Security Explained
An organization's commitment to enterprise cybersecurity underpins its ability to execute business operations. Learn how modern organizations leverage cybersecurity functions to protect their products, services, and bottom line.
What you'll learn
This course explains how an organization's needs translate into enterprise security priorities. You first learn the tenets of secure engineering, architecture, and administration of products and networks. Then cover the continuous role of defensive and offensive security operations. Ending with governance, risk management and compliance, and ultimately how these functions work together to accomplish risk management and mitigation. All to prepare you to understand the importance and complexity of tasks required to keep up with the ever-changing landscape of threats and vulnerabilities.
Table of contents
- Introduction 3m
- The Threat Landscape 3m
- Understanding Attacker Motivation 3m
- Cyber Security Functions and Roles 3m
- GRC Starts with Governance 2m
- Risk Management 5m
- Security Compliance 2m
- Security Architecture 3m
- Security Engineering 2m
- Security Administration 4m
- Security Operations and SOC Detection 2m
- Incident Response 2m
- Attack Emulation 5m
- Summary and Closing 3m