Please accept cookies to help us improve this website Is this OK? Yes No More on cookies »
Item number: 128298174

Cybersecurity Essentials Training

Item number: 128298174

Cybersecurity Essentials Training

398,00 481,58 Incl. tax

Cybersecurity Essentials E-Learning Training Certified Teachers Exam Quizzes Assessments Test Exam Live Labs Tips Tricks Certificate.

Read more
Discounts:
  • Buy 2 for €390,04 each and save 2%
  • Buy 3 for €386,06 each and save 3%
  • Buy 4 for €382,08 each and save 4%
  • Buy 5 for €378,10 each and save 5%
  • Buy 10 for €358,20 each and save 10%
  • Buy 25 for €338,30 each and save 15%
  • Buy 50 for €318,40 each and save 20%
Availability:
In stock
Delivery time:
Ordered before 5 p.m.! Start today.
  • Award Winning E-learning
  • Lowest price guarantee
  • Personalized service by our expert team
  • Pay safely online or by invoice
  • Order and start within 24 hours

Cybersecurity Essentials E-Learning

In a digital era, information has become the new power source. However, protecting the organization’s information from abuse, misuse, or unauthorized access can be challenging. New security threats emerge every day and you need to be armed with the right skills to make well-informed security decisions. In this Skillsoft Aspire journey, you will begin by becoming aware of common security threats, exposure to them, and their impact on businesses and assets. You will continue your discovery of what you need to do by learning how to identify, evaluate, and plan for security risks. Finally, you will learn how to adopt best practices and guidelines to mitigate security risks.

Learning Kits are structured learning paths, mainly within the Emerging Tech area. A Learning Kit keeps
the student working toward an overall goal, helping them to achieve your career aspirations. Each part takes the student step by step through a diverse set of topic areas. Learning Kits are
made up of required tracks, which contain all of the learning resources available such as Assessments (Final Exams), Mentor, Practice Labs and of course E learning. And all resources with a 365 days access from first activation.

Course content

This Learning Kit, with more than 35 hours of online content, is divided into the following tracks:

Track 1: Becoming Security Aware
Track 2: Evaluating and Planning for Security Risks
Track 3: Mitigating Security Risks

Track 1: Becoming Security Aware

In this track, the focus will be on cybersecurity awareness.

Content:
E-learning

Cybersecurity Awareness: Getting Started with Security Foundations

Course: 1 Hour, 15 Minutes

  • Course Overview
  • The Foundational Concepts of Information Security
  • Information Security Roles in an Organization
  • The Duties of Various Information Security Roles
  • Security-related User and Organization Expectations
  • The RACI Chart for Distinguishing Security Roles
  • Strategic Planning and Decision-making in Security
  • Importance of Communication in Information Security
  • The Concept of Security Governance
  • Information Security Governance Activities
  • Information Security and Meeting Business Goals
  • Course Summary

Cybersecurity Awareness: Information Security Fundamentals

Course: 1 Hour, 55 Minutes

  • Course Overview
  • Information Security Foundations Recap
  • The Consequences of Poor Information Security
  • The Numerous Domains of Information Security
  • Cybersecurity as a Domain of Information Security
  • Types of Cybersecurity Approaches
  • The CIA Triad – Confidentiality
  • The CIA Triad – Integrity
  • The CIA Triad – Availability
  • CIA Impacts and Methods
  • Security Architecture Frameworks
  • The Concept of Security Controls
  • Security Control Categories, Types, and Examples
  • Examples of Risk in Daily Life and Security
  • The Role of Humans in Information Security
  • Course Summary

Cybersecurity Awareness: Key Security Terms & Concepts

Course: 2 Hours, 21 Minutes

  • Course Overview
  • Cybersecurity Assets and Risks
  • Cybersecurity Threats
  • Cybersecurity Vulnerability and Countermeasures
  • Types of Threat Actors in Cybersecurity
  • Types of Attack Targets in Cybersecurity
  • Security Threat, Risk, and Exposure
  • Types of Security Threats
  • Mobile Technology Threats
  • Cloud Threat Definition and Types
  • Defining Advanced Persistent Threats (APTs)
  • Examples of Advanced Persistent Threats (APTs)
  • Insider Threat in an Organization
  • Malware Definition and Types
  • Steps in a Security Attack
  • Defining Uncertainty in Security
  • Course Summary

