Introduction
Information risk management
()
What you need to know
()
Study resources
()
1. Risk Assessment
Risk assessment
()
Quantitative risk assessment
()
Information classification
()
2. Risk Management
Risk treatment options
()
Security control selection and implementation
()
Ongoing risk management
()
Risk management frameworks
()
Risk visibility and reporting
()
3. Malware
Comparing adware, spyware, and ransomware
()
Comparing viruses, worms, and trojans
()
Understanding backdoors and logic bombs
()
Botnets
()
Advanced persistent threats
()
4. Understanding Attackers
Cybersecurity adversaries
()
Preventing insider threats
()
Threat intelligence
()
5. Attack Types
Denial of service attacks
()
Eavesdropping attacks
()
Network attacks
()
Network address spoofing
()
Password attacks
()
Watering hole attacks
()
6. Social Engineering Attacks
Social engineering
()
Impersonation attacks
()
Physical social engineering
()
7. Vulnerability Scanning and Penetration Testing
Security assessment tools
()
Scanning for vulnerabilities
()
Assessing threats
()
Threat assessment techniques
()
Penetration testing
()
Advanced vulnerability scanning
()
8. Awareness and Training
Measuring compliance and security posture
()
Security policy training and procedures
()
Compliance training
()
User habits
()
User-based threats
()
Awareness program reviews
()
9. Business Continuity
Business continuity planning
()
Business continuity controls
()
High availability and fault tolerance
()
10. Disaster Recovery
Disaster recovery planning
()
Backups
()
Validating backups
()
Disaster recovery sites
()
Testing BC/DR plans
()
11. Supply Chain Risk
Vendor agreements
()
Managing vendor relationships
()
Vendor information management
()
12. Compliance
Legal and regulatory compliance
()
Privacy compliance
()
Intellectual property
()
Data breaches
()
Conclusion
What's next?
()