Recently Updated Pages
The purpose and impact of stakeholders
You previously learned about incident escalation and the various security incident classification...
Stakeholders in cybersecurity
Let's discuss the hierarchy within an organization.It goes from you, the analyst, to management, ...
Welcome to module 3
We've covered so much in previous courses, from the foundations of security to a basic understand...
Juliana's story: Attention to detail
This is the second reading in the scenario about Juliana Soto, a cybersecurity analyst who was re...
Escalation timing
You previously learned about the potential impact even the smallest incident can have on an organ...
When and how to escalate a security incident
We've shared quite a bit about the importance of your role when it comes to escalating incidents....
From simple activity to major data breach
So far, we've discussed different incident types and the importance of escalating those incidents...
Recognize roles and responsibilities during escalation
You previously learned about various incident classification types and how those incidents can im...
Prepare to escalate through security recognition
Previously, we defined what it means to escalate an incident.We also discussed the skills needed ...
Escalate with a purpose
You previously learned about security incident escalation and the skills needed to help you escal...
The importance of escalation
Security analysts are hired to protect company assets and data, including knowing when and how to...
The importance of escalation
Security analysts are hired to protect company assets and data, including knowing when and how to...
Welcome to module 2
I'm excited that you could join me today!Previously, you learned about the importance of various ...
Wrap-up; Terms and definitions from Course 8, Module 1
You've had an opportunity to learn more about the important role an entry-level analyst plays in ...
Juliana's story: Asset protection
Meet Juliana Soto, who recently completed an online cybersecurity certificate program and was hir...
Disaster recovery and business continuity
The role of a security professional is to ensure a company’s data and assets are protected from t...
Detect and protect without neglect
Welcome back!In earlier courses, we discussed the impact that security incidents can have on the ...
Data and asset classification
Protecting an organization’s business operations and assets from security threats, risks, and vul...
Security as a mindset
Let's take a little time to discuss a concept that would help you throughout your security career...
firefox yt better audio scaling for when im studying
// ==UserScript== // @name Youtube Music fix volume ratio // @namespace...