The capacity to perform risk management is crucial for anyone hoping to defend their networks and resources. This course will teach you about risk policy, assessment, analysis, and mitigation of your networks.
With so many threats and vulnerabilities in today's infrastructures, creating an impregnable framework is nearly impossible. Therefore, it is every IT security professionals' responsibility to make important decisions and take action to best safeguard data and assets. In this course, Assessing and Mitigating Security Risks, you will gain an understanding of risk management and how it can enable thoughtful and focused defense strategies. First, you will learn about the landscape, what risk assessment is, and how it can be conducted successfully. Next, you will learn about mitigation and controls. Finally, you will delve into tools and resources that can help your company get a jump start on protecting your network. When you are finished with this course, you will have the knowledge necessary to respond to incidents and mitigate those security threats.
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.
Course Overview Hey everyone. My name is Dale Meredith, and welcome to my course on Assessing and Mitigating Security Risks. Now I personally have been a Microsoft trainer since 1999 and a cybersecurity expert since about oh, 2000, teaching both corporate IT personnel for global companies, as well as colleges, government departments, and even military personnel. And hey, if you're looking for certification, guess what I did for you? I made it so this course could actually help you start you down your path towards several different certifications, including CEH, GCIH, CSA+, ECIH, and CISSP. Now some of the major topics that we'll talk about in this course will include understanding the landscape; things are changing for us in the cybersecurity world, or actually, devices are changing on us all the time that we have to support. We'll talk about risk assessments, as well as risk controls. In fact, by the end of the course, you should have a good understanding of what is expected of a cybersecurity professional when it comes to responding to incidences and mitigating those threats. Now before you guys jump in, you need to be sure that you're kind of familiar with some of the basic network items out there, like devices, protocols, operating systems. But more importantly, I'm hoping you've got a good commonsense thought process that you can then implement. Now after you're done with this course, you should be comfortable enough to dive into some of the other security courses that we offer around those certifications. Now, if you're willing to put up with my really bad puns and my Batman addiction, I hope you'll come and join me in this journey as we learn about the foundation of security, with this, the Assessing and Mitigating Security Resources course, here at Pluralsight.