Wij slaan cookies op om onze website te verbeteren. Is dat akkoord? Ja Nee Meer over cookies »
128298174 SKU 128298174

Cybersecurity Essentials Training

128298174 SKU 128298174

Cybersecurity Essentials Training

398,00 481,58 Incl. btw

Cybersecurity Essentials E-Learning Training Gecertificeerde docenten Quizzen Assessments test examen Live Labs Tips trucs Certificaat.

Lees meer
Kortingen:
  • Koop 2 voor €390,04 per stuk en bespaar 2%
  • Koop 3 voor €386,06 per stuk en bespaar 3%
  • Koop 4 voor €382,08 per stuk en bespaar 4%
  • Koop 5 voor €378,10 per stuk en bespaar 5%
  • Koop 10 voor €358,20 per stuk en bespaar 10%
  • Koop 25 voor €338,30 per stuk en bespaar 15%
  • Koop 50 voor €318,40 per stuk en bespaar 20%
Beschikbaarheid:
Op voorraad
Levertijd:
Bestel voor 16:00 uur en start vandaag.
Blader door onze trainingsmethoden: ICT Trainingen , Cloud Computing and Virtualization , E-Learning , Learning Kit
  • Award Winning E-learning
  • De laagste prijs garantie
  • Persoonlijke service van ons deskundige team
  • Betaal veilig online of op factuur
  • Bestel voor 17:00 uur en start vandaag

Cybersecurity Essentials E-Learning Training 

In een digitaal tijdperk is informatie de nieuwe krachtbron geworden. Het kan echter een uitdaging zijn om de informatie van de organisatie te beschermen tegen misbruik, misbruik of ongeautoriseerde toegang. Elke dag duiken er nieuwe beveiligingsrisico's op en u moet over de juiste vaardigheden beschikken om goed geïnformeerde beveiligingsbeslissingen te nemen. In deze Skillsoft Aspire-reis begint u met het bewust worden van veelvoorkomende beveiligingsbedreigingen, blootstelling eraan en hun impact op bedrijven en activa. U blijft ontdekken wat u moet doen door te leren hoe u beveiligingsrisico's kunt identificeren, evalueren en plannen. Ten slotte leert u hoe u best practices en richtlijnen kunt toepassen om beveiligingsrisico's te beperken.

Learning Kits zijn gestructureerde leertrajecten, voornamelijk op het gebied van Emerging Tech. Een leerpakket houdt de student werkt aan een algemeen doel, hen te helpen uw loopbaanambities te verwezenlijken. Elk deel leidt de student stap voor stap door een diverse reeks onderwerpen. Leerpakketten zijn:bestaande uit verplichte tracks, die alle beschikbare leermiddelen bevatten, zoals assessments (eindexamens), mentor, oefenlabs en van cursus e-learning. En alle bronnen met 365 dagen toegang vanaf de eerste activering.

Cursusinhoud

This Learning Kit, with more than 35 hours of online content, is divided into the following tracks:

Track 1: Becoming Security Aware
Track 2: Evaluating and Planning for Security Risks
Track 3: Mitigating Security Risks

Track 1: Becoming Security Aware

In this track, the focus will be on cybersecurity awareness.

Content:

E-learning

Cybersecurity Awareness: Getting Started with Security Foundations
Course: 1 Hour, 15 Minutes

  • Course Overview
  • The Foundational Concepts of Information Security
  • Information Security Roles in an Organization
  • The Duties of Various Information Security Roles
  • Security-related User and Organization Expectations
  • The RACI Chart for Distinguishing Security Roles
  • Strategic Planning and Decision-making in Security
  • Importance of Communication in Information Security
  • The Concept of Security Governance
  • Information Security Governance Activities
  • Information Security and Meeting Business Goals
  • Course Summary

Cybersecurity Awareness: Information Security Fundamentals
Course: 1 Hour, 55 Minutes

  • Course Overview
  • Information Security Foundations Recap
  • The Consequences of Poor Information Security
  • The Numerous Domains of Information Security
  • Cybersecurity as a Domain of Information Security
  • Types of Cybersecurity Approaches
  • The CIA Triad – Confidentiality
  • The CIA Triad – Integrity
  • The CIA Triad – Availability
  • CIA Impacts and Methods
  • Security Architecture Frameworks
  • The Concept of Security Controls
  • Security Control Categories, Types, and Examples
  • Examples of Risk in Daily Life and Security
  • The Role of Humans in Information Security
  • Course Summary

