Enterprise Security Risk Management

The Enterprise Risk Management skills path covers essential enterprise risk topics, such as risk identification and assessment, response, reporting, optimization and more.

Course

Control Design and Implementation

1 hour, 4 minutes

Course

Monitoring and Communication

6 minutes

Course

Asset Classification and Operational Considerations

10 minutes

Course

Risk Assessment

17 minutes

Course

Risk Metric Scenarios

12 minutes

Course

Access Control Fundamentals

1 hour, 37 minutes

Twenty-two videos cover everything you want to know about access control fundamentals. Beginning with access control basics (definitions and subject-object relationships), we move on to access control categories, authentication, account management, Single Sign-On (SSO) and Kerberos, the three forms of user authentication and the arguable fourth form, remote authentication services and much more. This is a complex subject, but our Access Control Fundamentals course dives deep and dredges up the answers for you.

Course

Security Policies

22 minutes

Organizations know the importance of planning ahead, and that’s what this course is about. A five-video series introduces you to security policies, procedures, standards, baselines and guidelines. Take an in-depth look at personnel security, the most common control frameworks, service-level agreements and the various types of security documents. What’s the difference between a policy and a procedure? Come find out!

Course

Risk Management

49 minutes

It’s nearly impossible to completely eliminate risk, but there are steps you can take to reduce it. This nine-video series on risk management takes a close look at risk management: definitions, tools, notable risk frameworks such as the NIST Risk Management Framework (RMF) and other Special Publications and the process of calculating risk. We also touch on threats and threat agents, the difference between due diligence and due care, and tips and best practices for ensuring that your employees are security-conscious and aware of risks. People are always the weakest link, so take an hour to learn how to strengthen them.

Course

Regulatory Compliance

30 minutes

Information is increasingly subject to legislation, and that means companies have a choice between regulatory compliance or legal trouble. Five videos give the student a look at the nitty-gritty of regulatory compliance, from the laws and regulations that protect data privacy rights (the Health Insurance Portability and Accountability Act, the California Consumer Privacy Act and more) to issues of intellectual property, the challenges of keeping data safe in an international market and the ethical codes an information security professional is expected to follow.

Course

Security Governance Principles

16 minutes

Two videos introduce you to the basic principles of security governance, beginning with a close look at the CIA (Confidentiality, Integrity and Availability) triad and what it means for a well-designed system. Includes an examination of the DAD (Disclosure, Alternation and Denial) triad, which opposes CIA. We also look at security governance fundamentals and the importance of roles, developing proper organization processes, aligning business objectives with strategies and a wide array of sample security roles and responsibilities.

Course

Risk Mitigation Strategies and Controls

26 minutes

Course

Key Risk Indicators and Key Performance Indicators

49 minutes

Course

Risk and Control Monitoring and Reporting Overview

15 minutes

Course

Risk Identification Overview

59 minutes

Course

Risk Response Options

43 minutes

Course

Risk Response and Mitigation Overview

18 minutes

Course

Risk-based Decision Making

52 minutes

Course

Risk and Control Analysis

1 hour, 15 minutes

Course

Risk Assessment Techniques

33 minutes

Course

Risk Assessment Overview

37 minutes

Course

IT Security Risk Concepts

1 hour, 45 minutes

Course

Impact of Compliance

28 minutes

Course

IT Risk Strategy

31 minutes

Course

Risk Culture and Communication

27 minutes

Course

Risk Identification Frameworks and Methods

39 minutes