-
Module 1 3
Introduction
-
Lecture1.130 min
-
Lecture1.205 min
-
Lecture1.305 min
-
-
Module 2 18
Fundamental Elements of Cybersecurity
-
Lecture2.105 min
-
Lecture2.205 min
-
Lecture2.305 min
-
Lecture2.405 min
-
Lecture2.505 min
-
Lecture2.605 min
-
Lecture2.705 min
-
Lecture2.805 min
-
Lecture2.905 min
-
Lecture2.1005 min
-
Lecture2.1105 min
-
Lecture2.1205 min
-
Lecture2.1305 min
-
Lecture2.1405 min
-
Lecture2.1505 min
-
Lecture2.1605 min
-
Lecture2.1705 min
-
Lecture2.1805 min
-
-
Module 3 13
Introduction to Cyber Threats
-
Lecture3.105 min
-
Lecture3.205 min
-
Lecture3.305 min
-
Lecture3.405 min
-
Lecture3.505 min
-
Lecture3.605 min
-
Lecture3.705 min
-
Lecture3.805 min
-
Lecture3.905 min
-
Lecture3.1005 min
-
Lecture3.1105 min
-
Lecture3.1205 min
-
Lecture3.1305 min
-
-
Module 4 12
Security Risk Analysis and Management
-
Lecture4.105 min
-
Lecture4.205 min
-
Lecture4.305 min
-
Lecture4.405 min
-
Lecture4.505 min
-
Lecture4.605 min
-
Lecture4.705 min
-
Lecture4.805 min
-
Lecture4.905 min
-
Lecture4.1005 min
-
Lecture4.1105 min
-
Lecture4.1205 min
-
-
Module 5 3
Cybersecurity Laws
-
Lecture5.105 min
-
Lecture5.205 min
-
Lecture5.305 min
-
-
Module 6 1
Conclusion
-
Lecture6.105 min
-
-
Exam 1
-
Quiz7.130 questionsFinal
-
Operational Security Methods
Operational security methods vary based on the nature of a business. But some of the common approaches towards operational security are as follow:
- Limit access to network devices.
- Automate processes to avoid human errors.
- Develop comprehensive processes to manage how network changes are executed. All changes must be executed and logged in a planned way.
- Employees should have restricted access to areas only limited to their job.
Operational security has gone to a whole new level with more complex approaches, but the plan should always be to set up incremental-based efficient operational security measures.