Cybersecurity Awareness: Key Security Terms & Concepts
Course: 2 Hours, 21 Minutes

  • Course Overview
  • Cybersecurity Assets and Risks
  • Cybersecurity Threats
  • Cybersecurity Vulnerability and Countermeasures
  • Types of Threat Actors in Cybersecurity
  • Types of Attack Targets in Cybersecurity
  • Security Threat, Risk, and Exposure
  • Types of Security Threats
  • Mobile Technology Threats
  • Cloud Threat Definition and Types
  • Defining Advanced Persistent Threats (APTs)
  • Examples of Advanced Persistent Threats (APTs)
  • Insider Threat in an Organization
  • Malware Definition and Types
  • Steps in a Security Attack
  • Defining Uncertainty in Security
  • Course Summary

Cybersecurity Awareness: Exposure to Security Risks
Course: 1 Hour, 39 Minutes

  • Course Overview
  • Primary Information Security Issues
  • Foremost Security Threats to an Organization
  • Examples of Threats, Risks, and Exposure
  • How Exposure to Security Risks Occur
  • The Importance of Threat Identification
  • The STRIDE Model for Threat Identification
  • The PASTA Threat Model and Its Stages
  • Placing Responsibility for Security
  • Methods to Reduce Security Risks
  • Course Summary

Final Exam assessment:

  • Estimated duration: 90 minutes

Track 2: Evaluating and Planning for Security Risks

In this track, the focus will be on security risks. Explore risk identification, risk assessments, and risk management.

Content:

E-learning

Security Risks: Key Risk Terms & Concepts
Course: 1 Hour, 53 Minutes

  • Course Overview
  • Relationship between Security Risks and Assets
  • Likelihood versus Probability
  • Vulnerabilities, Threats and Risks
  • Risk Probability, Impact and Risk Score
  • Elements of Risk Severity
  • Risk Appetite versus Risk Tolerance
  • Advantages of a Risk Management Process
  • Components of a Risk Management Plan
  • Risk Management Using a Risk Register
  • Risk Treatment Methods
  • Importance of Risk Management
  • Frameworks and Standards for Risk Management
  • Stages in the Security Risk Management Process
  • Security Risk Assessment
  • Course Summary

Security Risks: Performing Security Risk Identification
Course: 58 Minutes

  • Course Overview
  • Relationship between Security Threat and Risk
  • Importance of Security Risk Identification
  • Security Risk Identification Process
  • Methods Used for Security Risk Identification
  • Best Practices for Security Risk Identification
  • Characteristics of a Security Risk Register
  • Creating a Security Risk Register
  • Course Summary

Security Risks: Performing Security Risk Assessments
Course: 1 Hour, 37 Minutes

  • Course Overview
  • Features and Benefits of Security Risk Assessment
  • Types of Security Risk Assessment
  • Characteristics of Qualitative Risk Assessment
  • Characteristics of Quantitative Risk Assessment
  • Security Risk Assessment Methods
  • Assessing Security Vulnerability
  • Categorizing Risk Using Four-quadrant Classification
  • Updating a Security Risk Register in Microsoft Excel
  • Security Risk Prioritization
  • Probability-impact Matrix for Risk Prioritization
  • Illustrating the Probability-impact Matrix
    Course Summary

Security Risks: Planning for Security Risk Management
Course: 1 Hour, 27 Minutes

  • Course Overview
  • Importance of Risk Management and Best Practices
  • Stages in a Security Risk Management Process
  • Security Risk Management Plan and Risk Categories
  • Components of a Security Risk Management Plan
  • Features of a Security Risk Mitigation Plan
  • Creating a Risk Mitigation Plan in Microsoft Word
  • Risk Tolerance and Risk Appetite
  • Security Risk Monitoring and Control Measures
  • Security Risk Strategies Methods
  • Role of Decision Making in Managing Security Risks
  • Course Summary

Final Exam assessment:

  • Estimated duration: 90 minutes

Practice Lab: Evaluating and Planning for Security Risks
Practice evaluating and planning for security risks by creating a risk register and identifying risks, applying a probability matrix to identify high risks, performing a vulnerability assessment and creating a risk mitigation plan.

