VLAN Hopping Prevention Tips VLAN hopping is a security vulnerability that allows an attacker to gain unauthorized access to network resources by exploiting weaknesses in the implementation of Virtual Local…
Cyber Security and IT Risk Management – A Bird's Eye View!
![Cyber Security and IT Risk Management – A Bird's Eye View!](https://itexamtools.com/wp-content/uploads/2020/12/3606-cyber-security-and-it-risk-management-a-birds-eye-view.jpg)
Cyber Security and IT Risk Management – A Bird's Eye View!
This course provides a bird’s eye view into the main concepts of Cyber Security and IT Risk Management as implemented within modern enterprises.
The course explains the below concepts in a concise manner:
-
Policies and Standards
-
Confidentiality, Integrity, Availability
-
Business Impact Assessment
-
Risk Assessment Methodology
-
Risk Register
-
Defense In Depth
-
Hardware Inventory
-
Software Inventory
-
Authentication
-
Authorization
-
Identity and Access Management (IAM)
-
Privileged Access Management (PAM)
-
Secure Coding
-
Logging
-
Backups
-
Security Awareness
-
Segregation of Environments
-
Segregation of Duties
-
Penetration Testing
-
ITSM Onboarding
-
IT Controls Testing
-
Disaster Recovery
-
Third Party Risk Assessment
-
Attack Surfaces
-
Network Access Control (NAC)
-
Network Segmentation and Firewalling
-
Intrusion Prevention System
-
Honeypots
-
Platform Hardening
-
Antivirus
-
Email Protection
-
Web Protection
-
Data Loss Prevention (DLP)
-
Vulnerability Scanning
-
Patching
-
IoT Device Security
-
Password Managers
-
Secrets Management Solution
Happy Learning and All the Best!!!
linkshare.course.3449978