To stay safe, organizations need to maintain a deep understanding of developing threats and their own security posture. Rarely are the necessary resources actually fully dedicated. In this course we show you what a security assessment and its various components are.
This course takes you through a variety of controls you can implement to protect your organization’s assets, brand and image. We delve into understanding many core components of a security assessment. Lastly, we discuss simple controls that can be implemented, critical monitoring that should be performed, and important training that needs to occur.
Course Key Concepts: Security Assessment, Cybersecurity, Vulnerability Assessment, Risk Assessment, General Controls
Learning Objectives
- Explore what a comprehensive security assessment is.
- Discover the components of a security assessment.
- Explore security and remediation strategies.
- 1. Get the Most From Microsoft Outlook to Manage Your Time, Projects, People and Ideas
- 2. Artificial Intelligence: When it is Awesome and When it is Hazardous
- 3. Power BI: Building Interactive Dashboards
- 4. KPIs and Metrics for Accounts Payable Operations Using Workflow Systems
- 5. A Primer on Cyber Security Programs and Roles
- 6. Private, Permissioned, Business Blockchains
- 7. Business Process Mapping: A Prelude to System and Process GAP Analysis
- 8. QuickBooks Pro 2015: Opening Moves
- 9. Information Technology (IT) General Controls
- 10. IT Security Issues When Working Remotely From Public Network Connections
1 Review (4 ratings)
Reviews
Prerequisites
No advanced preparation or prerequisites are required for this course.