Your experience on this site will be improved by allowing cookies
Understand malware and learn ways to keep confidential information safe. Also, find out how to set up web browsers to prevent security issues.
Build key skills to identify common security threats and risks. Explore the attributes of cyber-attacks and understand how organizations implement best practices for protection.
This course is designed for beginners and those interested in roles like Cyber Analyst I or entry-level Cloud & Security Engineer. It covers essential cybersecurity skills that employers are looking for. It's also useful for technical support roles dealing with cybersecurity issues and is part of the IBM Technical Support Professional Certificate.
Cyber Security - A Global Challenge
Know the Potential Threat Actors
Setting Clear Objectives for Information and Cyber Security Function
Approach in Managing Security Risks
IT Risk Management Approach
Information Security Program Management
Understanding Risk Identification
Understanding Vulnerabilities
Understanding Risk Measurement
Risk Mitigation - Inventory and Classification of Assets
Risk Mitigation - Mitigating Interconnectivity Risk
Risk Mitigation - User Security Controls
Risk Mitigation - Security Screening in Hiring Practices
Risk Mitigation - User Access Program
Risk Mitigation - Segregation of Duties
Risk Mitigation - Confidentiality Agreements
Risk Mitigation - Network Controls
Risk Mitigation - Change Management Within IT Environment
Risk Mitigation - Configuration Management
Risk Mitigation - Hardening
Risk Mitigation - Standard Builds
Risk Mitigation - Patch Management
Risk Mitigation - End of Life Management
Risk Mitigation - Electronic Transmission Of Information
Risk Mitigation - Storage Of Information
Risk Mitigation - Application Access
Risk Mitigation - Operating System Access
Risk Mitigation - Remote Access
Risk Mitigation - Customer Remote Access to Financial Services
Outsourced Cloud Computing and Managed Security Service Provider
Risk Mitigation - Business Continuity Considerations
Risk Mitigation - Log Management
Risk Mitigation - Use of Remote Devices
Risk Mitigation - Metrics_1
Risk Mitigation-Incident Identification and Assessment
Information Security Program Effectiveness
Assurance and Testing
Key Testing Factors
Penetration Tests
Risk Mitigation - Threat Monitoring
Testing Types, Evaluations and Self Assessment
Audits
Assurance Reporting
0 Reviews
Sam a professional teacher
Send this course as a gift to your friends