In this course, you will learn about identifying the importance of risk management, assessing risk, mitigating risk, and integrating documentation into risk management.
Learning Objectives
Assess information security risk in computing and network environments.
Analyze the cybersecurity threat landscape.
Analyze reconnaissance threats to computing and network environments.
Analyze attacks on computing and network environments.
Analyze post-attack techniques on computing and network environments.
Evaluate the organization's security posture within a risk management framework.
Collect cybersecurity intelligence.
Analyze data collected from security and event logs.
Perform active analysis on assets and networks.
Respond to cybersecurity incidents.
Investigate cybersecurity incidents.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cybersecurity Management
- Risk Management