Filter Keyword to...

Category: IT Professionals

Results Per Page :
Managing incidents, and the response that is put forward by an organization falls directly under the duties of a CISM. Organizations must have a plan in place, and must know the steps they will take to deal...
[READ MORE]
Managing incidents, and the response that is put forward by an organization falls directly under the duties of a CISM. Organizations must have a plan in place, and must know the steps they will take to deal with incidents when they occur. This course examines what incident management is, how responses are prepared, and concepts and technologies that are used when dealing with incidents. This course also looks at the principles, importance of, and outcomes of incident management and how the information security manager, with the approval of senior management, prepares the people and the resources of the organization to deal with incidents when they occur. Finally, this course explains the steps for conducting a business impact analysis as technique used in effective incident management. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Managing incidents, and the response that is put forward by an organization falls directly under the duties of a CISM. Organizations must have a plan in place, and must know the steps they will take to deal with incidents when they occur. This course examines what incident management is, how responses are prepared, and concepts and technologies that are used when dealing with incidents. This course also looks at the principles, importance of, and outcomes of incident management and how the information security manager, with the approval of senior management, prepares the people and the resources of the organization to deal with incidents when they occur. Finally, this course explains the steps for conducting a business impact analysis as technique used in effective incident management. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Preparing incident response and recovery plans is a very important part of a CISM's role. This course examines how to identify the current state of incident response capability, identifies the elements of...
[READ MORE]
Preparing incident response and recovery plans is a very important part of a CISM's role. This course examines how to identify the current state of incident response capability, identifies the elements of incident response and recovery plans, and discusses principles for effectively managing the plans. This course also examines the importance of testing, documentation, and how to physically prepare recovery sites and related offsite resources. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Preparing incident response and recovery plans is a very important part of a CISM's role. This course examines how to identify the current state of incident response capability, identifies the elements of incident response and recovery plans, and discusses principles for effectively managing the plans. This course also examines the importance of testing, documentation, and how to physically prepare recovery sites and related offsite resources. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
An information security program is the foundation of an information security manager's daily work. This course examines the purpose and fundamentals of IS program development and management, along with the...
[READ MORE]
An information security program is the foundation of an information security manager's daily work. This course examines the purpose and fundamentals of IS program development and management, along with the objectives, concepts, and tasks that make up an IS program. This course also examines the scope and charter of an IS program, and how the IS Manager must understand the scope of the program, and things such as chain of command, corporate culture, existing functions, current state of security, and industry standards for information security. It outlines the steps for developing an IS program and how an information security program supports the objectives of information security governance. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
An information security program is the foundation of an information security manager's daily work. This course examines the purpose and fundamentals of IS program development and management, along with the objectives, concepts, and tasks that make up an IS program. This course also examines the scope and charter of an IS program, and how the IS Manager must understand the scope of the program, and things such as chain of command, corporate culture, existing functions, current state of security, and industry standards for information security. It outlines the steps for developing an IS program and how an information security program supports the objectives of information security governance. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
An information security framework represents the entire IS management structure. This course examines governance frameworks such as COBIT and industry standards like ISO/IEC 27001. This course also examines...
[READ MORE]
An information security framework represents the entire IS management structure. This course examines governance frameworks such as COBIT and industry standards like ISO/IEC 27001. This course also examines the components of a security framework: operational components, management components, administrative components, and education and informational components. The course then explains how an IS program road map is defined, and the elements that make up the road map. Finally, the course describes the security architectures and how they are implemented. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
An information security framework represents the entire IS management structure. This course examines governance frameworks such as COBIT and industry standards like ISO/IEC 27001. This course also examines the components of a security framework: operational components, management components, administrative components, and education and informational components. The course then explains how an IS program road map is defined, and the elements that make up the road map. Finally, the course describes the security architectures and how they are implemented. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Information security managers are responsible for all administrative activities related to the development and management of an information security program. Those activities include such things as assigning...
[READ MORE]
Information security managers are responsible for all administrative activities related to the development and management of an information security program. Those activities include such things as assigning and training security personnel, overseeing the creation and distribution of policies and other documentation, and monitoring the effectiveness of the security program itself. This course examines the many activities that an information security manager is responsible for and the skills required to perform them. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Information security managers are responsible for all administrative activities related to the development and management of an information security program. Those activities include such things as assigning and training security personnel, overseeing the creation and distribution of policies and other documentation, and monitoring the effectiveness of the security program itself. This course examines the many activities that an information security manager is responsible for and the skills required to perform them. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Information security programs typically have numerous operational responsibilities and provide a variety of security services. While programs vary from organization to organization, there are operations and...
