> SYSTEM STATUS: ONLINE
> ACCESSING ARCHIVES...
Topic 1: CIA Triad
Topic 11: Importance of Risk Management
CIA Triad explained in a simpler manner
Topic 2: Privacy
Privacy and Controls
Topic 3: Introduction to Risk Management
Logical decision making
Topic 4: Threats, Vulnerabilities, and Likelihood
Details on Threats, Vulnerabilities, and Likelihood
Topic 5: Risk in our Lives
Risks for an ordinary office worker. In their day-to-day life
Topic 6: Protecting Information
Combination of data and its dangers
Topic 7: Making Connections
Causes and CIA Triad
Topic 8: Privacy in the Working Environment
Surrounding Laws
Topic 9: Risk Management Terminology
Risk Management Objective
Topic 10: Decision Making Based on Risk Priorities
Why risk management matters
Topic 12: Importance of Governance Elements
Why governance elements are important
Topic 13: Risk Identification
Finding and recognizing risks
Topic 14: Theoretical Example Code of Ethics
A simple ethics example
Topic 15: Authentication
Verifying a user's identity
Topic 16: Professional Code of Conduct
Rules for professional behavior
Topic 17: Governance Elements
Main parts of governance
Topic 18: Proving Identity
Ways to prove identity
Topic 19: Non-repudiation
Proof that an action was performed
Topic 20: CIA in the Real World
Real-life use of the CIA triad
Topic 21: Methods of Authentication
Different ways to authenticate
Topic 22: Risk Priorities
Ranking risks by importance
Topic 23: Risk Tolerance Drives Decision Making
How tolerance affects decisions
Topic 24: Risk Treatment
Ways to handle risk
Topic 25: Risk Tolerance
Acceptable level of risk
Topic 26: Risk Assessment
Evaluating risk levels
Topic 27: What are Security Controls
Safeguards used to reduce risk
Topic 28: CIA Triad Deep Dive
A closer look at confidentiality, integrity, and availability