Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Understanding Your Cyber Exposures
Section 1
Module 1 – Introduction – Introduces and defines the basic concepts used in Understanding Cyber Exposure
Module 2 – Identifying vulnerabilities Part 1 – Goes into detail regarding the cyber exposure to be found in Cyber Activities, Privacy, Computer/Network Systems, Legal, and Security Policies and Procedures.
Module 3 – Identifying vulnerabilities Part 2 - Goes into detail regarding the cyber exposure to be found in Social Media, Compliance, Cloud Computing, and the Internet of Things (IoT).
Module 4 – Determining Impact and Likelihood – Provides a framework for the two key measures (Impact and Likelihood) needed to manage and communicate the cyber exposures found.
Module 5 – Triage, Priorities and Management – Provides key management processes to address the cyber exposures found
Module 6 – Course Summary – Summarizes the material presented in the course.
Quiz Module 1
Quiz Module 2
Quiz Module 3
Oquiz Module 4
Quiz Module 5
Quiz Module 6
Practical Assessments
Self-Assessment of your organization’s cyber exposures
Self-Assessment of your personal cyber exposures
Leveraging Covid-19's impact in support of your cyber security (12:14)
Teach online with
Module 3 – Identifying vulnerabilities Part 2 - Goes into detail regarding the cyber exposure to be found in Social Media, Compliance, Cloud Computing, and the Internet of Things (IoT).
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock