When trouble strikes, your preparations could mean the difference between disaster and a bump in the road. Review disaster recovery with six videos: Recovery Strategy, Recovery Process, Disaster Recovery Plan Testing, RAID (Redundant Array of Inexpensive Disks), Backups and Network Redundancy. Explore the development process for a disaster recovery strategy, look at the different models of disaster recovery plans and fallback sites, and compare Mean Time Between Failure (MTBF) and Mean Time to Repair (MTTR). Remember: “Nine-tenths of wisdom is being wise in time.”
Seven videos reintroduce the student to the details of preventative and detective measures on a system. Beginning with log management, the course covers egress monitoring, configuration management, operations concepts, trusted recovery and patch management. Includes vocabulary and definitions, best practices and more.
“You’ve got no evidence!” criminals like to say. Actually, we do. This four-video course covers the fundamentals of computer crime investigations, from the types of crime to the investigation process, forensics and proper handling of evidence. Chain of custody, forensic timeline, computer crime categories and more will remind the student of the ins and outs of investigating crimes in the world of computers.
Twenty-two videos cover everything you want to know about access control fundamentals. Beginning with access control basics (definitions and subject-object relationships), we move on to access control categories, authentication, account management, Single Sign-On (SSO) and Kerberos, the three forms of user authentication and the arguable fourth form, remote authentication services and much more. This is a complex subject, but our Access Control Fundamentals course dives deep and dredges up the answers for you.
Here are two questions everyone will eventually need to ask themselves: What do I have, and where is it? This seven-video course gives the student the tools to answer those questions by taking them through the minutiae of asset security. Beginning with managing sensitive data and basic principles such as need-to-know and definitions of important terms (quality control and assurance, data owner, data custodian and more), we conduct a deeper dive into six key topic areas: data remanence, data at rest, data in transit, data ownership, data security controls and classification.
Organizations know the importance of planning ahead, and that’s what this course is about. A five-video series introduces you to security policies, procedures, standards, baselines and guidelines. Take an in-depth look at personnel security, the most common control frameworks, service-level agreements and the various types of security documents. What’s the difference between a policy and a procedure? Come find out!
It’s nearly impossible to completely eliminate risk, but there are steps you can take to reduce it. This nine-video series on risk management takes a close look at risk management: definitions, tools, notable risk frameworks such as the NIST Risk Management Framework (RMF) and other Special Publications and the process of calculating risk. We also touch on threats and threat agents, the difference between due diligence and due care, and tips and best practices for ensuring that your employees are security-conscious and aware of risks. People are always the weakest link, so take an hour to learn how to strengthen them.