5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Certification     EC-Council     Certified Ethical Hacker (CEH)     Certified Ethical Hacker (CEH) v11

At the end of the day, cybersecurity is all about understanding risk. In this course, you'll learn about how risk pertains to cybersecurity, risk levels, and how to use a risk matrix to visualize risk. You'll also examine the concept, practice, and phases of risk management, which can help you minimize the negative effects of risk. Next, you'll explore how using Cyber Threat Intelligence is a more proactive approach towards your cybersecurity defenses and the four types of CTI. Finally, you'll learn about using threat modeling to stop threats before they become security incidents and the five steps common to the threat modeling process. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEH v11: Risk Management, Cyber Threat Intelligence & Threat Modeling

  • recognize the formula to calculate risk
  • recognize the tools used to help manage risk
  • identify the phases of risk management
  • recognize the actions performed during risk management
  • recognize high level CTI categories
  • recognize low level CTI categories
  • recognize the step in threat modeling that deals with determining the security needs of the company
  • recognize the steps to threat modeling
  • recognize the tasks performed in each step of threat modeling