Track 3: Mitigating Security Risks

In this track, the focus will be on mitigating security risks. Explore how to manage and maintain different types of risks such as network, physical, social engineering, and cloud risks.

Content:

E-learning

Mitigating Security Risks: Managing Network & Infrastructure Security Risks
Course: 1 Hour, 33 Minutes

  • Course Overview
  • Network Vulnerabilities as Threats
  • Network Vulnerability Prevention Methods
  • Examples of Network Vulnerabilities
  • The Purpose of Network Security
  • Network Zones and Security
  • Monitoring, Detection, and Logging
  • Tools for Monitoring, Detection, and Logging
  • Characteristics of a Secure Network Design
  • Guidelines and Best Practices for Network Security
  • Course Summary

Mitigating Security Risks: Managing Physical Security Risks
Course: 57 Minutes

  • Course Overview
  • Physical Security Risks
  • How Tailgating Works
  • Physical Security and its Importance
  • Layers of Physical Security
  • Best Practices for Physical Security
  • Security Principles for Site and Facility
  • Tightening Facility and Site Security
  • Internal and External Security Controls
  • Physical Security Standards
  • Course Summary

Mitigating Security Risks: Cyber Security Risks
Course: 1 Hour, 17 Minutes

  • Course Overview
  • The Core Facets of Security Risks
  • Information and Data Security Risks
  • Cloud Security Risks
  • Sources of Cybercrimes and Attacks
  • Examples of Cyber Attacks and Crimes
  • Malware Handling Best Practices
  • Handling DoS and DDoS Attacks
  • Handling Backdoor Attacks
  • The Role of Zero-Day (0day) Exploits
  • Key Examples of Zero-Day Attacks
  • Handling Zero-Day Vulnerabilities
  • Course Summary

Mitigating Security Risks: Managing Social Engineering Risks
Course: 1 Hour, 13 Minutes

  • Course Overview
  • Social Engineering Explained
  • The Intents of Social Engineering
  • Principles of Social Engineering
  • Social Engineering as the Attack Tool
  • Types of Social Engineering Attacks
  • Types of Spoofing Attacks
  • Possible Targets in Social Engineering
  • Best Practices for Handling Social Engineering
  • Course Summary

Mitigating Security Risks: Information, Cloud, & Data Security Risk Considerations
Course: 56 Minutes

  • Course Overview
  • Common Methods for Data Compromise
  • Fundamental Information Security Principles
  • Threats to Information Security Principles
  • The Human Factor as a Source of Data Theft
  • Technologies to Secure Data
  • Security Regulations & Governance Frameworks
  • The Need for Cloud Security
  • Benefits of Cloud Security
  • ISO 27017 Cloud Security Principles
  • Course Summary

Mitigating Security Risks: Managing Information, Cloud, & Data Security Risks
Course: 1 Hour, 30 Minutes

  • Course Overview
  • Common Methods for Data Compromise
  • Fundamental Information Security Principles
  • Threats to Information Security Principles
  • The Human Factor as a Source of Data Theft
  • Technologies to Secure Data
  • Security Regulations & Governance Frameworks
  • The Need for Cloud Security
  • Benefits of Cloud Security
  • ISO 27017 Cloud Security Principles
  • Course Summary

Mitigating Security Risks: Handling Natural Threats
Course: 34 Minutes

  • Course Overview
  • Securing against Natural Disasters
  • Considerations for Natural Disaster Risk Mitigation
  • The Composition of an Emergency Action Plan
  • Natural Disaster Emergency Action Plan Effectiveness
  • Drafting an Emergency Action Plan
  • Course Summary

Mitigating Security Risks: Managing Risks from Internal Stakeholders
Course: 50 Minutes

  • Course Overview
  • The Role of Internal Stakeholders in Security
  • Security Risks from Stakeholders
  • The Role of Effective Communication in Security
  • Methods in Effective Reporting of Security Health
  • Communication for a Secure Workplace
  • Course Summary

Mitigating Security Risks: Managing Security in a Hybrid Workplace
Course: 53 Minutes