[READ MORE]
Information security programs typically have numerous operational responsibilities and provide a variety of security services. While programs vary from organization to organization, there are operations and services that are typically found in all well conceived security programs. This course examines the activities and responsibilities of an information security manager related to operations and services within an organization. The course will examine different organizational units such as IT, HR, and Legal that are affected by security programs, and how their needs are integrated into the program. This course also examines how audits and compliance enforcement are performed. Finally, this course examines how technology - both legacy and new technologies such as cloud computing - are managed in modern security programs. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Information security programs typically have numerous operational responsibilities and provide a variety of security services. While programs vary from organization to organization, there are operations and services that are typically found in all well conceived security programs. This course examines the activities and responsibilities of an information security manager related to operations and services within an organization. The course will examine different organizational units such as IT, HR, and Legal that are affected by security programs, and how their needs are integrated into the program. This course also examines how audits and compliance enforcement are performed. Finally, this course examines how technology - both legacy and new technologies such as cloud computing - are managed in modern security programs. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Security programs require strong controls and countermeasures to ensure that security activities are carried out and measures exist to deal with issues that may arise while a security program is being...
[READ MORE]
Security programs require strong controls and countermeasures to ensure that security activities are carried out and measures exist to deal with issues that may arise while a security program is being implemented. This course examines control categories, control design considerations, and the control methods and recommendations that a security manager should implement. This course will also discuss the metrics and monitoring practices that should be used put in place as part of a security program. Finally, this course will examine common information security program challenges. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Security programs require strong controls and countermeasures to ensure that security activities are carried out and measures exist to deal with issues that may arise while a security program is being implemented. This course examines control categories, control design considerations, and the control methods and recommendations that a security manager should implement. This course will also discuss the metrics and monitoring practices that should be used put in place as part of a security program. Finally, this course will examine common information security program challenges. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Access Control Systems & Methodology is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course...
[READ MORE]
Access Control Systems & Methodology is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon teaches you about control techniques and implementation, identification and authentication processes and commonly employed types of attacks. At the conclusion of this course, you'll be familiar with the issues and concepts required to pass the CISSP exam.
Access Control Systems & Methodology is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon teaches you about control techniques and implementation, identification and authentication processes and commonly employed types of attacks. At the conclusion of this course, you'll be familiar with the issues and concepts required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Applications Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey,...
[READ MORE]
Applications Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon goes over software development, databases, data storage, and common attacks that must be protected against. At the conclusion of this course, you will be familiar with the issues and concepts of the Applications Security domain required to pass the CISSP exam.
Applications Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon goes over software development, databases, data storage, and common attacks that must be protected against. At the conclusion of this course, you will be familiar with the issues and concepts of the Applications Security domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Business Continuity & Disaster Recovery Planning is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification...
[READ MORE]
Business Continuity & Disaster Recovery Planning is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers preliminary activities including defining project scope and conducting Business Impact Analysis (BIA), as well as the planning process, plan implementation and testing. At the conclusion of this course, you'll be familiar with issues and concepts of this domain required to pass the CISSP exam.
Business Continuity & Disaster Recovery Planning is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers preliminary activities including defining project scope and conducting Business Impact Analysis (BIA), as well as the planning process, plan implementation and testing. At the conclusion of this course, you'll be familiar with issues and concepts of this domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Cryptography is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert...
[READ MORE]
Cryptography is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers the history, methodologies and practices of cryptography, as well as common security protocols employing cryptography. At the conclusion of this course, you will be familiar with the issues and concepts of the Cryptography domain required to pass the CISSP exam.
Cryptography is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers the history, methodologies and practices of cryptography, as well as common security protocols employing cryptography. At the conclusion of this course, you will be familiar with the issues and concepts of the Cryptography domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Information Security & Risk Management is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course...
[READ MORE]
Information Security & Risk Management is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers the CIA triangle, security risk assessment, policy and other CBK elements of the Security Management Practices domain. At the conclusion of this course, you will be familiar with the issues and concepts of the Information Security & Risk Management domain required to pass the CISSP exam.
Information Security & Risk Management is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers the CIA triangle, security risk assessment, policy and other CBK elements of the Security Management Practices domain. At the conclusion of this course, you will be familiar with the issues and concepts of the Information Security & Risk Management domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Law, Regulation, Compliance, & Investigations is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep...
