Introduction
Information risk management
()
What you need to know
()
Study resources
()
1. Risk Assessment
Risk assessment
()
Quantitative risk assessment
()
Information classification
()
2. Risk Management
Risk treatment options
()
Security control selection and implementation
()
Ongoing risk management
()
Risk management frameworks
()
Risk visibility and reporting
()
3. Malware
Comparing viruses, worms, and trojans
()
Comparing adware, spyware, and ransomware
()
Understanding backdoors and logic bombs
()
Botnets
()
Advanced persistent threats
()
4. Understanding Attackers
Cybersecurity adversaries
()
Preventing insider threats
()
Threat intelligence
()
5. Attack Types
Denial of service attacks
()
Eavesdropping attacks
()
Network attacks
()
Network address spoofing
()
Password attacks
()
Watering hole attacks
()
6. Social Engineering Attacks
Social engineering
()
Impersonation attacks
()
Physical social engineering
()
7. Vulnerability Scanning and Penetration Testing
Security assessment tools
()
Scanning for vulnerabilities
()
Assessing threats
()
Threat assessment techniques
()
Penetration testing
()
Advanced vulnerability scanning
()
8. Awareness and Training
Security policy training and procedures
()
Compliance training
()
User habits
()
User-based threats
()
Measuring compliance and security posture
()
Awareness program reviews
()
9. Business Continuity
Business continuity planning
()
Business continuity controls
()
High availability and fault tolerance
()
10. Disaster Recovery
Disaster recovery planning
()
Backups
()
Validating backups
()
Disaster recovery sites
()
Testing BC/DR plans
()
11. Supply Chain Risk
Managing vendor relationships
()
Vendor agreements
()
Vendor information management
()
12. Compliance
Legal and regulatory compliance
()
Privacy compliance
()
Intellectual property
()
Data breaches
()
Conclusion
What's next?
()