Buy Courses & Training

  • K0684 Cybersecurity threat characteristics

    Once you have reviewed the free threats and vulnerabilities introduction the deep detail of AT&CK and CAPEC will make sense. The proactive and reactive controls that match up to these major methodologies will ensure the success of the enterprise in reducing threats based on their characteristics.

    Original price was: $15.00.Current price is: $8.00.
  • K0686 Authentication and Authorization tools and techniques

    Authentication and authorization must be based upon core engineering principles of choosing the right access control system. Only then will the standards governance and risk be addressed within our organization. Choosing the wrong access control methodology is like using a hammer to drive a screw. Must also considerTechnical operational business

    Read more
    Original price was: $15.00.Current price is: $8.00.
  • K0692 Vulnerability assessment tools and techniques

    Vulnerability assessment is both a technical inventory and the business metrics to communicate that technical in inventory. The process includes: asset information, scanning, verifying results, and updating configuration management data.

    Original price was: $15.00.Current price is: $8.00.
  • K0697 Encryption algorithm capabilities and applications

    Encryption algorithm capabilities must be matched to the business need. This requires an understanding of the operations and technical processes as well as the lifecycle of all encryption, algorithms deployed in the environment.

    Original price was: $15.00.Current price is: $8.00.
  • K0698 Cryptographic Key Management principles and practices

    Deploying public key infrastructure and certificate authorities requires a clear understanding of business and operations processes along with the technical aspects of certificate lifecycle.

    Original price was: $15.00.Current price is: $8.00.
  • K0709 Business Continuity and Disaster Recovery policies and procedures

    The seven phases of business continuity planning will build resiliency and redundancy across all technology assets protecting mission data. There are four major standards for business continuity planning that are accepted, globally. The three major components of the methodology include the business process analysis, business impact analysis, and finally the

    Read more
    Original price was: $15.00.Current price is: $8.00.
  • K0723 Vulnerability Data Sources

    In order to understand CVE & NVD we must go deeper into vendor databases, open source information, and data analysis for prioritizing the consumption of vulnerability data sources.

    Original price was: $15.00.Current price is: $8.00.
  • K0728 Confidentiality, Integrity and Availability principles and practices

    The heart of every CyberSecurity program requires four terms be well understood and applied by everyone in the organization. You could only do one course in cyber security this course will do the most good for the most people.

    Original price was: $15.00.Current price is: $8.00.
  • K0751 System Threats

    Understand how to build a threat model and perform a business impact analysis. Governance requires that you understand the basis for analysis and the potential consequences of not addressing system threats from a compliance standpoint. A business impact analysis is critical for the long-term survivability of an organization and it’s

    Read more
    Original price was: $15.00.Current price is: $8.00.
  • K0752 System Vulnerabilities

    Vulnerabilities include: external resources, supply chain, and internally built software. Knowing how to organize the vulnerabilities and calculate a base score requires a clear understanding of the scoring system, business processes, and how this integrates with change control.

    Original price was: $15.00.Current price is: $8.00.
  • K0785 Insider threat tools and techniques

    Employees, contractors, vendors are considered insiders. They have a different set up protections under the law. These are special set of threat agents that can have devastating impact if we do not deploy governance, methodologies, and policies in a clear correct manner. We must also look for the technical indicatorsOf

    Read more
    Original price was: $15.00.Current price is: $8.00.
  • K0798 Program Management principles and practices

    The technological and business process of program management requires a firm understanding of the three levels of systems, assets, and their delivery protocols.

    Original price was: $15.00.Current price is: $8.00.
  • K0803 Supply Chain Risk Management principles and practices

    Defining the surface area of your supplychain risk management requires: contractual review, system definition, and monitoring across all your operational processes.

    Original price was: $15.00.Current price is: $8.00.
  • K0820 Supplychain Risks

    Purchasing or acquiring software and systems is an interaction with multiple vendors. We manage and maintain those systems through our business processes, custom immigrations, and lifecycle. Creating visibility into those organization is both a business and technical discussion.

    Original price was: $15.00.Current price is: $8.00.
  • K0835 Risk Assessment principles and practices

    The technical process of risk assessments is more than qualitative and quantitative analysis. It includes project planning, technical automation, and a highly detailed technical inventory of assets, threats, controls.

    Original price was: $15.00.Current price is: $8.00.
  • K0863-1 Cloud Computing Governance

    The share responsibilities model is only the beginning of governance for the cloud. Cloud rules and responsibilities must be well defined and understood both from a contractual standpoint and from an administrative and lifecycle standpoint.

    Original price was: $15.00.Current price is: $8.00.