- Course
Security Explained
An organization's commitment to enterprise cybersecurity underpins its ability to execute business operations. Learn how modern organizations leverage cybersecurity functions to protect their products, services, and bottom line.
- Course
Security Explained
An organization's commitment to enterprise cybersecurity underpins its ability to execute business operations. Learn how modern organizations leverage cybersecurity functions to protect their products, services, and bottom line.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
What you'll learn
This course explains how an organization's needs translate into enterprise security priorities. You first learn the tenets of secure engineering, architecture, and administration of products and networks. Then cover the continuous role of defensive and offensive security operations. Ending with governance, risk management and compliance, and ultimately how these functions work together to accomplish risk management and mitigation. All to prepare you to understand the importance and complexity of tasks required to keep up with the ever-changing landscape of threats and vulnerabilities.
Security Explained
-
Introduction | 2m 33s
-
The Threat Landscape | 3m 5s
-
Understanding Attacker Motivation | 3m 9s
-
Cyber Security Functions and Roles | 3m 7s
-
GRC Starts with Governance | 2m
-
Risk Management | 4m 33s
-
Security Compliance | 1m 55s
-
Security Architecture | 3m 6s
-
Security Engineering | 2m 3s
-
Security Administration | 3m 43s
-
Security Operations and SOC Detection | 2m 24s
-
Incident Response | 2m 8s
-
Attack Emulation | 4m 42s
-
Summary and Closing | 3m 11s