Final Exam: Mitigating Security Risks

IT Security    |    Intermediate
  • 1 video | 32s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 3 users Rating 4.3 of 3 users (3)
Final Exam: Mitigating Security Risks will test your knowledge and application of the topics presented throughout the Mitigating Security Risks track of the Skillsoft Aspire Security Essentials for Decision Makers and Leaders Journey.

WHAT YOU WILL LEARN

  • List the benefits of security governance
    compare and contrast the security risk of wfh and hybrid workplace
    list the principles of social engineering attacks (authority, intimidation, consensus, scarcity, urgency, familiarity, trust)
    describe the role of access control in securing data
    list the steps in the incident management process
    list the tools that can be used for network security keeping monitoring, detection, and logging in context
    describe the role of effective communication and stakeholder engagement in managing security risks from internal stakeholders
    list the steps in business continuity planning
    describe the layers of physical security that can prevent a physical security risk
    define an emergency action plan
    implement the internal and perimeter security controls
    describe the threats to information security principles
    describe the guidelines for conducting effective security training and security awareness building activities for employees
    describe the methods to handle backdoor attacks
    describe the methods used in effective reporting of security health
  • describe the methods to handle zero-day vulnerabilities
    compare business continuity and disaster recovery
    describe the iso 27017 cloud security principles to consider when formulating a cloud security risk management plan
    describe defense-in-depth
    list the types of it governance frameworks
    describe the signs of security governance
    describe the network vulnerabilities that can turn into threats
    list the best practices and guidelines to adopt for secure data management
    define incident response plan as the third step in bcp
    list the types of social engineering attacks
    define an incident
    recognize the security concerns for an organization when its employees work in a hybrid workplace
    illustrate using an example how to draft an emergency action plan
    define a secure workplace
    describe the guidelines to encourage employees to actively participate in maintaining the security

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Rating 4.6 of 91 users Rating 4.6 of 91 users (91)
Rating 4.6 of 14 users Rating 4.6 of 14 users (14)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 70 users Rating 4.3 of 70 users (70)
Rating 4.7 of 10 users Rating 4.7 of 10 users (10)
Rating 4.6 of 893 users Rating 4.6 of 893 users (893)