Learningit.today

Home » All Courses » Cybersecurity and Third-Party Risk

Cybersecurity and Third-Party Risk

: 6 Months

: Self Paced, AI Tutor

: Advanced

: Available Immediately

R6200,00R7300,00

Guaranteed Safe Checkout

Get hands-on experience in cybersecurity with the Cybersecurity and Third-Party Risk course and lab. The course provides a detailed look into the problems and risks, then gives specific examples of how to create a robust and active Cybersecurity Third?Party Risk Management program. The course has well descriptive interactive lessons containing pre and post-assessment questions, knowledge checks, quizzes, live labs, flashcards, and glossary terms to get a detailed understanding of cybersecurity and Third?Party Risk Management (TPRM).

Lessons

17+ Lessons | 184+ Exercises | 131+ Quizzes | 136+ Flashcards | 136+ Glossary of terms

TestPrep

60+ Pre Assessment Questions | 60+ Post Assessment Questions |

Hand on lab

17+ LiveLab | 17+ Video tutorials | 48+ Minutes

Lessons 1: Introduction

  • Who Will Benefit Most from This Course?

Lessons 2: What Is the Risk?

  • The SolarWinds Supply?Chain Attack
  • The VGCA Supply?Chain Attack
  • The Zyxel Backdoor Attack
  • Other Supply?Chain Attacks
  • Problem Scope
  • Compliance Does Not Equal Security
  • Third?Party Breach Examples
  • Conclusion

Lessons 3: Cybersecurity Basics

  • Cybersecurity Basics for Third-Party Risk
  • Cybersecurity Frameworks
  • Due Care and Due Diligence
  • Cybercrime and Cybersecurity
  • Conclusion

Lessons 4: What the COVID?19 Pandemic Did to Cybersecurity and Third?Party Risk

  • The Pandemic Shutdown
  • SolarWinds Attack Update
  • Conclusion

Lessons 5: Third?Party Risk Management

  • Third?Party Risk Management Frameworks
  • The Cybersecurity and Third?Party Risk Program Management
  • The Kristina Conglomerate (KC) Enterprises
  • Conclusion

Lessons 6: Onboarding Due Diligence

  • Intake
  • Cybersecurity Third?Party Intake
  • Conclusion

Lessons 7: Ongoing Due Diligence

  • Low?Risk Vendor Ongoing Due Diligence
  • Moderate?Risk Vendor Ongoing Due Diligence
  • High?Risk Vendor Ongoing Due Diligence
  • “Too Big to Care”
  • A Note on Phishing
  • Intake and Ongoing Cybersecurity Personnel
  • Ransomware: A History and Future
  • Conclusion

Lessons 8: On?site Due Diligence

  • On?site Security Assessment
  • On?site Due Diligence and the Intake Process
  • Conclusion

Lessons 9: Continuous Monitoring

  • What Is Continuous Monitoring?
  • Enhanced Continuous Monitoring
  • Third?Party Breaches and the Incident Process
  • Conclusion

Lessons 10: Offboarding

  • Access to Systems, Data, and Facilities
  • Conclusion

Lessons 11: Securing the Cloud

  • Why Is the Cloud So Risky?
  • Conclusion

Lessons 12: Cybersecurity and Legal Protections

  • Legal Terms and Protections
  • Cybersecurity Terms and Conditions
  • Conclusion

Lessons 13: Software Due Diligence

  • The Secure Software Development Lifecycle
  • On?Premises Software
  • Cloud Software
  • Open Web Application Security Project Explained
  • Open Source Software
  • Mobile Software
  • Conclusion

Lessons 14: Network Due Diligence

  • Third?Party Connections
  • Zero Trust for Third Parties
  • Conclusion

Lessons 15: Offshore Third?Party Cybersecurity Risk

  • Onboarding Offshore Vendors
  • Country Risk
  • KC’s Country Risk
  • Conclusion

Lessons 16: Transform to Predictive

  • The Data
  • Level Set
  • A Mature to Predictive Approach
  • The Predictive Approach at KC Enterprises
  • Conclusion

Lessons 17: Conclusion

Hands-on LAB Activities

Cybersecurity Basics

  • Simulating the DoS Attack
  • Performing a Phishing Attack
  • Performing Local Privilege Escalation

What the COVID?19 Pandemic Did to Cybersecurity and Third?Party Risk

  • Establishing a VPN Connection

Ongoing Due Diligence

  • Getting the TCP Settings and Information about the TCP Port
  • Detecting a Phishing Site Using Netcraft

Continuous Monitoring

  • Analyzing Malware

Offboarding

  • Supplying Power to a SATA Drive

Securing the Cloud

  • Creating an Elastic Load Balancer
  • Working with Amazon S3

Software Due Diligence

  • Attacking a Website Using XSS Injection
  • Fuzzing Using OWASP ZAP
  • Setting Up a Basic Web Server

Network Due Diligence

  • Studying CVSS Exercises with the CVSS Calculator
  • Setting up a DMZ
  • Enabling the TPM

Offshore Third?Party Cybersecurity Risk

  • Using the Windows Firewall
Training Method

Self Paced, AI Tutor

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Learningit.today