Ethical Hacker: Risk Assessment
IT Security
| Intermediate
- 10 videos | 46m 23s
- Includes Assessment
- Earns a Badge
Ethical hacking is about testing the risk level of an organization. In order to perform effective, professional ethical hacking, a knowledge of risk is essential. In this 10-video course, you will discover how to use the Common Vulnerability Scoring System (CVSS) and how to apply risk management concepts and evaluate risk in accordance with common standards. Key concepts covered in this course include learning to calculate risk levels in a quantitative manner, the preliminary step done in any risk assessment; learning to identify and implement specific responses to risk assess security vulnerabilities by using CVSS; and utilizing the CIA triangle (confidentiality, integrity. and availability) and the McCumber cube to assess risks and threats. Next, learn to apply risk management standards according to NIST 800-37; evaluate security in accordance with ISO/IEC 18045; and learn the COBIT 5 standard, a widely-known standard and way of modeling risk and security. Finally, learn to use Damage, Reproducibility, Exploitability, Affected Users, Discoverability (DREAD), Process for Attack Simulation and Threat Analysis (PASTA), and other risk models.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseCalculate risk levels in a quantitative mannerIdentify and implement specific responses to riskAssess security vulnerabilities using cvssUtilize the cia triangle and the mccumber cube to assess risks and threats
-
Apply risk management standards according to nist 800-37Evaluate security in accordance with iso/iec 18045Describe the cobit 5 standardDescribe and use dread, pasta, and other risk modelsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 26s
-
6m 35sLearn how to calculate risk levels quantitatively. FREE ACCESS
-
7m 40sFind out how to identify and implement specific responses to risks. FREE ACCESS
-
5m 32sIn this video, you will learn how to assess security vulnerabilities using the Common Vulnerability Scoring System. FREE ACCESS
-
5m 33sFind out how to use the CIA triangle and the McCumber cube to assess risks and threats. FREE ACCESS
-
7mIn this video, learn how to apply risk management standards according to the National Institute of Standards and Technology's 800-37. FREE ACCESS
-
3m 37sFind out how to evaluate security in accordance with ISO/IEC 18045. FREE ACCESS
-
4m 7sUpon completion of this video, you will be able to describe the COBIT 5 standard. FREE ACCESS
-
3m 50sAfter completing this video, you will be able to describe and use DREAD, PASTA, and other risk models. FREE ACCESS
-
1m 5s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.