Course curriculum

    1. Must Read - Learner Instructions Manual

    2. Resource Locator

    1. Join your live office hours/Q&A Classes by clicking on the JOIN button

    1. Presentation - 1.1 - Overview

    2. Presentation - 1.2 - Importance of Security

    3. Presentation - 1.3 - IT Functions & Roles

    4. Presentation - 1.4 - IT 101- 1 The Pieces

    5. Presentation - 1.5 - IT 101- 2 Using & Managing the Pieces

    6. Presentation - 1.6 - IT 101-3 Advancement

    7. Presentation - 1.7 - The Role of BA in Cybersecurity

    8. Presentation - 1.8 - Governance Perspectives of Cybersecurity

    9. Flashcards - Introduction

    10. CCA - 1 - Intro - Questions

    1. Presentation - 2.1 - Security Accountability

    2. Presentation - 2.2 - Cost of Securing an Organization

    3. Presentation - 2.3 - Outsourcing for Cybersecurity Expertise and Services

    4. Presentation - 2.4 - Risk Tolerance

    5. Presentation - 2.5 - Compliance

    6. Presentation - 2.6 - Best Practices and Benchmarking

    7. Presentation - 2.7 - Data Privacy

    8. Presentation - 2.8 - Data Privacy Nuances

    9. Presentation - 2.9 - Digital Rights Management (DRM)

    10. Presentation - 2.10 - Audit- Internal and External

    11. Flashcards - Security Concepts

    12. CCA - 2 - Security concepts - Questions

    1. Presentation - 3.1 - Risk Management & Control Assurance Framework

    2. Presentation - 3.2 - Organizational Risk Assessment

    3. Presentation - 3.3 - Risk Analysis Threat Risk Assessments

    4. Presentation - 3.4 - Risk Analysis Vulnerability Assessments

    5. Presentation - 3.4 - Risk Analysis Vulnerability Assessments

    6. Presentation - 3.5 - Business Case Development

    7. Presentation - 3.6 - Disaster Recovery and Business Continuity

    8. Flashcards - Enterprise Risks

    9. CCA - 3 - Enterprise risks - Questions

    1. Presentation - 4.1 - Understanding Security Controls and IT Risk Part 1

    2. Presentation - 4.2 - Understanding Security Controls and IT Risk Part 2

    3. Presentation - 4.3 - CIA Triad

    4. Presentation - 4.4 - Applying Controls

    5. Presentation - 4.5 - Cyber Threat-converted.pdf

    6. Presentation - 4.6 - Cybersecurity Threats Part 2

    7. Presentation - 4.7 - Cybersecurity Vulnerabilities Part 1

    8. Presentation - 4.8 - Cybersecurity Vulnerabilities Part 2

    9. Presentation - 4.9 - Adverse Impacts

    10. Presentation - 4.10 - Risks and Controls- Putting It All Together

    11. Flashcards - Cybersecurity Risks and Controls

    12. CCA - 4 - Risks and Controls - Questions

About this course

  • $449.00
  • 95 lessons
  • 0 hours of video content