Companies Home Search Profile

Risk Management for CompTIA Security+

Focused View

Christopher Rees

3:21:10

111 View
  • 01 - Course Overview.mp4
    01:48
  • 02 - Introduction.mp4
    01:24
  • 03 - The Security Cycle and Standard Operating Procedures.mp4
    01:50
  • 04 - Interoperability Agreements and SLAs.mp4
    01:39
  • 05 - Business Partner Agreement (BPA).mp4
    00:31
  • 06 - Memorandum of Understanding (MOU).mp4
    01:33
  • 07 - Interconnection Security Agreement (ISA).mp4
    01:22
  • 08 - Importance of Policies in Reducing Risk.mp4
    01:35
  • 09 - Mandatory Vacations.mp4
    02:18
  • 10 - Separation of Duties.mp4
    00:58
  • 11 - Job Rotation.mp4
    01:26
  • 12 - Clean Desk, Background Checks, Exit Interviews.mp4
    04:06
  • 13 - Data Ownership and User Types.mp4
    02:01
  • 14 - Executive Users.mp4
    03:07
  • 15 - Social Media Networks _ Applications.mp4
    01:35
  • 16 - Personal Email.mp4
    01:49
  • 17 - Introduction.mp4
    01:15
  • 18 - Module Goal.mp4
    00:52
  • 19 - Risk Calculation, MTBF, MTTF, and MTTR.mp4
    01:19
  • 20 - BIA Key Terminology, WRT, and MTD.mp4
    05:16
  • 21 - Mission Essential Functions.mp4
    02:04
  • 22 - Identification of Critical Systems.mp4
    02:28
  • 23 - Single Point of Failure.mp4
    02:17
  • 24 - Determining Impact.mp4
    01:18
  • 25 - Privacy Impact and Threshold Assessments.mp4
    03:37
  • 26 - Introduction.mp4
    01:30
  • 27 - Threat Assessment.mp4
    01:56
  • 28 - Risk Calculation.mp4
    01:28
  • 29 - Likelihood of Threat.mp4
    00:47
  • 30 - Impact of Threat.mp4
    00:39
  • 31 - Qualitative and Quantitative Analysis.mp4
    02:43
  • 32 - Loss Calculation Terms and Example.mp4
    02:44
  • 33 - Testing.mp4
    01:18
  • 34 - Managing Risk.mp4
    03:22
  • 35 - Risk Avoidance.mp4
    00:56
  • 36 - Change Management.mp4
    06:21
  • 37 - Incident Management.mp4
    02:20
  • 38 - Module Review.mp4
    01:04
  • 39 - Introduction.mp4
    00:44
  • 40 - Who Should Watch and Why Should You Care.mp4
    02:54
  • 41 - Incident Types and Category Definitions.mp4
    04:03
  • 42 - Team Models.mp4
    01:16
  • 43 - Staffing Model.mp4
    01:15
  • 44 - Outsourcing Considerations.mp4
    01:56
  • 45 - Incident Notification and Escalation.mp4
    01:57
  • 46 - Notifying Outside Agencies and Communication.mp4
    01:30
  • 47 - Exercises.mp4
    01:34
  • 48 - Incident Response Process.mp4
    01:47
  • 49 - Preparation.mp4
    01:34
  • 50 - Detection and Analysis.mp4
    03:08
  • 51 - Stopping the Spread, Eradication, and Recovery.mp4
    02:40
  • 52 - Module Review.mp4
    00:57
  • 53 - Introduction.mp4
    00:39
  • 54 - Computer Forensics.mp4
    02:32
  • 55 - Order of Volatility.mp4
    05:07
  • 56 - Chain of Custody.mp4
    02:37
  • 57 - Legal Hold.mp4
    01:23
  • 58 - First Responder Best Practices.mp4
    05:01
  • 59 - Capture a System Image.mp4
    03:35
  • 60 - Network Traffic and Logs.mp4
    03:58
  • 61 - Capture Video.mp4
    00:59
  • 62 - Record Time Offset.mp4
    02:31
  • 63 - Take Hashes.mp4
    01:59
  • 64 - Screenshots.mp4
    01:05
  • 65 - Witnesses.mp4
    01:59
  • 66 - Preservation.mp4
    01:36
  • 67 - Recovery.mp4
    01:28
  • 68 - Strategic Intelligence_Counterintelligence Gathering.mp4
    01:29
  • 69 - Track Man House and Expense.mp4
    02:30
  • 70 - Module Review.mp4
    00:33
  • 71 - Introduction.mp4
    00:45
  • 72 - Backup Plans _ Policies.mp4
