Training Courses
Home
Application Security
Infrastructure Security
Ethical Hacking
Sec-Sci AutoPT
White Papers
Training Courses
Services
Contact
About SEC-SCI
|
Unleashed
|
Contact
|
Login
/
Register
SECURITY
SCIENCE
CYBER DEFENSE NOW, INFORMATION SECURITY TOMORROW!
Home
Security Science
Application Security
Web Applications and Services
Infrastructure Security
Cloud Security and Network Security
Ethical Hacking
Security Tools and Tutorials
Sec-Sci AutoPT
App PenTest Automation
White Papers
Cybersecurity Guidelines
Training Courses
Free Online Cybersecurity Training
Services
Security Services
Contact
Get In Touch
Fundamentals of Cyber Risk Management (Estimated Duration: 6 Hours)
Fundamentals of Cyber Risk Management
› Fundamentals of Cyber Risk Management Course Introduction
› Risk Management Overview
Risk Management Framework
› Standards for Risk Management
› OCTAVE
› CERT Resilience Management Model Overview
Critical Assets and Operations
› Critical Assets and Operations
Threats and Vulnerabilities
› Threat Overview
› Vulnerabilities
› Threat Scenarios
Risk Analysis and Mitigation
› Risk and Impact Analysis
› Considerations for Responding to Risks
› Risk Mitigation Strategies
Security Controls
› Control Methods and Types of Security Controls
› Administrative Controls
› Selecting Security Controls
› Security Control Assessment
Mitigation Strategy Maintenance
› Mitigation Strategy and Maintenance
› Security Testing and Assessments
Response and Recovery
› Incident Response Terms and Life Cycle
› Incident Response Phase 1 of 6 - Preparation
› Incident Response Phase 2 of 6 – Detection and Analysis
› Incident Response Phase 3 of 6 – Containment
› Incident Response Phases 4-5 of 6 – Eradication and Recovery
› Incident Response Phase 6 of 6 – Lessons Learned
› Business Continuity Plans and Procedures
› Disaster Recovery Plans and Procedures
Earn a Certificate by Taking the Exam
Fundamentals of Cyber Risk Management Exam
Explore CISA Cybersecurity Training Courses by visiting the following link:
https://www.cisa.gov/cybersecurity-training-exercises