• Post category:StudyBullet-14
  • Reading time:5 mins read


A bird’s eye view into the main concepts of Enterprise Cyber Security and IT Risk Management.

What you will learn

High level overview of IT Risk Management Concepts in the Enterprise

High level overview of Cyber Security Concepts in the Enterprise

Description

This course provides a bird’s eye view into the main concepts of Cyber Security and IT Risk Management as implemented within modern enterprises.

The course explains the below concepts in a concise manner:


Get Instant Notification of New Courses on our Telegram channel.


  • Policies and Standards
  • Confidentiality, Integrity, Availability
  • Business Impact Assessment
  • Risk Assessment Methodology
  • Risk Register
  • Defense In Depth
  • Hardware Inventory
  • Software Inventory
  • Authentication
  • Authorization
  • Identity and Access Management (IAM)
  • Privileged Access Management (PAM)
  • Secure Coding
  • Logging
  • Backups
  • Security Awareness
  • Segregation of Environments
  • Segregation of Duties
  • Penetration Testing
  • ITSM Onboarding
  • IT Controls Testing
  • Disaster Recovery
  • Third Party Risk Assessment
  • Attack Surfaces
  • Network Access Control (NAC)
  • Network Segmentation and Firewalling
  • Intrusion Prevention System
  • Honeypots
  • Platform Hardening
  • Antivirus
  • Email Protection
  • Web Protection
  • Data Loss Prevention (DLP)
  • Vulnerability Scanning
  • Patching
  • IoT Device Security
  • Password Managers
  • Secrets Management Solution

Happy Learning and All the Best!!!

English
language

Content

Introduction

Objectives
Teams

IT Risk Management Concepts

Policies and Standards
Confidentiality, Integrity, Availability (CIA)
Business Impact Assessment (BIA)
Risk Assessment Methodology
Risk Register
Defense In Depth
Hardware Inventory
Software Inventory
Authentication
Authorization
Identity Access Management (IAM)
Privileged Access Management (PAM)
Secure Coding
Logging
Backups
Security Awareness Training
Segregation of Environments
Segregation of Duties
Penetration Testing
ITSM Onboarding
IT Controls Testing
Disaster Recovery
Service Provider Risk Assessment

Cyber Security Concepts

Attack Surfaces
Network Access Control (NAC)
Network Segmentation and Firewalling
Intrusion Prevention System (IPS)
Honeypots
Platform Hardening
Antivirus
Email Protection
Web Protection
Data Loss Prevention (DLP)
Vulnerability Scanning
Patching
IoT Device Security
Password Managers
Secrets Management Solutions
Congratulations!