- [Instructor] Emergency management plans…are an important component…of an organization's commitment to employee safety.…Every organization should conduct a risk assessment…to identify the major risks to employee safety,…and then develop emergency response plans…that dictate how the organization will respond…if each event occurs.…Some emergency management plans are commonplace.…For example, almost every organization…has a fire plan that explains how employees and managers…should respond in the event of a fire in the building.…
This fire plan should include notifying the fire department,…evacuating the building,…reassembling at a designated location,…and accounting for everyone in the building.…The organization's fire plan likely also includes…regular fire drills that ensure employees…remain familiar with the procedures.…Organizations should also develop plans…for protecting employees…in the event of a weather emergency.…The exact nature of these emergencies will vary…from region to region, but may include protecting…
Author
Updated
10/27/2020Released
11/15/2018- Building a security team
- Conducting a gap analysis
- Improving personnel security
- File permissions and data encryption
- Cloud computing and virtualization
- Host-based network security controls
- Securing mobile devices
- Choosing encryption algorithms
- Physical and network security
- Biometrics and multifactor authentication
- Development methodologies
Skill Level Intermediate
Duration
Views
Related Courses
-
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Intermediate -
Implementing an Information Security Program
with Kip Boyle2h 33m Intermediate -
IT Security: Key Policies and Resources
with Gregory Michaelidis23m 44s Intermediate -
CISM Cert Prep: 1 Information Security Governance
with Mike Chapple1h 50m Intermediate
-
Introduction
-
Study resources1m 23s
-
1. Information Security Program Development
-
Scope and charter3m 32s
-
Building a security team3m 16s
-
Conducting a gap analysis3m 12s
-
-
2. Personnel Security
-
Employee termination process2m 43s
-
Employee privacy2m 23s
-
Social networking3m 52s
-
3. Data Security Controls
-
File permissions10m 20s
-
Data encryption6m 21s
-
-
4. Cloud Computing and Virtualization
-
Virtualization4m 21s
-
Cloud computing models3m 44s
-
Public cloud tiers5m 35s
-
Cloud storage security5m 17s
-
-
5. Host Security
-
Operating system security4m 35s
-
Malware prevention8m 54s
-
Application management6m 48s
-
Hardware security4m 13s
-
-
6. Mobile Security
-
Mobile device security2m 35s
-
Mobile device management6m 14s
-
Mobile device tracking3m 14s
-
Mobile application security4m 22s
-
-
7. Cryptography
-
Understanding encryption3m 24s
-
Goals of cryptography3m 47s
-
The cryptographic life cycle2m 49s
-
Key exchange3m 4s
-
Diffie–Hellman5m 10s
-
Key escrow3m 13s
-
Key stretching1m 55s
-
Trust models3m 2s
-
PKI and digital certificates4m 28s
-
Hash functions9m 11s
-
Digital signatures4m 4s
-
TLS and SSL4m 1s
-
IPsec3m
-
Securing common protocols6m 30s
-
-
8. Physical Security
-
Physical access control3m 58s
-
Visitor management1m 35s
-
9. Network Security
-
Routers and switches2m 31s
-
Firewalls4m 20s
-
VPNs and VPN concentrators2m 55s
-
Unified threat management1m 54s
-
Network access control4m 15s
-
Remote network access5m 18s
-
-
10. Identity and Access Management
-
Usernames and access cards3m 27s
-
Authentication factors3m 30s
-
Biometrics2m 35s
-
Multifactor authentication2m 33s
-
Something you have3m 15s
-
11. Asset Management
-
12. Personnel Safety
-
Employee safety2m 26s
-
Emergency management2m 14s
-
-
13. Software Security
-
Application security4m 16s
-
Development methodologies6m 17s
-
Maturity models3m 34s
-
Risk analysis and mitigation3m 43s
-
Software testing3m 11s
-
Acquired software3m 7s
-
-
Conclusion
-
What's next?44s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Emergency management