In this course, you will learn about identifying the importance of risk management, assessing risk, mitigating risk, and integrating documentation into risk management.
Learning Objectives
Assess information security risk in computing and network environments.
Analyze the cybersecurity threat landscape.
Analyze reconnaissance threats to computing and network environments.
Analyze attacks on computing and network environments.
Analyze post-attack techniques on computing and network environments.
Evaluate the organization's security posture within a risk management framework.
Collect cybersecurity intelligence.
Analyze data collected from security and event logs.
Perform active analysis on assets and networks.
Respond to cybersecurity incidents.
Investigate cybersecurity incidents.
Framework Connections
Specialty Areas
- Cybersecurity Management
- Risk Management
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.