- Course
Assessing and Mitigating Security Risks
The capacity to perform risk management is crucial for anyone hoping to defend their networks and resources. This course will teach you about risk policy, assessment, analysis, and mitigation of your networks.
- Course
Assessing and Mitigating Security Risks
The capacity to perform risk management is crucial for anyone hoping to defend their networks and resources. This course will teach you about risk policy, assessment, analysis, and mitigation of your networks.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Security
What you'll learn
With so many threats and vulnerabilities in today's infrastructures, creating an impregnable framework is nearly impossible. Therefore, it is every IT security professionals' responsibility to make important decisions and take action to best safeguard data and assets. In this course, Assessing and Mitigating Security Risks, you will gain an understanding of risk management and how it can enable thoughtful and focused defense strategies. First, you will learn about the landscape, what risk assessment is, and how it can be conducted successfully. Next, you will learn about mitigation and controls. Finally, you will delve into tools and resources that can help your company get a jump start on protecting your network. When you are finished with this course, you will have the knowledge necessary to respond to incidents and mitigate those security threats.
Assessing and Mitigating Security Risks
-
Understanding What This Course Is About | 5m 23s
-
Understanding the Landscape | 2m 41s
-
It's an IT issue | 4m 41s
-
The Landscape: Malware | 3m 30s
-
The Landscape: Ransomware | 3m 46s
-
The Landscape: Mobile Devices | 3m 51s
-
The Landscape: Kinetic Attacks | 3m 58s
-
The Attacker's Mentality | 5m 55s
-
The Attacker's Mindset | 1m 53s
-
The Mindset on Social Engineering | 8m 36s
-
The Mindset on Cloud Storage | 5m 4s
-
The Mindset on Mobile Devices | 4m 44s
-
The Mindset on Kinetic Attack Vectors | 4m 29s
-
Summary | 1m 28s