Mitigating Security Risks: Managing Information, Cloud, & Data Security Risks
IT Security
| Intermediate
- 17 videos | 1h 28m 56s
- Includes Assessment
- Earns a Badge
To lead security-related decisions in the right direction, those in specific job roles need to have a solid comprehension of the guidelines, measures, and best practices for effective security risk management. In this course, you'll learn how to manage various types of risks, including those related to information, cloud, and data. You'll explore key countermeasures to safeguard information and data both on-premises and in the cloud. You'll also examine best practices for cloud security, data management, access control, and backup. Additionally, you'll outline common security risk scenarios and the best ways to protect data and information, including from unintentional exposure. Lastly, you'll study how to use data science and AI to detect security threats.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the role of security controls in managing risksDescribe the security control categories and typesDefine what's meant by the information security approach, defense in depthList and categorize key countermeasures for managing risksOutline the guidelines and best practices for ensuring information is secureOutline the guidelines and best practices for implementing security measures against common cloud security risksDescribe the role of access control in securing data and list some common types of access controlList the best practices and guidelines to adopt for making sure data is managed securely
-
Describe the role of digital signatures in securing informationDefine what's meant by data backup and list some backup typesDescribe why data backup is neededList the best practices and guidelines for backing up dataOutline how unintentional data exposure happens and name some keys reasons why it happensOutline best practices for protecting data and information using common security risk scenariosRecognize how to use data science and ai to detect emerging security threatsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 45sIn this video, you’ll learn more about your instructor and the course. In this course, you’ll learn about managing various types of risks including information, cloud, and data. You’ll also learn about key countermeasures to safeguard information and data in on-premise and cloud environments. You’ll also learn best practices for information security and security of the cloud. You’ll also learn about data management and backup for securing data and about common security risk scenarios. FREE ACCESS
-
8m 11sIn this video, you’ll learn more about the security controls you can use for information protection and the protection of assets within the organization. You’ll also learn about the selection process of security controls. Security control is a method of protecting information and assets. Anything you have within your organization is called an asset. Some of your assets store information, which is another form of assets. All of these must be protected. FREE ACCESS
-
8m 50sIn this video, you’ll learn more about security control categories. You’ll also learn about different types of security controls. Security controls are divided into three categories. These are administrative, technical, and physical. Administrative are procedures and policies you put in place to protect your assets. Technical controls are designed to restrict access to systems. They’re security methods to protect information and assets. Physical security controls control physical access to assets within the organization. FREE ACCESS
-
6m 3sIn this video, you’ll learn more about defense in depth. You’ll learn defense in depth is a concept in which you have many defensive security controls implemented to protect data and applications in the network. Because the sophistication of threats is increasing every day, you must have a layer of defense known as the defense in depth. You must apply security at all levels within the network to protect your data. FREE ACCESS
-
2m 34sIn this video, you’ll learn more about types of countermeasures. You’ll learn countermeasures are the same three categories of security controls you’ve already learned. These are administrative, technical, and physical. Here, you’ll examine the types of countermeasures you have within each category to handle security risks. In the administrative category, you have training, disaster recovery plans, recruitment policies, separation of duties, incident response plans, and security policies. FREE ACCESS
-
6m 51sIn this video, you’ll learn more about best practices for ensuring information security. First, you’ll learn about encrypting all confidential data. Whenever you want to secure confidentiality and integrity of data, you need to ensure you encrypt that data. Next, you’ll want to avoid opening emails from unknown senders. Then, you’ll learn more about connecting to secure wireless networks only. FREE ACCESS
-
6m 35sIn this video, you’ll learn more about best practices for cloud security. First, you’ll learn to use data protection policies. No matter what kind of data you have, you must ensure you have the optimal level of data protection. You need to protect this data from security breaches, loss or theft, and from application vulnerabilities that may lead to a security breach. Next, you’ll need to encrypt confidential data in the cloud environment. FREE ACCESS
-
4m 15sIn this video, you’ll learn more about access control and different type of access controls. First, you’ll learn what access control is. Access control is a method that allows or denies access based on certain conditions on a set of data. Access control can be implemented at the operating system, applications, or network level. Access control requires the user to first be authenticated and then authorized. FREE ACCESS
-
4m 15sIn this video, you’ll learn more about Secure Data Management best practices. First, you must classify data within the organization. Different organizations have different kinds of data classification. You can define your own data classification depending on what you use. Next, you’ll want to use access control to limit access to the data. You must maintain access control to limit its access only to legitimate users. You should also enable encryption. FREE ACCESS
-
4m 51sIn this video, you’ll learn more about the Digital Signature and its relation to security. You’ll also learn what digital signatures are used for. A digital signature is an electronic signature that encrypts documents. A digital signature encrypts the document. The only two people who can open that particular document are the sender and the receiver. The concept of the digital signature is based on the public key infrastructure which uses two sets of keys. FREE ACCESS
-
7m 31sIn this video, you’ll learn more about what data backup is. You’ll also take a look at different types of data backup. Data backup is a method of copying files and folders from one location to another. Data backup is also used for archiving old files and folders that are no longer required. Data backup can also be done with the help of an application. FREE ACCESS
-
4m 8sIn this video, you’ll learn more about the need for data backup. One of the fundamental reasons you would need data backup is because you want to safeguard important files and folders. If you didn’t backup that data and accidentally deleted an important file or a folder, you would need a method of restoring it. Or, if there was a natural or man-made disaster, your systems could be destroyed, and you need that data backup. FREE ACCESS
-
4m 33sIn this video, you’ll learn more about best practices for data backup. The first best practice you’ll learn is the 3-2-1 backup strategy. With this strategy, at least three copies of data are created. These are three backup copies. Two should be retained locally and the third should be sent to an off-site location. You should also store backup remotely. Next, you’ll want to perform regular backups using a clearly defined backup policy. FREE ACCESS
-
7m 18sIn this video, you’ll learn more about unintentional data exposure. You’ll discover that in some cases, accidental or unintentional data exposure takes place when an application or an individual unintentionally exposes data. Now, in this case, nobody has attacked the organization. No security breach has taken place. But there is unintentional data exposure, and it’s the result of data not being protected properly. FREE ACCESS
-
4m 1sIn this video, you’ll learn more about data protection, what it is, and best practices for data protection. You’ll learn data protection is a method that uses practices, best practices, safeguards, and rules to protect information. There are three core principles of data protection. You must protect the confidentiality of the information. You must protect the integrity of the information. And you must protect the availability of the information. These three components comprise CIA triad. FREE ACCESS
-
5m 45sIn this video, you’ll learn more about the role of data science and artificial intelligence or AI in security. These are necessary because threats are evolving too quickly. Because the threat actors are always coming up with new methods and new types of threats a manual intervention using traditional technology won’t stop these threats. Humans cannot possibly review all the threats that are being generated around the world today, so automatic methods are necessary. FREE ACCESS
-
1m 29sIn this video, you’ll summarize what you’ve learned in the course. In this course, you’ve covered the basic concepts of guidelines for managing information, cloud, and data security risks. You learned about security controls, defense in depth, key countermeasures for security risks, best practices for ensuring information security, and best practices for cloud security. You also learned about access control, secure data management, digital signatures, and data backups. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.