Cybersecurity Awareness: Exposure to Security Risks

Course: 1 Hour, 39 Minutes

  • Course Overview
  • Primary Information Security Issues
  • Foremost Security Threats to an Organization
  • Examples of Threats, Risks, and Exposure
  • How Exposure to Security Risks Occur
  • The Importance of Threat Identification
  • The STRIDE Model for Threat Identification
  • The PASTA Threat Model and Its Stages
  • Placing Responsibility for Security
  • Methods to Reduce Security Risks
  • Course Summary

Final Exam assessment:

Estimated duration: 90 minutes

Track 2: Evaluating and Planning for Security Risks

In this track, the focus will be on security risks. Explore risk identification, risk assessments, and risk management.

Content:

E-learning

Security Risks: Key Risk Terms & Concepts

Course: 1 Hour, 53 Minutes

  • Course Overview
  • Relationship between Security Risks and Assets
  • Likelihood versus Probability
  • Vulnerabilities, Threats and Risks
  • Risk Probability, Impact and Risk Score
  • Elements of Risk Severity
  • Risk Appetite versus Risk Tolerance
  • Advantages of a Risk Management Process
  • Components of a Risk Management Plan
  • Risk Management Using a Risk Register
  • Risk Treatment Methods
  • Importance of Risk Management
  • Frameworks and Standards for Risk Management
  • Stages in the Security Risk Management Process
  • Security Risk Assessment
  • Course Summary

Security Risks: Performing Security Risk Identification

Course: 58 Minutes

  • Course Overview
  • Relationship between Security Threat and Risk
  • Importance of Security Risk Identification
  • Security Risk Identification Process
  • Methods Used for Security Risk Identification
  • Best Practices for Security Risk Identification
  • Characteristics of a Security Risk Register
  • Creating a Security Risk Register
  • Course Summary

Security Risks: Performing Security Risk Assessments

Course: 1 Hour, 37 Minutes

  • Course Overview
  • Features and Benefits of Security Risk Assessment
  • Types of Security Risk Assessment
  • Characteristics of Qualitative Risk Assessment
  • Characteristics of Quantitative Risk Assessment
  • Security Risk Assessment Methods
  • Assessing Security Vulnerability
  • Categorizing Risk Using Four-quadrant Classification
  • Updating a Security Risk Register in Microsoft Excel
  • Security Risk Prioritization
  • Probability-impact Matrix for Risk Prioritization
  • Illustrating the Probability-impact Matrix
    Course Summary

Security Risks: Planning for Security Risk Management

Course: 1 Hour, 27 Minutes

  • Course Overview
  • Importance of Risk Management and Best Practices
  • Stages in a Security Risk Management Process
  • Security Risk Management Plan and Risk Categories
  • Components of a Security Risk Management Plan
  • Features of a Security Risk Mitigation Plan
  • Creating a Risk Mitigation Plan in Microsoft Word
  • Risk Tolerance and Risk Appetite
  • Security Risk Monitoring and Control Measures
  • Security Risk Strategies Methods
  • Role of Decision Making in Managing Security Risks
  • Course Summary

Final Exam assessment:

Estimated duration: 90 minutes

Practice Lab: Evaluating and Planning for Security Risks

Practice evaluating and planning for security risks by creating a risk register and identifying risks, applying a probability matrix to identify high risks, performing a vulnerability assessment and creating a risk mitigation plan.

Track 3: Mitigating Security Risks

In this track, the focus will be on mitigating security risks. Explore how to manage and maintain different types of risks such as network, physical, social engineering, and cloud risks.

