Internet And Network Technologies
Becoming Security Aware
Cybersecurity Awareness: Exposure to Security Risks
Cybersecurity Awareness: Getting Started with Security Foundations
Cybersecurity Awareness: Information Security Fundamentals
Cybersecurity Awareness: Key Security Terms & Concepts
Final Exam: Becoming Security Aware

Cybersecurity Awareness: Exposure to Security Risks

Course Number:
it_smbsadj_04_enus
Lesson Objectives

Cybersecurity Awareness: Exposure to Security Risks

  • discover the key concepts covered in this course
  • list and describe the critical information security issues -confidentiality, integrity, availability, authentication, non-repudiation, privacy, and trust
  • recognize the standard security threats to an organization
  • differentiate using examples what exposure, threat or risk, security attack, exploits or breach of security, and impact/severity mean
  • illustrate using examples common actions from daily work-life that expose people to security risks
  • recognize the importance of threat identification and describe the concepts of threat modeling and threat identification sources and methods
  • define the STRIDE model in the context of threat identification
  • define the PASTA threat modeling method and its stages
  • identify why and how security is everyone’s responsibility
  • list different methods to reduce security risks
  • summarize the key concepts covered in this course

Overview/Description

There are security issues everywhere. Managers must keep abreast of security risks and threats.

In this course, you'll identify standard security risks and their origins. You'll also learn about more diverse types of security issues and the potential threats to an organization's security.

You'll be given examples from daily life that expose us to security risks. To wrap up, you'll outline effective methods to reduce common security risks that render organizations vulnerable via different channels.



Target

Prerequisites: none

Cybersecurity Awareness: Getting Started with Security Foundations

Course Number:
it_smbsadj_01_enus
Lesson Objectives

Cybersecurity Awareness: Getting Started with Security Foundations

  • discover the key concepts covered in this course
  • outline the core foundational concepts of information security and recognize why it is important to an organization
  • describe the standard information security roles within an organization
  • list the responsibilities of various information security roles within an organization
  • classify the expectations of users and organizations in relation to security, IT systems, permissions, and usage
  • recognize that security is everyone's responsibility in a professional environment and outline how to use the Responsible-Accountable-Consulted-Informed (RACI) chart to see different responsibilities are distributed
  • recognize the importance of strategic planning and decision-making when it comes to information security
  • recognize the importance of effective communication for fostering proper information security
  • define the concept of security governance in relation to information security
  • list the standard security governance activities that relate to information security
  • describe how proper information security can support the organization's overall business objectives
  • summarize the key concepts covered in this course

Overview/Description

As organizations become more reliant on IT systems to store all kinds of information, facilitate communication among colleagues and customers, and track business-related statistics, information is becoming more precious and its security increasingly crucial and challenging.

In this course, you'll explore standard information security concepts and the security-related roles within an organization. You'll examine where various security-related responsibilities fall throughout the organization and the importance of solid strategic planning and decision-making when implementing proper information security.

You will also investigate the concept of security governance and the activities involved. Finally, you'll delve into the relationship between an organization's overall business objectives and how information security can promote these.



Target

Prerequisites: none

Cybersecurity Awareness: Information Security Fundamentals

Course Number:
it_smbsadj_02_enus
Lesson Objectives

Cybersecurity Awareness: Information Security Fundamentals

  • discover the key concepts covered in this course
  • recall what is meant by information security, what it protects, and how it protects it
  • use case studies and examples to illustrate what can happen when information is not protected
  • list the domains into which various types of information security can be categorized
  • describe the purpose and importance of cybersecurity and outline the cybersecurity framework
  • describe the various types of approaches to cybersecurity
  • describe the CIA triad and its importance and outline some cybersecurity confidentiality concepts
  • describe the integrity concepts of the CIA Triad
  • describe the availability concepts of the CIA Triad
  • discuss the CIA impacts and methods
  • define the function of security architecture and name related frameworks
  • define the purpose of security controls and name security control methods
  • classify and describe different types of security controls
  • describe examples of risks that can occur to anyone in any situation as well as those that expose organization's to security risks
  • define the role of humans in protecting the security of information
  • summarize the key concepts covered in this course

Overview/Description

With information security a key concern for organizations, it is important to understand the basic concepts of information security and the security concepts that fall within this topic, such as those within the world of cybersecurity.

In this course, you'll recall information security fundamentals before examining the broad domains within it. You'll then delve into cybersecurity and explore the various approaches to it.

In addition, you'll examine some practical cybersecurity concepts, such as the CIA triad and the security architecture principle. You'll then investigate the actions that expose us to security risks, the roles we play in maintaining or breaching security, and the various security controls that can be implemented to mitigate security-related risks.



Target

Prerequisites: none

Cybersecurity Awareness: Key Security Terms & Concepts

Course Number:
it_smbsadj_03_enus
Lesson Objectives

Cybersecurity Awareness: Key Security Terms & Concepts

  • discover the key concepts covered in this course
  • describe key concepts of cybersecurity assets and risks
  • describe the key terms associated with cybersecurity threats
  • recognize the key concepts of cybersecurity vulnerability and countermeasures
  • list the types of threat actors and their motives
  • list the types of attack targets
  • define what is meant by security exposure and a security threat or risk
  • list types of cybersecurity threats
  • describe what comprises mobile technology threats
  • define what is meant by cloud threats and list types of such threats
  • define advanced persistent threats (APTs)
  • give an example of an APT
  • describe how an insider threat in an organization would manifest
  • describe what malware is and list standard types of malware
  • list the steps performed in a cyber attack on security
  • define what is meant by uncertainty in cybersecurity
  • summarize the key concepts covered in this course

Overview/Description

Everyone who connects to the Internet is vulnerable to security threats. Managers need to know the types of security threats their organizations are vulnerable to and their potential impact.

In this course, you'll explore the key terms used in cybersecurity. You'll examine different types of threats, threat actors, and targets. You’ll investigate advanced persistent threats (APTs), insider threats, and uncertainty in relation to cybersecurity, as well as the various types of malware and security threats.



Target

Prerequisites: none

Final Exam: Becoming Security Aware

Course Number:
it_fesedml_01_enus
Lesson Objectives

Final Exam: Becoming Security Aware

  • define the concept of security governance in relation to information security
  • describe key concepts of cybersecurity assets and risks
  • describe the availability concepts of the CIA Triad
  • describe the CIA triad and its importance and outline some cybersecurity confidentiality concepts
  • describe the integrity concepts of the CIA Triad
  • describe what comprises mobile technology threats
  • describe what malware is and list standard types of malware
  • differentiate using examples what exposure, threat or risk, security attack, exploits or breach of security, and impact/severity mean
  • list and describe the critical information security issues -confidentiality, integrity, availability, authentication, non-repudiation, privacy, and trust
  • list different methods to reduce security risks
  • list the responsibilities of various information security roles within an organization
  • list the steps performed in a cyberattack on security
  • list the types of threat actors and their motives
  • outline the core foundational concepts of information security and recognize why it is important to an organization
  • recognize the standard security threats to an organization

Overview/Description

Final Exam: Becoming Security Aware will test your knowledge and application of the topics presented throughout the Becoming Security Aware track of the Skillsoft Aspire Security Essentials for Decision Makers and Leaders Journey.



Target

Prerequisites: none

Close Chat Live