Course curriculum

    1. Must Read - Learner Instructions Manual

    2. Resource Locator

    1. Presentation - 1.1 - Overview

    2. Presentation - 1.2 - Importance of Security

    3. Presentation - 1.3 - IT Functions & Roles

    4. Presentation - 1.4 - IT 101- 1 The Pieces

    5. Presentation - 1.5 - IT 101- 2 Using & Managing the Pieces

    6. Presentation - 1.6 - IT 101-3 Advancement

    7. Presentation - 1.7 - The Role of BA in Cybersecurity

    8. Presentation - 1.8 - Governance Perspectives of Cybersecurity

    9. Flashcards - Introduction

    10. CCA - 1 - Intro - Questions

    1. Presentation - 2.1 - Security Accountability

    2. Presentation - 2.2 - Cost of Securing an Organization

    3. Presentation - 2.3 - Outsourcing for Cybersecurity Expertise and Services

    4. Presentation - 2.4 - Risk Tolerance

    5. Presentation - 2.5 - Compliance

    6. Presentation - 2.6 - Best Practices and Benchmarking

    7. Presentation - 2.7 - Data Privacy

    8. Presentation - 2.8 - Data Privacy Nuances

    9. Presentation - 2.9 - Digital Rights Management (DRM)

    10. Presentation - 2.10 - Audit- Internal and External

    11. Flashcards - Security Concepts

    12. CCA - 2 - Security concepts - Questions

    1. Presentation - 3.1 - Risk Management & Control Assurance Framework

    2. Presentation - 3.2 - Organizational Risk Assessment

    3. Presentation - 3.3 - Risk Analysis Threat Risk Assessments

    4. Presentation - 3.4 - Risk Analysis Vulnerability Assessments

    5. Presentation - 3.4 - Risk Analysis Vulnerability Assessments

    6. Presentation - 3.5 - Business Case Development

    7. Presentation - 3.6 - Disaster Recovery and Business Continuity

    8. Flashcards - Enterprise Risks

    9. CCA - 3 - Enterprise risks - Questions

    1. Presentation - 4.1 - Understanding Security Controls and IT Risk Part 1

    2. Presentation - 4.2 - Understanding Security Controls and IT Risk Part 2

    3. Presentation - 4.3 - CIA Triad

    4. Presentation - 4.4 - Applying Controls

    5. Presentation - 4.5 - Cyber Threat-converted.pdf

    6. Presentation - 4.6 - Cybersecurity Threats Part 2

    7. Presentation - 4.7 - Cybersecurity Vulnerabilities Part 1

    8. Presentation - 4.8 - Cybersecurity Vulnerabilities Part 2

    9. Presentation - 4.9 - Adverse Impacts

    10. Presentation - 4.10 - Risks and Controls- Putting It All Together

    11. Flashcards - Cybersecurity Risks and Controls

    12. CCA - 4 - Risks and Controls - Questions

    1. Presentation - 5.1 - Physical Security

    2. Presentation - 5.2 - Endpoint Security

    3. Presentation - 5.3 - Network Security - Security Architecture

    4. Presentation - 5.4 - Network Security - Firewalls

    5. Presentation - 5.5 - Network Security - Anti- Virus Anti- Malware

    6. Presentation - 5.6 - Network Security - Segregation

    7. Presentation - 5.7 - System Security - Servers

    8. Presentation - 5.8 - Platform Security

    9. Presentation - 5.9 - Product Security - Threat Models-converted.pdf

    10. Presentation - 5.10 - Product Security - Embedded Systems

    11. Presentation - 5.11 - Product Security - Internet of Things

    12. Flashcards - Securing the Layers

    13. CCA - 5 - Securing the layers - Questions

About this course

  • $299.00
  • 94 lessons
  • 0 hours of video content