Curriculum
Course: Comprehensive Cybersecurity Training
Login

Curriculum

Comprehensive Cybersecurity Training

Module 2: Evaluate Network Security Capabilities, Secure Communication and Assess Endpoints security capabilities

0/33

Module 3: Implement Identity and Access Management and Cryptography & Secure Solution Implementation

0/47

Module 4: Threats, Vulnerabilities, Risk & Social Engineering, Explain Vulnerability Management and Analyze indicators of Malicious activities

0/47

Module 5: Secure Cloud Network Architecture, Explain Resiliency and Site Security Concepts

0/35

Module 6: Governance, Risk and Compliance

0/56
Text lesson

Week 19.1 Explain Risk management, Vendor Management concepts and Assessments

 

Overview

In this course, students will learn how organizations recognize, evaluate, and manage cybersecurity threats to safeguard vital resources and maintain operational resilience. You will explore how to evaluate threats, vulnerabilities, and potential impacts on business functions, and understand the strategies used to mitigate, transfer, accept, or avoid risks.

Students will gain practical knowledge of risk management processes, including conducting Business Impact Analysis (BIA) to determine mission-critical functions, recovery objectives, and tolerable downtime. You will also learn how to evaluate and select vendors, assess their security posture, and establish legal agreements that define responsibilities, expectations, and compliance requirements.

The course covers attestation and assessment methods, combining internal and external evaluations to verify that controls are effective and aligned with industry standards. Students will also explore penetration testing techniques to simulate real-world attacks, identify vulnerabilities, and evaluate both technical and physical security controls.