Business security impact Course

1 hour, 51 minutes

Syllabus

Introduction to business security

Video - 00:06:00

In this episode you will be introduced to business security concepts.
Business impact analysis

Video - 00:09:00

In addition to deploying effective security controls to protect assets, what can be done to ensure business continuity in the event of a security incident. A business impact analysis involves proactive planning to help reduce downtime and data loss when negative events occur.
Data types and roles

Video - 00:11:00

Protecting personally identifiable information, or PII, is crucial and required by security regulations such as GDPR, but of the vast amounts of data in an organization, how do you know which data is sensitive? The answer is through data roles and responsibilities assigned to personnel in conjunction with data discovery and classification tools on-premises and in the cloud.
Personnel risk and policies

Video - 00:10:00

Hiring the right employees and contractors for the job always matters. Enacting internal security controls such as background checks, mandatory vacations, job rotation, and separation of duties goes a long way in ensuring the integrity of business processes.
Attestation

Video - 00:03:00

In this episode you will learn all about attestation.
Internal audits and assessments

Video - 00:05:00

In this episode you will learn abouyt internal audits and assessments.
External audits and assessments

Video - 00:06:00

In this episode you will learn about external audits and assessments.
Third-party risk management

Video - 00:08:00

Some business activities cannot be completed entirely within an organization and must be outsourced. Ensuring that proper security safeguards are in place throughout the hardware, software, and personnel supply chain results in a properly secured data, such as through data loss prevention (DLP) tools.
Agreement types

Video - 00:06:00

When organizations enter into business partnerships with third-party service providers, the agreements and contracts they both sign protect both organizations legally, as well as establish the terms of service. This episode covers the various types of business agreements.
Change management

Video - 00:04:00

In this episode you will learn about change management.
Technical change management

Video - 00:07:00

In this episode you will learn about technical change management.
What is automation and orchestration?

Video - 00:04:00

In this episode, you will learn about automation and orchestration.
Benefits of automation and orchestration

Video - 00:03:00

In this episode, you will learn about the benefits of automation and orchestration.
Use cases of automation and orchestration

Video - 00:08:00

In this episode, you will learn about use cases for automation and orchestration.
Other considerations of automation and orchestration

Video - 00:05:00

In this episode, you will learn about other considerations of automation and orchestration.
Putting it all together

Video - 00:06:00

In this episode we will put it all together from the previous episodes.
Exploring the NIST frameworks

Video - 00:08:00

In this episode you will learn about exploring the NIST frameworks.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust