Earn a shareable certificate to add to your LinkedIn profile.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
After completing this chapter, the participant will be able to: Discuss the foundational concepts of cybersecurity principles. Recognize foundational security concepts of information assurance. Define risk management terminology and summarize the process. Relate risk management to personal or professional practices. Classify types of security controls. Distinguish between policies, procedures, standards, regulations and laws. Demonstrate the relationship among governance elements. Analyze appropriate outcomes according to the canons of the ISC2 Code of Ethics when given examples. Practice the terminology and review security principles.
Throughout this module, we will focus on Information Assurance.
Throughout this module, we will focus on the Risk Mitigation Process.
Throughout this module, we will focus on Security Controls.
Throughout this module, we will focus on Governance.
Throughout this module, we will focus on the ISC2 Code of Ethics.
This module will test your knowledge on what you have learned throughout this course.