  • Course Overview
  • Hybrid Workplaces Explained
  • Hybrid Workplace Security Concerns
  • Security Decisions for Hybrid Workplaces
  • The Concept of 'Work from Home' (WFH)
  • The Security Concerns of 'Work from Home'
  • 'Work from Home' (WFH) vs. Hybrid Workplaces
  • Work from Home Security: Responsibility Delegation
  • Work from Home (WFH) Security Guidelines
  • Course Summary

Mitigating Security Risks: Information Security Governance
Course: 1 Hour, 24 Minutes

  • Course Overview
  • Information Security Governance
  • The Need for Security Governance
  • The Benefits of Security Governance
  • Security Governance and the CIA Triad
  • Security Governance Outcomes
  • Security Governance vs. Security Management
  • The Elements of Security Governance
  • The Role of a Security Policy
  • IT Governance Frameworks
  • The Role of Senior Management in Security Governance
  • Methods to Create and Deliver Governance
  • Senior Management Roles and Responsibilities
  • Methods to Review Governance
  • Signs of Security Governance
  • Missing Security Governance
  • Reasons for Ineffective Security Governance
  • Methods to Implement Security Governance
  • The Security Governance Structure
  • Course Summary

Mitigating Security Risks: Managing the Incidents
Course: 1 Hour, 9 Minutes

  • Course Overview
  • Security Breach Incidents: Definition and Examples
  • The Incident Management Process
  • Incident Management Process Key Terms
  • The Need for an Incident Management Process
  • Incident Management Process Benefits
  • Incident Management Process Steps
  • Incident Management: Dependencies on Other Processes
  • Incident Management Roles and Responsibilities
  • Using Incident Management Forms
  • Measures to Prevent Incidents
  • Signs of a Security Incident
  • Course Summary

Mitigating Security Risks: Maintaining Business Continuity
Course: 1 Hour, 38 Minutes

  • Course Overview
  • Business Continuity Planning for Threat Management
  • The Role of Disaster Recovery Planning
  • Business Continuity vs. Disaster Recovery Planning
  • Business Continuity Planning's Role in Disasters
  • Business Continuity Planning: The Core Steps
  • The Role of the Risk Management Plan
  • The Role of Business Impact Analysis (BIA)
  • The Role of the Incident Response Plan
  • The Role of Recovery Time Objectives (RTOs)
  • The Role of Recovery Point Objectives (RPOs)
  • The Role of the Disaster Recovery Plan
  • Business Continuity vs. Emergency Action Plans
  • Organizational Post-disaster Recovery Planning
  • Building Business Resiliency During Disasters
  • Pursuing Business Excellence during a Pandemic
  • Course Summary

Mitigating Security Risks: Maintaining a Secure Workplace
Course: 51 Minutes

  • Course Overview
  • The Need for a Secure Workplace
  • Best Practices for a Secure Workplace
  • Best Practices for Developing a Security Policy
  • Implementing Security Training and Awareness
  • Guidelines for Cultivating a Security Mindset
  • Security Buy-in: Employee Encouragement Techniques
  • The Role of the Cyber Maturity Model Certification
  • Course Summary

Final Exam assessment:

  • Estimated duration: 90 minutes

Practice Lab: Mitigating Security Risks
Mitigate security risks by identifying a phishing email, creating and sending a phishing email and subscribing to the Microsoft Security Notification Service. Then, calculate the vulnerability score for a given vulnerability.

Duur 17 uur
Taal Engels
Certificaat van deelname Ja
Online toegang 365 dagen
Voortgangsbewaking Ja
Award Winning E-learning Ja
Geschikt voor mobiel Ja

Er zijn nog geen reviews geschreven over dit product.

Beoordelingen

Er zijn nog geen reviews geschreven over dit product.

Microsoft Office SCORM e-Learning

Wilt u Microsoft Office e-Learning SCORM hosten in het LMS van uw organisatie? Neem contact met ons op.

Cursisten beoordeling

Springest: 8.8, Edubookers: 8.5

Kwaliteitsgarantie

Award Winning E-learning & Gecertificeerde Docenten

Microsoft Partner

én Certiport Partner

Niet Goed Geld Terug

én Startgarantie

Nóg meer kennis

Lees onze meest recente blogartikelen

Bekijk alles