01 - Course Overview
02 - Introduction
03 - The Security Cycle and Standard Operating Procedures
04 - Interoperability Agreements and SLAs
05 - Business Partner Agreement (BPA)
06 - Memorandum of Understanding (MOU)
07 - Interconnection Security Agreement (ISA)
08 - Importance of Policies in Reducing Risk
09 - Mandatory Vacations
10 - Separation of Duties
11 - Job Rotation
12 - Clean Desk, Background Checks, Exit Interviews
13 - Data Ownership and User Types
14 - Executive Users
15 - Social Media Networks _ Applications
16 - Personal Email
17 - Introduction
18 - Module Goal
19 - Risk Calculation, MTBF, MTTF, and MTTR
20 - BIA Key Terminology, WRT, and MTD
21 - Mission Essential Functions
22 - Identification of Critical Systems
23 - Single Point of Failure
24 - Determining Impact
25 - Privacy Impact and Threshold Assessments
26 - Introduction
27 - Threat Assessment
28 - Risk Calculation
29 - Likelihood of Threat
30 - Impact of Threat
31 - Qualitative and Quantitative Analysis
32 - Loss Calculation Terms and Example
33 - Testing
34 - Managing Risk
35 - Risk Avoidance
36 - Change Management
37 - Incident Management
38 - Module Review
39 - Introduction
40 - Who Should Watch and Why Should You Care
41 - Incident Types and Category Definitions
42 - Team Models
43 - Staffing Model
44 - Outsourcing Considerations
45 - Incident Notification and Escalation
46 - Notifying Outside Agencies and Communication
47 - Exercises
48 - Incident Response Process
49 - Preparation
50 - Detection and Analysis
51 - Stopping the Spread, Eradication, and Recovery
52 - Module Review
53 - Introduction
54 - Computer Forensics
55 - Order of Volatility
56 - Chain of Custody
57 - Legal Hold
58 - First Responder Best Practices
59 - Capture a System Image
60 - Network Traffic and Logs
61 - Capture Video
62 - Record Time Offset
63 - Take Hashes
64 - Screenshots
65 - Witnesses
66 - Preservation
67 - Recovery
68 - Strategic Intelligence_Counterintelligence Gathering
69 - Track Man House and Expense
70 - Module Review
71 - Introduction
72 - Backup Plans _ Policies
73 - Backup Execution _ Frequency
74 - Cold Site, Hot Site, and Warm Site
75 - Order or Restoration
76 - Backup Types and Incremental vs. Differential
77 - Geographic Considerations
78 - Business Continuity Planning and Testing
79 - Risk Assessment and Continuity of Operations
80 - Disaster Recovery
81 - IT Contingency Planning
82 - Succession Planning
83 - Tabletop Exercises
84 - Module Overview
85 - Introduction
86 - Module Goal
87 - Threat Types
88 - Types of Access Controls
89 - Deterrent
90 - Preventive
91 - Detective
92 - Corrective_Recovery and Compensating
93 - Security Countermeasures and Module Review
94 - Introduction
95 - Why Should You Care
96 - Non-digital Data Destruction and Burning
97 - Shredding
98 - Pulping
99 - Pulverizing
100 - Degaussing
101 - Purgin
102 - Wiping vs. Deleting
103 - Data Classification, PII, and PHI
104 - Data Owner
105 - Data Steward_Custodian
106 - Privacy Officer
107 - Data Retention
108 - Legal and Compliance