Instructor for this course
more

This is a segment in our ongoing series on cyber risks. Part one of this segment about “Cyber Risk Assessments – Identifying Threats” delved into the detection phase of a cyber risk assessment. We evaluated important elements to consider when determining how to stay abreast of impending threats and what organizations should do to detect those threats including evaluating anomalies, instilling continuous monitoring tactics and dedicated detection methods.

This is the second part of the two-part series. This segment focuses on the types of Information Technology (IT) assets to consider when establishing detection processes, the concept of applied security and additional considerations for continuous monitoring and forensic analysis. We also look briefly at incident response – which is covered in greater detail in the segment on “Cyber Security Risk Assessment – Recover from Breaches”.

Learning Objectives

• Review the high level “detect” concepts introduced in segment one.
• Explore the concept of applied security and preventative and detective controls.
• Explore additional concepts of security continuous monitoring
• Explore the pillars of success for the detect phase of a cyber risk assessment.
• Explore the concepts of incident response and threat intelligence.

Last updated/reviewed: July 6, 2018

Included In Certifications

This course is included in the following Expert Certifications:

13 CoursesCorporate Cyber Security Certification

  1. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  2. A Primer on Cyber Security Programs and Roles
  3. Cyber Risk Management Frameworks and Concepts
  4. Cyber Risk Assessment - Identify Critical Assets
  5. Cyber Risk Assessment – Prioritize Assets for Protection
  6. Cyber Risk Assessment - Protect Assets from Threats
  7. Cyber Risk Assessment – Detect Threats Part One
  8. Cyber Risk Assessment – Detect Threats Part Two
  9. Cyber Risk Assessment – Respond to Incidents
  10. Cyber Risk Assessment – Recover from Incidents
  11. Measuring Cyber Risk Utilizing Tiers
  12. Personal Identity Theft
  13. The Business Identity Theft Crisis

1 Review (3 ratings)Reviews

5
Anonymous Author
With this knowledge, I will be able to Review Policies and Procedures for the Detect Phase.

Prerequisites

Course Complexity: Intermediate

No Advanced Preparation or Prerequisites are needed for this course. However, it is recommended to take the other courses in the series prior to completing this one.

Education Provider Information

Company:
Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact:
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
INTRODUCTION AND OVERVIEW
  5:07Introduction to Cyber Risk Assessment – Detect Threats Part Two
  11:30Forensic Analysis
  3:13Applied Security Preventative and Detective Controls
  6:25Desktops and Laptops
  3:26Mobile Devices, BYOD and Containerization
  6:29Network Configuration and Firewalls
  4:15Endpoint Products
  9:21Security Continuous Monitoring & Event Logging
  8:48Security Information and Even Management (SIEM)
  3:38SOC and Incident Response and Threat Intelligence
  6:36Hunt Teams and Insider Threat Concerns
  5:31Pillars of Success Detect Contain Control
  2:45Summary
CONTINUOUS PLAY
  1:17:01Cyber Risk Assessment – Detect Threats Part Two
SUPPORTING MATERIALS
  PDFSlides:Cyber Risk Assessment – Detect Threats Part Two
  PDFCyber Risk Assessment – Detect Threats Part Two Glossary/Index
REVIEW AND TEST
  quizREVIEW QUESTIONS
 examFINAL EXAM