Content:

E-learning

Mitigating Security Risks: Managing Network & Infrastructure Security Risks

Course: 1 Hour, 33 Minutes

  • Course Overview
  • Network Vulnerabilities as Threats
  • Network Vulnerability Prevention Methods
  • Examples of Network Vulnerabilities
  • The Purpose of Network Security
  • Network Zones and Security
  • Monitoring, Detection, and Logging
  • Tools for Monitoring, Detection, and Logging
  • Characteristics of a Secure Network Design
  • Guidelines and Best Practices for Network Security
  • Course Summary

Mitigating Security Risks: Managing Physical Security Risks

Course: 57 Minutes

  • Course Overview
  • Physical Security Risks
  • How Tailgating Works
  • Physical Security and its Importance
  • Layers of Physical Security
  • Best Practices for Physical Security
  • Security Principles for Site and Facility
  • Tightening Facility and Site Security
  • Internal and External Security Controls
  • Physical Security Standards
  • Course Summary

Mitigating Security Risks: Cyber Security Risks

Course: 1 Hour, 17 Minutes

  • Course Overview
  • The Core Facets of Security Risks
  • Information and Data Security Risks
  • Cloud Security Risks
  • Sources of Cybercrimes and Attacks
  • Examples of Cyber Attacks and Crimes
  • Malware Handling Best Practices
  • Handling DoS and DDoS Attacks
  • Handling Backdoor Attacks
  • The Role of Zero-Day (0day) Exploits
  • Key Examples of Zero-Day Attacks
  • Handling Zero-Day Vulnerabilities
  • Course Summary

Mitigating Security Risks: Managing Social Engineering Risks

Course: 1 Hour, 13 Minutes

  • Course Overview
  • Social Engineering Explained
  • The Intents of Social Engineering
  • Principles of Social Engineering
  • Social Engineering as the Attack Tool
  • Types of Social Engineering Attacks
  • Types of Spoofing Attacks
  • Possible Targets in Social Engineering
  • Best Practices for Handling Social Engineering
  • Course Summary

Mitigating Security Risks: Information, Cloud, & Data Security Risk Considerations

Course: 56 Minutes

  • Course Overview
  • Common Methods for Data Compromise
  • Fundamental Information Security Principles
  • Threats to Information Security Principles
  • The Human Factor as a Source of Data Theft
  • Technologies to Secure Data
  • Security Regulations & Governance Frameworks
  • The Need for Cloud Security
  • Benefits of Cloud Security
  • ISO 27017 Cloud Security Principles
  • Course Summary

Mitigating Security Risks: Managing Information, Cloud, & Data Security Risks

Course: 1 Hour, 30 Minutes

  • Course Overview
  • Common Methods for Data Compromise
  • Fundamental Information Security Principles
  • Threats to Information Security Principles
  • The Human Factor as a Source of Data Theft
  • Technologies to Secure Data
  • Security Regulations & Governance Frameworks
  • The Need for Cloud Security
  • Benefits of Cloud Security
  • ISO 27017 Cloud Security Principles
  • Course Summary

Mitigating Security Risks: Handling Natural Threats

Course: 34 Minutes

  • Course Overview
  • Securing against Natural Disasters
  • Considerations for Natural Disaster Risk Mitigation
  • The Composition of an Emergency Action Plan
  • Natural Disaster Emergency Action Plan Effectiveness
  • Drafting an Emergency Action Plan
  • Course Summary

Mitigating Security Risks: Managing Risks from Internal Stakeholders

Course: 50 Minutes

  • Course Overview
  • The Role of Internal Stakeholders in Security
  • Security Risks from Stakeholders
  • The Role of Effective Communication in Security
  • Methods in Effective Reporting of Security Health
  • Communication for a Secure Workplace
  • Course Summary

Mitigating Security Risks: Managing Security in a Hybrid Workplace

Course: 53 Minutes

  • Course Overview
  • Hybrid Workplaces Explained
  • Hybrid Workplace Security Concerns
  • Security Decisions for Hybrid Workplaces
  • The Concept of 'Work from Home' (WFH)
  • The Security Concerns of 'Work from Home'
  • 'Work from Home' (WFH) vs. Hybrid Workplaces
  • Work from Home Security: Responsibility Delegation
  • Work from Home (WFH) Security Guidelines
  • Course Summary

Mitigating Security Risks: Information Security Governance

Course: 1 Hour, 24 Minutes

  • Course Overview
  • Information Security Governance
  • The Need for Security Governance
  • The Benefits of Security Governance
  • Security Governance and the CIA Triad
  • Security Governance Outcomes
  • Security Governance vs. Security Management
  • The Elements of Security Governance
  • The Role of a Security Policy
  • IT Governance Frameworks
  • The Role of Senior Management in Security Governance
  • Methods to Create and Deliver Governance
  • Senior Management Roles and Responsibilities
  • Methods to Review Governance
  • Signs of Security Governance
  • Missing Security Governance
  • Reasons for Ineffective Security Governance
  • Methods to Implement Security Governance
  • The Security Governance Structure
  • Course Summary

