Introduction to Trend Analysis
Module Introduction - Secure Design Principles
Emerging Cybersecurity Trends
Introduction to Gartner’s Reports
XDR Capabilities Improve Accuracy and Productivity
Security Process Automation Eliminates Repetitive Tasks
Artificial Intelligence and Machine Learning
CSOs and Security-oriented Silos
Privacy is Becoming Its Own Discipline
Digital Trust and Safety Teams
Network Security Transforms from LAN to SASE
Cloud Workload Protection Controls
Secure Design Principles
Introduction Secure Design
Understanding What the Network is for
Mapping the Network - Knowledge Check
Zero-Trust' of External Inputs
Protecting Management and Operation Environments
Collect All Relevant Security Events and Logs
Communication Flows Between Components
Segmenting Assets on a Network
Disallow Arbitrary Queries Against Your Data
Ready, Set, Lab! - Drawing a Secure Topology
Week 20 - Drawing a Secure Topology
Week 20 - Secure Design Principles - Weekly Quiz
10Questions
Secure Design Principles Glossary
Introduction
Module Introduction - Risk Management
Risk Management Primary Objectives
The CIA Triad Implementation
The CIA Triad - Knowledge Check
Security Governance
The Organizational Structure
The Need in Rules and Regulations
PII, PCI, and PHI Compliances
Securing Sensitive Information
Personally Identifiable Information (PII)
Payment Card Industry (PCI)
Personal Health Information (PHI)
Security Governance - Knowledge Check
Risk Management Phases
The NIST Risk Management Framework
Select & Implement Controls
Risk Management - Practice
Employees Education
The Goal of Employees Education
Employees Awareness Training
Lucy Awareness - Tool Introduction
Lucy Awareness Program - Practice
Module Closure ll
Week 20 - Risk Management Weekly Quiz
10Questions
Risk Management Ongoing Learning
Your Career Guide to Success
Cybersecurity: Job-Search Concepts
Career Outcomes Resources
Secure Design Ongoing Learning