Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CompTIA Security+ (SY0-601) Cert Prep: 10 Governance, Risk, and Compliance

Description

This course covers what professionals need to know about cybersecurity governance and compliance issues to prepare for the Security+ exam.

Tags

Syllabus

Syllabus IntroductionGovernance, risk, and complianceWhat you need to knowStudy resources1. Risk AnalysisRisk assessmentQuantitative risk assessmentRisk typesInformation classification2. Risk ManagementRisk treatment optionsCategorizing security controlsOngoing risk managementRisk management frameworksControl frameworksRisk visibility and reportingData security roles3. Supply Chain RiskManaging vendor relationshipsVendor agreeementsVendor information managementAudits and assessmentsCloud audits4. Security PoliciesSecurity policy frameworkSecurity policies5. Privacy and ComplianceLegal and compliance risksData privacyData breaches6. Privacy Enhancing TechnologiesData anonymizationData obfuscation7. Security Awareness and TrainingSecurity educationUser habitsSeparation of dutiesConclusionContinuing your studies Read more


CompTIA Security+ (SY0-601) Cert Prep: 10 Governance, Risk, and Compliance

Affiliate notice

This course covers what professionals need to know about cybersecurity governance and compliance issues to prepare for the Security+ exam.

Syllabus IntroductionGovernance, risk, and complianceWhat you need to knowStudy resources1. Risk AnalysisRisk assessmentQuantitative risk assessmentRisk typesInformation classification2. Risk ManagementRisk treatment optionsCategorizing security controlsOngoing risk managementRisk management frameworksControl frameworksRisk visibility and reportingData security roles3. Supply Chain RiskManaging vendor relationshipsVendor agreeementsVendor information managementAudits and assessmentsCloud audits4. Security PoliciesSecurity policy frameworkSecurity policies5. Privacy and ComplianceLegal and compliance risksData privacyData breaches6. Privacy Enhancing TechnologiesData anonymizationData obfuscation7. Security Awareness and TrainingSecurity educationUser habitsSeparation of dutiesConclusionContinuing your studies Read more