Booking options
£19.99
£19.99
On-Demand course
All levels
This is a multi-part series to assist the participant in evaluating all the necessary components to conducting a cyber risk assessment. The purpose of a cyber risk assessment lies in the objectives of ensuring:
Availability
Confidentiality
Integrity of data
Integrity of processing
We utilize the National Institute of Standards and Technology (NIST) cybersecurity framework to walk through various elements that should be considered with a cyber risk assessment. A previous segment delved into the first function outlined by NIST which is the âIdentifyâ concept. This segment will delve into the âprotectâ function.
We try to protect our information assets and systems against attack. Protection strategies can be the first line of defense, and breaches usually are a failure of protection strategies. Utilizing the concepts of categories and sub-categories an organization can effectively begin to map out their cyber risk process. The sub-categories of the protect function include:
Awareness control
Awareness and training
Data security
Information protection and procedures
Maintenance
Protective technologies
This segment is dedicated to delving into each of these sub-categories and outlining possible considerations for protecting information and cyber assets.
Learning Objectives
Explore the objectives of a cyber risk management assessment.
Explore security control designations.
Explore the concept of baseline controls.
Identify the requirements of ensuring awareness control within the protect function.
Identify the requirements of ensuring awareness and training within the protect function.
Identify the requirements of ensuring data security within the protect function.
Identify the requirements of ensuring information protection and procedures within the protect function.
Identify the requirements of ensuring maintenance within the protect function.
Identify the requirements of ensuring protective technology within the protect function.
This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement.
The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries.
Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements.
Benefits of CPD
Improve your employment prospects
Boost your job satisfaction
Promotes career advancement
Enhances your CV
Provides you with a competitive edge in the job market
Demonstrate your dedication
Showcases your professional capabilities
The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill.
Benefits of IPHM
It will help you establish a positive reputation in your chosen field
You can join a network and community of successful therapists that are dedicated to providing excellent care to their client
You can flaunt this accreditation in your CV
It is a worldwide recognised accreditation
This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries.
Benefits of Quality License Scheme
Certificate is valuable
Provides a competitive edge in your career
It will make your CV stand out
Introduction | |||
Introduction and Objectives to Cyber Risk Assessment: Protect | 00:04:00 | ||
Identify Critical Assets | 00:07:00 | ||
Prioritize | 00:07:00 | ||
Prioritize with Criticality | 00:16:00 | ||
Prioritize Further Utilizing Impacts | 00:10:00 | ||
Prioritize Further Utilizing Impacts Continued | 00:10:00 | ||
Applying Likelihood to Impact | 00:02:00 | ||
Integrating Priority with Impact/Likelihood | 00:10:00 | ||
Summary | 00:10:00 | ||
Supplementary Resources | |||
Supplementary Resources - Cyber Risk Framework - Protect Assets | 00:00:00 | ||
Obtain Your Certificate | |||
Order Your Certificate of Achievement | 00:00:00 | ||
Get Your Insurance Now | |||
Get Your Insurance Now | 00:00:00 | ||
Feedback | |||
Feedback | 00:00:00 |