Mitigating Security Risks: Managing the Incidents

Course: 1 Hour, 9 Minutes

  • Course Overview
  • Security Breach Incidents: Definition and Examples
  • The Incident Management Process
  • Incident Management Process Key Terms
  • The Need for an Incident Management Process
  • Incident Management Process Benefits
  • Incident Management Process Steps
  • Incident Management: Dependencies on Other Processes
  • Incident Management Roles and Responsibilities
  • Using Incident Management Forms
  • Measures to Prevent Incidents
  • Signs of a Security Incident
  • Course Summary

Mitigating Security Risks: Maintaining Business Continuity

Course: 1 Hour, 38 Minutes

  • Course Overview
  • Business Continuity Planning for Threat Management
  • The Role of Disaster Recovery Planning
  • Business Continuity vs. Disaster Recovery Planning
  • Business Continuity Planning's Role in Disasters
  • Business Continuity Planning: The Core Steps
  • The Role of the Risk Management Plan
  • The Role of Business Impact Analysis (BIA)
  • The Role of the Incident Response Plan
  • The Role of Recovery Time Objectives (RTOs)
  • The Role of Recovery Point Objectives (RPOs)
  • The Role of the Disaster Recovery Plan
  • Business Continuity vs. Emergency Action Plans
  • Organizational Post-disaster Recovery Planning
  • Building Business Resiliency During Disasters
  • Pursuing Business Excellence during a Pandemic
  • Course Summary

Mitigating Security Risks: Maintaining a Secure Workplace

Course: 51 Minutes

  • Course Overview
  • The Need for a Secure Workplace
  • Best Practices for a Secure Workplace
  • Best Practices for Developing a Security Policy
  • Implementing Security Training and Awareness
  • Guidelines for Cultivating a Security Mindset
  • Security Buy-in: Employee Encouragement Techniques
  • The Role of the Cyber Maturity Model Certification
  • Course Summary

Final Exam assessment:

Estimated duration: 90 minutes

Practice Lab: Mitigating Security Risks

Mitigate security risks by identifying a phishing email, creating and sending a phishing email and subscribing to the Microsoft Security Notification Service. Then, calculate the vulnerability score for a given vulnerability.

Language English
Qualifications of the Instructor Certified
Course Format and Length Teaching videos with subtitles, interactive elements and assignments and tests
Lesson duration 35 Hours
Assesments The assessment tests your knowledge and application skills of the topics in the learning pathway. It is available 365 days after activation.
Online Virtuele labs Receive 12 months of access to virtual labs corresponding to traditional course configuration. Active for 365 days after activation, availability varies by Training
Online mentor You will have 24/7 access to an online mentor for all your specific technical questions on the study topic. The online mentor is available 365 days after activation, depending on the chosen Learning Kit.
Progress monitoring Yes
Access to Material 365 days
Technical Requirements Computer or mobile device, Stable internet connections Web browsersuch as Chrome, Firefox, Safari or Edge.
Support or Assistance Helpdesk and online knowledge base 24/7
Certification Certificate of participation in PDF format
Price and costs Course price at no extra cost
Cancellation policy and money-back guarantee We assess this on a case-by-case basis
Award Winning E-learning Yes
Tip! Provide a quiet learning environment, time and motivation, audio equipment such as headphones or speakers for audio, account information such as login details to access the e-learning platform.

There are no reviews written yet about this product.

Loading...

OEM Office Elearning Menu Genomineerd voor 'Beste Opleider van Nederland'

OEM Office Elearning Menu is trots genomineerd te zijn voor de titel 'Beste Opleider van Nederland' door Springest, een onderdeel van Archipel. Deze erkenning bevestigt onze kwaliteit en toewijding. Hartelijk dank aan al onze cursisten.

Reviews

There are no reviews written yet about this product.

25.000+

Deelnemers getrained

Springest: 9.1 - Edubookers 8.9

Gemiddeld cijfer

3500+

Aantal getrainde bedrijven

20+

Jaren ervaring

Even more knowledge

Read our most recent articles

View blog