- 11 Sections
- 102 Lessons
- Lifetime
Expand all sectionsCollapse all sections
- 1. Cybersecurity Career Landscape16
- 1.1IHLN 1.1 Corporate cybersecurity fundamentals
- 1.2IHLN 1.2 Enterprise security vs personal security
- 1.3IHLN 1.3 Key threat types for businesses
- 1.4IHLN 1.4 Incidents, breaches, and violations
- 1.5IHLN 1.5 Technical and non-technical security roles
- 1.6IHLN 1.6 SOC, penetration testing, and security engineering overview
- 1.7IHLN 1.7 GRC analyst responsibilities
- 1.8IHLN 1.8 Risk analyst responsibilities
- 1.9IHLN 1.9 Third-party risk analyst responsibilities
- 1.10IHLN 1.10 Privacy and data protection roles
- 1.11IHLN 1.11 Overlap between GRC, Risk, and Privacy
- 1.12IHLN 1.12 Day-to-day work of non-technical security professionals
- 1.13IHLN 1.13 Career levels and progression
- 1.14IHLN 1.14 Typical entry-level tasks
- 1.15IHLN 1.15 Why businesses need process-oriented security professionals
- 1.16IHLN 1. Quiz3 Questions
- 2. Corporate Security Fundamentals11
- 2.1IHLN 2.1 Company assets and what needs protection
- 2.2IHLN 2.2 Information as a business asset
- 2.3IHLN 2.3 Users, systems, and data
- 2.4IHLN 2.4 Internal and external threats
- 2.5IHLN 2.5 Human factors in security
- 2.6IHLN 2.6 Social engineering at the process level
- 2.7IHLN 2.7 Process failures as incident sources
- 2.8IHLN 2.8 Least-privilege access principle
- 2.9IHLN 2.9 User lifecycle management
- 2.10IHLN 2.10 Why security breaks during business growth
- 2.11IHLN 2. Quiz3 Questions
- 3. Risk Management Fundamentals16
- 3.1IHLN 3.1 Risk in cybersecurity
- 3.2IHLN 3.2 Threats, vulnerabilities, and risks
- 3.3IHLN 3.3 Business risks vs IT risks
- 3.4IHLN 3.4 Likelihood assessment
- 3.5IHLN 3.5 Impact assessment
- 3.6IHLN 3.6 Qualitative risk assessment
- 3.7IHLN 3.7 Quantitative risk assessment
- 3.8IHLN 3.8 Risk matrices
- 3.9IHLN 3.9 Risk acceptance
- 3.10IHLN 3.10 Risk mitigation approaches
- 3.11IHLN 3.11 Risk transfer through contracts and insurance
- 3.12IHLN 3.12 Risk avoidance
- 3.13IHLN 3.13 Residual risk
- 3.14IHLN 3.14 Risk ownership
- 3.15IHLN 3.15 Communicating risks to management
- 3.16IHLN 3. Quiz3 Questions
- 4. GRC: Governance14
- 4.1IHLN 4.1 Governance in cybersecurity
- 4.2IHLN 4.2 Role of security policies
- 4.3IHLN 4.3 Policies, procedures, and instructions
- 4.4IHLN 4.4 Document hierarchy
- 4.5IHLN 4.5 Policy scope and applicability
- 4.6IHLN 4.6 Access management policies
- 4.7IHLN 4.7 Password management policies
- 4.8IHLN 4.8 Remote work policies
- 4.9IHLN 4.9 Contractor and vendor policies
- 4.10IHLN 4.10 Incident response policies
- 4.11IHLN 4.11 Security training programs
- 4.12IHLN 4.12 Security awareness
- 4.13IHLN 4.13 Employee and management accountability
- 4.14IHLN 4. Quiz3 Questions
- 5. GRC: Compliance13
- 5.1IHLN 5.1 Compliance in cybersecurity
- 5.2IHLN 5.2 Why companies undergo audits
- 5.3IHLN 5.3 Logic of standards and regulations
- 5.4IHLN 5.4 Reading and interpreting requirements
- 5.5IHLN 5.5 Controls as the core compliance unit
- 5.6IHLN 5.6 Types of controls
- 5.7IHLN 5.7 Documentary evidence
- 5.8IHLN 5.8 Preparing for internal audits
- 5.9IHLN 5.9 Preparing for external audits
- 5.10IHLN 5.10 Working with audit findings
- 5.11IHLN 5.11 Corrective and preventive actions
- 5.12IHLN 5.12 Maintaining compliance over time
- 5.13IHLN 5. Quiz3 Questions
- 6. Risk and Control Registers10
- 6.1IHLN 6.1 Risk registers
- 6.2IHLN 6.2 Structure of a risk record
- 6.3IHLN 6.3 Linking risks and controls
- 6.4IHLN 6.4 Control registers
- 6.5IHLN 6.5 Mapping risks, controls, and requirements
- 6.6IHLN 6.6 Using spreadsheets and shared tools
- 6.7IHLN 6.7 Versioning and maintenance
- 6.8IHLN 6.8 Risk reporting for management
- 6.9IHLN 6.9 Common mistakes in risk registers
- 6.10IHLN 6. Quiz3 Questions
- 7. GRC Tools and Working Environment8
- 7.1IHLN 7.1 Purpose of GRC platforms
- 7.2IHLN 7.2 Compliance automation
- 7.3IHLN 7.3 Managing controls in GRC systems
- 7.4IHLN 7.4 Security task management
- 7.5IHLN 7.5 Using Jira for risk tracking
- 7.6IHLN 7.6 Using Confluence as a security knowledge base
- 7.7IHLN 7.7 Evidence and document storage practices
- 7.8IHLN 7. Quiz3 Questions
- 8. Third-Party Risk Management9
- 8.1IHLN 8.1 Why vendors introduce risk
- 8.2IHLN 8.2 Vendor lifecycle management
- 8.3IHLN 8.3 Risk-based vendor classification
- 8.4IHLN 8.4 Security questionnaires
- 8.5IHLN 8.5 Analyzing vendor responses
- 8.6IHLN 8.6 Requesting additional evidence
- 8.7IHLN 8.7 Vendor onboarding decisions
- 8.8IHLN 8.8 Ongoing risk monitoring during contracts
- 8.9IHLN 8. Quiz3 Questions
- 9. Privacy and Personal Data Protection9
- 9.1IHLN 9.1 Personal data in business contexts
- 9.2IHLN 9.2 Categories of personal data
- 9.3IHLN 9.3 Roles and responsibilities in privacy
- 9.4IHLN 9.4 Data minimization
- 9.5IHLN 9.5 Data retention and deletion
- 9.6IHLN 9.6 Data subject requests
- 9.7IHLN 9.7 Personal data breaches
- 9.8IHLN 9.8 Interaction between privacy and cybersecurity
- 9.9IHLN 9. Quiz3 Questions
- 10. Career Development and Growth6
- 10.1IHLN 10.1 Positioning yourself as a GRC, Risk, or Privacy analyst
- 10.2IHLN 10.2 Understanding job descriptions and market expectations
- 10.3IHLN 10.3 Skills for growth into security management roles
- 10.4IHLN 10.4 Interview preparation and portfolio evidence
- 10.5IHLN 10.5 Building repeatable workflows on the job
- 10.6IHLN 10. Quiz3 Questions
- IHLN FinalQuiz1