Session & Risk Management
Cybersecurity
| Intermediate
- 13 videos | 1h 8m 59s
- Includes Assessment
- Earns a Badge
A structured approach to security allows for the efficient management of security controls. In this 13-video course, you will explore assets, threats, vulnerabilities, risk management, user security and session management, data confidentiality, and encryption. Key concepts covered in this course include how to identify, assess, and prioritize risks; how to implement security controls to mitigate risk; and learning about account management actions that secure the environment. Next, learn how to use Group Policy to implement user account hardening and configure the appropriate password security settings for those accounts in accordance with organizational security policies; learn how HTTP session management can affect security; and observe how to harden web browsers and servers to use TLS (transport layer security). Then learn how centralized mobile device control can secure the environment; learn encryption techniques used to protect data; and observe how to configure a virtual private network (VPN) to protect data in motion. Finally, learn how to configure and implement file encryption to protect data at rest; and how to configure encryption and session management settings.
WHAT YOU WILL LEARN
-
Recognize digital assets that have value to the organization along with related threatsIdentify and prioritize risksImplement security controls to mitigate riskDescribe account management actions that secure the environmentUse group policy to implement user account hardeningRecognize how http session management can affect security
-
Harden web browsers and servers to use tlsExplain how centralized mobile device control can secure the environmentRecognize encryption techniques use to protect dataConfigure a vpn to protect data in motionConfigure file encryption to protect data at restConfigure encryption and session management settings
IN THIS COURSE
-
1m 29s
-
5m 20sAfter completing this video, you will be able to recognize digital assets that have value to the organization, along with related threats. FREE ACCESS
-
5mIn this video, you will identify and prioritize risks. FREE ACCESS
-
4m 11sIn this video, you will learn how to implement security controls to mitigate risk. FREE ACCESS
-
4m 33sUpon completion of this video, you will be able to describe account management actions that secure the environment. FREE ACCESS
-
4m 59sTo harden user accounts, find out how to use Group Policy. FREE ACCESS
-
6m 49sAfter completing this video, you will be able to recognize how HTTP session management can affect security. FREE ACCESS
-
4m 56sIn this video, learn how to harden web browsers and servers to use TLS. FREE ACCESS
-
7m 5sAfter completing this video, you will be able to explain how centralized mobile device control can secure the environment. FREE ACCESS
-
6m 4sUpon completion of this video, you will be able to recognize encryption techniques used to protect data. FREE ACCESS
-
8m 21sIn this video, you will learn how to configure a VPN to protect data in motion. FREE ACCESS
-
4m 34sIn this video, find out how to configure file encryption to protect data at rest. FREE ACCESS
-
5m 39sIn this video, you will learn how to configure encryption and session management settings. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.