    01:07
  • 73 - Backup Execution _ Frequency.mp4
    01:12
  • 74 - Cold Site, Hot Site, and Warm Site.mp4
    02:52
  • 75 - Order or Restoration.mp4
    01:42
  • 76 - Backup Types and Incremental vs. Differential.mp4
    03:16
  • 77 - Geographic Considerations.mp4
    02:42
  • 78 - Business Continuity Planning and Testing.mp4
    02:32
  • 79 - Risk Assessment and Continuity of Operations.mp4
    02:06
  • 80 - Disaster Recovery.mp4
    03:27
  • 81 - IT Contingency Planning.mp4
    02:34
  • 82 - Succession Planning.mp4
    01:24
  • 83 - Tabletop Exercises.mp4
    02:27
  • 84 - Module Overview.mp4
    00:31
  • 85 - Introduction.mp4
    00:32
  • 86 - Module Goal.mp4
    00:51
  • 87 - Threat Types.mp4
    01:00
  • 88 - Types of Access Controls.mp4
    00:49
  • 89 - Deterrent.mp4
    00:29
  • 90 - Preventive.mp4
    00:37
  • 91 - Detective.mp4
    00:34
  • 92 - Corrective_Recovery and Compensating.mp4
    01:26
  • 93 - Security Countermeasures and Module Review.mp4
    00:46
  • 94 - Introduction.mp4
    00:37
  • 95 - Why Should You Care.mp4
    01:47
  • 96 - Non-digital Data Destruction and Burning.mp4
    01:30
  • 97 - Shredding.mp4
    00:52
  • 98 - Pulping.mp4
    00:41
  • 99 - Pulverizing.mp4
    00:40
  • 100 - Degaussing.mp4
    01:34
  • 101 - Purgin.mp4
    00:42
  • 102 - Wiping vs. Deleting.mp4
    02:33
  • 103 - Data Classification, PII, and PHI.mp4
    02:49
  • 104 - Data Owner.mp4
    00:39
  • 105 - Data Steward_Custodian.mp4
    01:25
  • 106 - Privacy Officer.mp4
    00:35
  • 107 - Data Retention.mp4
    01:39
  • 108 - Legal and Compliance.mp4
    02:34
  • comptia-security-plus-risk-management.zip
  • Description


    Ever organization needs IT security to maintain a strong cybersecurity posture. This course will teach you the equally important concepts around managing risk and ensuring a companies critical assets are secure and available.

    What You'll Learn?


      Managing risk is a critical component of an organizations security posture. In this course, Risk Management for CompTIA Security+, you'll learn how to assess a company's risk across each area within IT. First, you'll explore the various methods used to assess risk like SLE, ALE, and ARO. Next, you'll learn the fundamentals of computer forensics, including maintaining chain of custody, legal holds, and data acquisition techniques. Finally, you'll discover the principals of disaster recovery, maintaining highly available infrastructure, and business continuity basics. By the end of the course, you'll understand what's required to assess an organization's operational risk, the methods used to conduct a forensic investigation, and how to keep a business operational leveraging disaster recovery and business continuity concepts.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Christopher Rees
    Christopher Rees
    Instructor's Courses
    Chris is a professional information technologist, trainer, manager and lifelong learner. He is married with 3 beautiful children and interested in martial arts, working out, spending time with family and friends and being creative whenever possible. He has created a number of IT Certification training courses over the past 10 years and really enjoys helping people advance their careers through training and personal development.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 108
    • duration 3:21:10
    • level preliminary
    • Release Date 2023/02/28