The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This course is designed to help you navigate the complexities of this field. It is divided into four parts:
Course Publication Date:
March 19, 2023
This course is available with
NO ADDITIONAL FEE if you have an active
self study membership or
all access membership or can be purchased for
$90.00!
Author: | Delta CPE |
Course No: | TECH-COMPSEC-4953 |
Recommended CPE: | 10.00 |
Delivery Method: | QAS Self Study |
Level of Knowledge: | Overview |
Prerequisites: | None |
Advanced Preparation: | None |
Recommended Field of Study: | Information Technology
|
|
|
|
Learning Objectives
- Recognize common cybersecurity misconceptions.
- Identify the five functions of the NIST Cybersecurity Framework.
- Recognize the five stages of the ITIL Framework.
- Identify the main causes for the rise of cyberattacks.
- Recognize common types of cyberattacks.
- Identify different kinds of cyber threat actors.
- Identify ways to protect yourself against cybercrime.
- Identify the objectives of IT governance.
- Recognize the role of the board in cybersecurity.
- Identify management activities associated with IT governance.
- Recognize the key principles of the COBIT Framework.
- Identify must-have security policies for every organization.
- Identify the essential physical security measures.
- Recognize the essential information security measures.
- Identify cloud computing security measures.
- Recognize mobile device security best practices.
- Identify the significant federal regulations of data privacy and protection.
- Recognize the key provisions of state privacy laws.
- Identify the key provisions of the HIPAA.
- Recognize the key requirements of the GLBA.