Final Exam: InfoSec Leadership
Everyone
- 1 video | 32s
- Includes Assessment
- Earns a Badge
Final Exam: InfoSec Leadership will test your knowledge and application of the topics presented throughout the InfoSec Leadership track.
WHAT YOU WILL LEARN
-
Outline common responsibilities of an infosec leader, such as security operations, fraud prevention, program management, and investigationsprovide an overview of the potential education requirements of an infosec leaderdescribe how common backgrounds working in security or business management can help you become an infosec leaderoutline common leadership qualities of an infosec leader, including functional leadership, responsiveness, service delivery, and governancedescribe how good interpersonal skills help define a good security leaderdiscuss the importance of honesty and integrity in the realm of information securityrecognize the importance of gathering information and making ethical decisionsdefine the context of it riskdifferentiate between risks, threats, and vulnerabilitiesoutline common criminal threats to it systems, such as hackers, staff, breaches, theft, and frauddiscuss risks enabled by natural disasters such as fires, tornados, and floodingdifferentiate between quantitative and qualitative risk analysisprovide an overview of vulnerability assessment tools and describe how they can be used to scan for known security flaws or bugsdescribe how penetration testing can be used to evaluate it security and identify vulnerabilitiesdefine crises and discuss crisis management practicesdiscuss key components of an organizational crisis readiness program, including planning, training, technology, tools, and continuous improvementprovide an overview of security incidentsoutline the roles and responsibilities of a crisis management teamprovide an overview of the incident response planning and how it can help organizations better respond to critical incidentsoutline aspects of the first step of the incident response
-
describe how to best determine a solution to eradicate incidentsdefine what an information security plans are and describe how it can offer economic benefits and can provide a competitive advantagediscuss the importance of performing an evaluation of security risks, threats, and vulnerabilitiesidentify potential security features and protective measures to optimize securitydiscuss how to plan for resiliency through detection, response, and recoveryoutline how data classification planning can help restrict and categorize data by type, sensitivity, and business valuedescribe how to establish an information security compliance planrecognize the importance of disaster recovery and incident management planningdiscuss some of the major considerations and misconceptions when considering outsourcing information securitydefine security vendors and list common related services they offerdiscuss the typical lifecycle of a vendor relationshipprovide an overview of vendor risk management and discuss how it can be used to deal with the monitoring and management of risks resulting from third-party vendors and their related products and servicesrecognize best practices to follow for vendor risk managementlist common information security vendors to considerdiscuss potential information security threats and how complexity is making it challenging to predict and plan forlist potential security technology predictions to plan for in the futurediscuss how ransomware attacks will likely continue to increaseoutline how to prepare for future cybercrime attacksprovide an overview of the threats posed by the ever-growing crime-as-a-service (caas) communityrecognize the potential for future work shortages and voids created by skills gaps
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.