Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Treehouse

(UPI) Chapter 14: Best Practices and Recommendations for Cybersecurity Service Providers Course (How To)

via Treehouse

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it

About this Course

In this chapter, the discussion focuses on best practices and recommendations for cybersecurity service providers, highlighting the multifaceted policy domains they must navigate and the ethical dilemmas that arise from handling sensitive data, threat intelligence, vulnerability disclosure, and penetration testing. It emphasizes the need for robust, transparent policies and an ethical culture to balance commercial objectives with the broader public good.

Syllabus

14.2 Domains for Policy Implementations

In this stage, the chapter examines the regulatory and operational challenges cybersecurity vendors face—including data handling, breach management, threat intelligence, vulnerability disclosure, and data sharing—while illustrating dilemmas such as whether to whitelist governmental malware.

Chevron 8 steps
  • instruction

    14.1 Introduction: Dilemmas of Cybersecurity Service Providers

  • instruction

    14.1.1 Example: Dealing with Governmental Malware

  • instruction

    14.2.1 Customer Data Handling

  • instruction

    14.2.2 Information About Breaches

  • instruction

    14.2.3 Threat Intelligence Activities

  • instruction

    14.2.4 Vulnerability-Related Information

  • instruction

    14.2.5 Data Sharing with Peers

  • Quiz 14.2

    5 questions

14.3 Special Considerations for Penetration Testing

In this stage, the chapter explores the unique ethical and operational issues in conducting penetration tests, from order initiation to execution and governance, emphasizing the importance of managing information asymmetry and maintaining professional integrity.

Chevron 5 steps
  • instruction

    Introduction

  • instruction

    14.3.1 Order Initiation

  • instruction

    14.3.2 Execution

  • instruction

    14.3.3 Supervision and Governance

  • Quiz 14.3

    5 questions

Reviews

Start your review of (UPI) Chapter 14: Best Practices and Recommendations for Cybersecurity Service Providers Course (How To)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.