Security Measures: Implementing Security Controls

IT Security    |    Intermediate
  • 14 videos | 1h 16m 21s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 37 users Rating 4.3 of 37 users (37)
Explore the use of security controls with the NIST Cybersecurity Framework in this 14-video course, which examines anatomy of security controls, from common to advanced and complex. You will discover how to test and monitor security controls, including the most basic quick-win controls for several control types. Key concepts covered here include security controls in relation to the overall NIST Cybersecurity Framework, and how security controls are relevant in SecOps; the major security control types and components of a security control; and defensive and quick-win controls for major control types. Next, learn how they are compromised, and steps for root cause analysis; learn the CIS critical security controls and how they are implemented; and observe how to assess security controls, including establishing security metrics for risk management framework and reporting. Learn how to investigate security controls when one fails and describe how to mitigate outcomes; learn processes of auditing security controls; and learn potential risk scenarios and how to mitigate and respond using security controls, including how to test controls to effectively respond.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe security controls in relation to the overall nist cybersecurity framework and how security controls are relevant in secops
    Describe the major security control types and the components of a security control
    Describe various areas where security controls are commonly used
    Describe defensive and quick win controls for the major control types, how they are compromised, and steps for root cause analysis
    Describe the cis critical security controls and how they are implemented
    Describe when to use security controls and how they are enforced
  • Describe various complex security controls and how they are implemented, including industrial and government security controls and baselines
    Describe various controls for assessment and monitoring
    Describe how to assess security controls, including establishing security metrics for risk management framework and reporting
    Investigate security controls when one fails and describe how to mitigate the outcome
    Describe processes of auditing security controls, including how to conduct an audit on control policies
    Describe potential risk scenarios and how to mitigate and respond using security controls, including how to test the controls to effectively respond
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 47s
  • 5m 52s
    After completing this video, you will be able to describe security controls in relation to the overall NIST Cybersecurity Framework and how security controls are relevant to SecOps. FREE ACCESS
  • Locked
    3.  Security Control Types Overview
    5m 3s
    Upon completion of this video, you will be able to describe the major security control types and the components of a security control. FREE ACCESS
  • Locked
    4.  Security Controls in Use
    6m 54s
    After completing this video, you will be able to describe various areas where security controls are commonly used. FREE ACCESS
  • Locked
    5.  Defensive and Quick Win Controls
    7m 41s
    Upon completion of this video, you will be able to describe defensive and quick win controls for the major control types, how they are compromised, and steps for root cause analysis. FREE ACCESS
  • Locked
    6.  CIS Critical Security Controls
    5m 52s
    After completing this video, you will be able to describe the CIS critical security controls and how to implement them. FREE ACCESS
  • Locked
    7.  When to Use Security Controls
    7m 18s
    Upon completion of this video, you will be able to describe when to use security controls and how they are enforced. FREE ACCESS
  • Locked
    8.  Advanced Security Control Types
    4m 43s
    Upon completion of this video, you will be able to describe various complex security controls and how they are implemented, including industrial security controls, government security controls, and baselines. FREE ACCESS
  • Locked
    9.  Using Security Controls for Risk Assessment
    5m 54s
    Upon completion of this video, you will be able to describe various controls for assessment and monitoring. FREE ACCESS
  • Locked
    10.  Testing Security Controls
    6m 28s
    After completing this video, you will be able to describe how to assess security controls, including establishing security metrics for the risk management framework and reporting. FREE ACCESS
  • Locked
    11.  When Security Control Fails
    5m 21s
    In this video, you will investigate security controls when one fails and describe how to mitigate the outcome. FREE ACCESS
  • Locked
    12.  Audit Security Controls
    6m 44s
    Upon completion of this video, you will be able to describe processes of auditing security controls, including how to conduct an audit of control policies. FREE ACCESS
  • Locked
    13.  Security Control Implementation
    5m 34s
    After completing this video, you will be able to describe potential risk scenarios and how to mitigate and respond using security controls, including how to test the controls to ensure an effective response. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 10s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 10623 users Rating 4.5 of 10623 users (10623)
Rating 4.3 of 70 users Rating 4.3 of 70 users (70)
Rating 4.2 of 132 users Rating 4.2 of 132 users (132)