From the course: Ethical Hacking: Introduction to Ethical Hacking
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Asset inventory
From the course: Ethical Hacking: Introduction to Ethical Hacking
Asset inventory
- [Instructor] An organization has multiple assets that can be at risk of a cyber attack. In this segment, we'll discover the different types of assets, along with a discussion on how to conduct an inventory. Companies, government bodies, and individuals have assets, which are resources that can be assigned a value. Assets include tangible assets, such as printers, servers, infrastructure devices, and workstations. There's also intangible assets, such as trade secrets, databases, and company records. Knowing what assets that you have is essential. So let's talk about why this is important. Prior to completing a risk analysis exercise, you must identify and prioritize your assets so that you understand exactly what is at risk. Once done, the next step is to develop and implement policies and procedures to protect the assets. For this task, the team will need to inventory all assets and then assign a business value based on how…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Managing risks3m 14s
-
(Locked)
Asset inventory4m 35s
-
(Locked)
Defining information security standards3m 47s
-
(Locked)
Outlining US regulations4m 8s
-
(Locked)
Exploring global cyber laws and standards3m 39s
-
(Locked)
Challenge: Cyber threat information sharing1m 2s
-
(Locked)
Solution: Cyber threat information sharing2m 23s
-
(Locked)
-
-