Take advantage of a coupon code for the 'Selection and Implementation of Security Controls' course, created by Richea Perry, available on Udemy.
This course, updated on February 12, 2025 and it is expired on February 12, 2025.
This course provides 3 hour(s) of expert-led training in English , designed to boost your Network & Security skills.
Highly rated at 4.2-star stars from 4 reviews, it has already helped 1,130 students.
This exclusive coupon is shared by Anonymous,
at the price
19.99 $
9.99 $
Don’t miss this opportunity to level up your skills!
You can find the discounted coupon code for this course at the end of this article
This course was developed as a means of helping entry-level as well as seasoned cybersecurity professionals, to develop a more holistic rather than isolated approach to implementing controls to address cyber or information security risks. The content of this course is as follows:
SECTION 1 TOPICS
1a-Course Intro
1b-Course Intro- The Case at hand
2-About the course
3-Meet your Instructor-Mentor
4-Course Roadmap
5-Approach to Control Selection_ pt1
6-Approach to Control Selection_ pt2
7-Applying same approach to real Data Breaches at a high-level
8-Introduction to security controls
9-Key considerations for the identification- selection & implementation of controls
10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis
11-Cost Benefit Analysis associated with controls selection
12-Technology integration, Operational impact, continuous monitoring, Employee training
13-Regulatory Compliance, Incident Response Planning
SECTION 2 TOPICS
14-High-level process of selecting controls to protect eCommerce web server-Pt1
14-High-level process of selecting controls to protect eCommerce web server-Pt2
15-Steps involved in assessing the identified cyber risks in web server
16-Identify assets, identify threats, identify vulnerabilities
17-Determine likelihood, Impact, Calculate risk
18-Documenting Cybersecurity Risk Assessment Report-Pt 2
18-Documenting Cybersecurity Risk Assessment Report-Pt 1
19-The role of governance in the effective selection and implementation of cybersecurity controls
20-Why not implement frameworks that already have recommended controls
21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 1
21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 2
22-When to, versus when not to use frameworks for the selection and implementation of controls
23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt1
23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt2
24-Implementation Plan for identified controls
25- Measuring the effectiveness of implemented controls
26-Putting it all together-The Selection and Implementation of Cybersecurity Risks Controls
27-Course Recap-END
ASSIGNMENT-Research