• Online, Self-Paced
Course Description

Risk is everywhere. Just by having your morning shower, you risk getting shampoo in your eyes and being temporarily blinded by soapsuds. But it isn’t just humans who are at risk.

Computer networks are also highly vulnerable and susceptible to potential dangers. These include cyberattacks which can result in sensitive data being compromised and breached. Yet, there are ways of reducing and managing serious risks by implementing effective security and compliance audits.
By the end of this course, you’ll be able to:
• Identify the differences between security and compliance
• Recognize the importance of audits and why these must be carried out
• Understand how to prepare for and conduct effective audits
Why take this course?
If you’re an employer or work for an organization with an IT infrastructure, carrying out security and compliance audits is essential. This course will show you why effective auditing will help preserve the safety of your clients and customers’ data. We know they’re not exactly fun. But without auditing, you’re at risk of suffering a major cybersecurity headache and losing vital business…which is a lot worse than getting shampoo in your eyes.

10 mins | SCORM | Workbook

Learning Objectives

Identify the differences between security and compliance, Recognize the importance of audits and why these must be carried out, Understand how to prepare for and conduct effective audits

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Investigation
  • Cybersecurity Management
  • Exploitation Analysis
  • Vulnerability Assessment and Management
  • Threat Analysis

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.