate between data in motion and data at rest
IN THIS COURSE
-
2m 10s
-
1m 22s
-
1m 24s
-
1m 33s
-
1m 2s
-
1m 38s
-
1m 25s
-
2m 32s
-
2m 26s
-
4m 54s
-
1m 35s
-
51s
-
1m 58s
-
50s
-
1m 45s
-
2m 20s
-
1m 11s
-
2m 51s
-
6m 15s
-
2m 23s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.