Learn how to manage security risks for your company. Reduce threats that may affect your business and react to them
This product is no longer in stock
In this course you will learn to manage the security risks for your company. Reduce the threats that may affect your company and react to them, you will discover the most common types of threats from the point of view of IT security and data.
Here we will see what is the management of risks, their origins, we will define some concepts and we will become aware of the need to implement plans for prevention and reaction to threats.
What is security risk management? 05:45
Nature of security risks in the company 05:34
Definitions of security risks in the company 05:59
It's inevitable: you're going to be hacked 05:51
Ad-hoc management, nothing of improvisation 05:53
In this chapter, we will analyze the fundamental issues that must be taken into account in order to implement a successful risk management plan that is capable of evolving.
Scope of the plan against security risks 05:12
Identification of security risks in the company 05:09
Security risk assessment in the company 05:25
What to do when you have evaluated the risks 05:24
Execute the plan against security risks 05:29
Evaluate the results of our security plan 05:23
Here we will analyze the resources and risks inherent to most companies and how to classify and treat them to improve our situation regarding these threats.
ICS and the Internet of things 05:47
Bring your own device and the security risks 05:27
Security with mobile phone terminals 06:15
Denial of service attacks 07:09
Exfiltration of company data 06:13
Passwords in the company, its construction and renovation 07:46
In this chapter we will see the measures to be taken to prevent possible threats, in order to minimize the chances of this happening and to know how to react in case it happens.
Preventative security measures in the company 05:49
Risk Management Methodologies and COBIT 06:23
Generic preventive measures to avoid risks 05:27
Reactive measures to avoid security risks 05:02
In this chapter we will analyze some of the preventive measures that we can apply in a generic way and what risks help us to minimize, avoid or counteract.
Maintenance and update of hardware and software 05:29
Antivirus on computers as a security measure 05:09
Protect communications with a Firewall 06:36
Data Loss Prevention (DLP) 05:39
Verification in two steps as security system 05:33
Here we will analyze the reactive measures, since they are applicable when a threat has materialized and we have to cancel it or recover from it.
General disconnection of equipment before an attack 05:02
Analysis of records looking for clues 05:40
Backups as defense method 05:32
In this chapter we will deal with some of the ransomware keys, whose objective is to hijack the information in exchange for a ransom.
The risk of ransomware and the contingency plan 05:22
Ransomware prevention: fundamental measures 06:16
I'm infected by ransomware, what do I do? 05:25
In this chapter, we will look at some of the aids that can be offered to us, in terms of planning and implementing a prevention plan or response to threats.
Pentesting or systems violation 05:40
The computer expert and his legal value 05:00
Appraisal of the computer park of our company 04:57
Size: 428 MB
Formators: Sergio R.-Solís
Content: 35 Videos
Duration: 3:19 hours
Base Files: SI Includes
Date of publication: Sep 5, 2016
Totally free of viruses and malicious software, so do not wait any longer to download it now.
Do not forget to give us an opinion about the program, to improve the content.
NOTE: Do not forget to follow us on our facebook and twitter social networks so that you become part of our community and receive the notification every time we post something new, so you will not miss anything.
|OS||Windows XP o superior|
|File Size||428 MB|
NO registration required!
If the question you have has not yet been answered here, use the form below to ask something about this addon.