Communicating Cybersecurity Findings Effectively

1 H 35 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
  • Vulnerability Management Reporting and Communication
    • Course Overview
    • Communicate Vulnerability Management Reporting
    • Communicate Vulnerability Metrics and KPIs
    • Communicate Compliance Reporting
    • Communicate Inhibitors to Remediation
  • Incident Response Reporting and Communication
    • Communicate Incident Response Reports
    • Communicate Root Cause Analysis
    • Communicate Incident Response Metrics and KPIs

Course Overview

3 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

WEBVTT >> Welcome. And thank you for joining us for this course. I'm going to be your host, Sophie Goodwin throughout this course. Most going to your Lerner advocate asking questions along the way things you might be wondering at home. So that's what I'm here for. And I'm joined by Wes Bryan. He's going to be our. >> head Edutainer, our subject matter expert on this course Wes a little about yourself. Sure, absolutely, Sophia. So I have been doing technical instruction, you know, and technical instructor now for better than a decade. I've taught a lot of security classes to have many great, many people, you know, held multiple certifications, CompTIA certifications, Microsoft certifications, Lenox certification. So I'm really, really looking forward to being the person that is going to help you along with Sophia, take this journey through this course. And this course will be talking about communicating your cybersecurity findings of what we're talking. Yeah, sure. So it's the communicating the importance, right. As the cybersecurity analyst. You you have the job of communicating things like, for instance, vulnerability reports, right? Incident response reports, you know, and it's going to be up to you to communicate that to a variety of stakeholders. So we'll look at communicating the importance of vulnerability management reporting. We'll look at the metrics and the KP eyes as well. These are just some of the things that we're going to see inside of this discourse. >> OK, so I'm here to learn and is here to learn as much as I can look just like with every question here learn. But for those watching at home, what might they get out of this course? Who is this for really anyone? >> You know, we don't have any prerequisites from this course that they may be the only prerequisite is just to have a kind of an understanding of what vulnerability management is because we are here to teach you the importance of communicating report at the end of the day. So this is the the results, right, that piece of paper that the company really, really want so that they can make key decisions on it. So I want you to understand that outside of that, there's really no prerequisites to join this course, right? Anybody that is looking to maybe be a cyber security analysts, maybe incident report of the incident response team, the cyber security incident response team, you know, you could be taking an exam. They this is an example cause, but you could be taking an exam or you could just be part of the help desk. Maybe you want to level up some of those skills and maybe you want to get your way into the it security team. This is also part of you or of you would also be benefiting by this if you're in a support staff for all right. So really, just anybody that has some kind of background and security, because remember, there is a little bit of us knowledge here that you have an understanding, even if it's just a few months of some basic security concepts when you come to this table and outside of that. >> We look forward to anybody joining us. I'm sure here say the word security and vulnerability and communication. A lot of this course. Those look up a lot. So now you'll be learning a lot about those things. And lastly, before we set off this overview, what are you excited about the course? You know, I just >> really, really love the ability to make other, you know, other students of technology. You know, Sophie and I we're both students of technology. We know you're joining us because you are a student of technology. And I really like being the one that can advocate for your says success by providing will, you know, course, that you can easily understand in an easy to understand conversational format. And I absolutely love technology when it works. Sometimes it doesn't work, but that's what keeps us with jobs, right? But I absolutely getting us. I love technology and I would love for you to join us and take this ride with us. >> Love hate relationship that I love to hate it. Heart of the job right now. Thank you for joining us for this overview. We're excited to have you join us for this course on communicating cybersecurity findings effectively. We'll see you there