Instructor for this course
more

This is a segment in our ongoing series on cyber risks.  In this session we begin to delve into the detection phase of a cyber risk assessment.  

Once assets are identified, the National Institute of Standards and Technology (NIST) framework suggests organizations then protect those assets. The next element is to detect threats against those assets.  Some may correlate this to the “Monitoring” phase of the Committee of Sponsoring Organizations (COSO) internal control framework, but there is much more involved in detection than simple monitoring.

In this segment we discuss important elements to consider when determining how to stay abreast of impending threats and what organizations should do to detect those threats. We also discuss the types of Information Technology (IT) assets you should consider when establishing your detection processes.  Our discussion on the detect phase is divided into two separate courses.  This is course one.

Learning Objectives

  • Identify cybersecurity threats that should be understood in order to detect inappropriate activity.
  • Explore the detect function of a cyber risk assessment and its components.
  • Identify the concepts of anomalies and events in order to detect cyber threats.
  • Identify the concept of security continuous monitoring.
  • Identify detection processes.
  • Explore challenges to detecting and defending against cyber threats.
Last updated/reviewed: July 6, 2018

Included In Certifications

This course is included in the following Expert Certifications:

13 CoursesCorporate Cyber Security Certification

  1. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  2. A Primer on Cyber Security Programs and Roles
  3. Cyber Risk Management Frameworks and Concepts
  4. Cyber Risk Assessment - Identify Critical Assets
  5. Cyber Risk Assessment – Prioritize Assets for Protection
  6. Cyber Risk Assessment - Protect Assets from Threats
  7. Cyber Risk Assessment – Detect Threats Part One
  8. Cyber Risk Assessment – Detect Threats Part Two
  9. Cyber Risk Assessment – Respond to Incidents
  10. Cyber Risk Assessment – Recover from Incidents
  11. Measuring Cyber Risk Utilizing Tiers
  12. Personal Identity Theft
  13. The Business Identity Theft Crisis

1 Review (5 ratings)Reviews

5
Anonymous Author
I like the clear organization on 3 topics: Anomalies and Events Security Continuous Monitoring Detection Processes

Prerequisites

Course Complexity: Intermediate

No Advanced Preparation or Prerequisites are needed for this course. However, it is recommended to take the other courses in the series prior to completing this one.

Education Provider Information

Company:
Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact:
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
INTRODUCTION AND OVERVIEW
  5:46Introduction to Cyber Risk Assessment – Detect Threats Part One
  17:51Threat
  18:12Detect and Three Techniques
  8:09Aggregate
  2:51Impact
  5:44Incident Thresholds and Alerts
  7:48Continuous Monitoring
  11:20Detection Processes & Challenges
  2:26Summary
CONTINUOUS PLAY
  1:20:07Cyber Risk Assessment – Detect Threats Part One
SUPPORTING MATERIALS
  PDFSlides: Cyber Risk Assessment – Detect Threats Part One
  PDFCyber Risk Assessment – Detect Threats Part One Glossary/Index
REVIEW AND TEST
  quizREVIEW QUESTIONS
 examFINAL EXAM