[READ MORE]
Law, Regulation, Compliance, & Investigations is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon helps you become familiar with principles of computer law and crime, incident handling, evidence, investigation and ethics. At the conclusion of this course, you will be familiar with the issues and concepts of the Law, Regulation, Compliance, & Investigations domain required to pass the CISSP exam.
Law, Regulation, Compliance, & Investigations is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon helps you become familiar with principles of computer law and crime, incident handling, evidence, investigation and ethics. At the conclusion of this course, you will be familiar with the issues and concepts of the Law, Regulation, Compliance, & Investigations domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Operations Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey,...
[READ MORE]
Operations Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon goes over security administration, intrusion detection, auditing, threats and countermeasures. At the conclusion of this course, you will be familiar with the issues and concepts of the Operations Security domain required to pass the CISSP exam.
Operations Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon goes over security administration, intrusion detection, auditing, threats and countermeasures. At the conclusion of this course, you will be familiar with the issues and concepts of the Operations Security domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Physical (Environmental) Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from...
[READ MORE]
Physical (Environmental) Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon reviews common threats, security controls, facility requirements and environmental issues. At the conclusion of this course, you will be familiar with the issues and concepts of the Physical Security domain required to pass the CISSP exam.
Physical (Environmental) Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon reviews common threats, security controls, facility requirements and environmental issues. At the conclusion of this course, you will be familiar with the issues and concepts of the Physical Security domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Security Architecture & Design is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from...
[READ MORE]
Security Architecture & Design is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon discusses Bell-LaPadula, Clark-Wilson and other security models, as well as common security flaws. At the conclusion of this course, you will be familiar with the issues and concepts of the Security Architecture & Design domain required to pass the CISSP exam.
Security Architecture & Design is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon discusses Bell-LaPadula, Clark-Wilson and other security models, as well as common security flaws. At the conclusion of this course, you will be familiar with the issues and concepts of the Security Architecture & Design domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Telecommunications & Network Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course...
[READ MORE]
Telecommunications & Network Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon discusses LAN technologies, devices and architectures, as well as network security techniques, protocols and common attacks. At the conclusion of this course, you'll be familiar with the issues and concepts required to pass the CISSP exam.
Telecommunications & Network Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon discusses LAN technologies, devices and architectures, as well as network security techniques, protocols and common attacks. At the conclusion of this course, you'll be familiar with the issues and concepts required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
The substantial increase in the amount of digitized data over the past few years requires an equal response in attention to the security of that data. In this course, you'll learn about asset security best...
[READ MORE]
The substantial increase in the amount of digitized data over the past few years requires an equal response in attention to the security of that data. In this course, you'll learn about asset security best practices including classification techniques and asset security ownership. This course also covers privacy protection considerations, including data remanence and collection limitations. Finally, you'll explore best practices for media, hardware and personnel retention, and techniques for determining the most appropriate data security controls like scoping, tailoring and cryptography. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
The substantial increase in the amount of digitized data over the past few years requires an equal response in attention to the security of that data. In this course, you'll learn about asset security best practices including classification techniques and asset security ownership. This course also covers privacy protection considerations, including data remanence and collection limitations. Finally, you'll explore best practices for media, hardware and personnel retention, and techniques for determining the most appropriate data security controls like scoping, tailoring and cryptography. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
Securing network communications is a key activity in managing the security of any IT system, and the network is a common and potent vector for attack. In this course, you'll learn about the design and...
[READ MORE]
Securing network communications is a key activity in managing the security of any IT system, and the network is a common and potent vector for attack. In this course, you'll learn about the design and components of network systems, how to implement secure systems, and how to mitigate common attacks. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Securing network communications is a key activity in managing the security of any IT system, and the network is a common and potent vector for attack. In this course, you'll learn about the design and components of network systems, how to implement secure systems, and how to mitigate common attacks. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
Identity and access management is at the heart of security management and is key to the CISSP examination. Compromising identity is the main aim of most attacks on data confidentiality. In this course, you'll...
[READ MORE]
Identity and access management is at the heart of security management and is key to the CISSP examination. Compromising identity is the main aim of most attacks on data confidentiality. In this course, you'll learn about physical and logical access control, the proper management of identity and identification of the identity lifecycle, and attacks to access control and their mitigation. You'll also learn about the design and components of network systems, how to implement secure systems, and how to mitigate common attacks. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Identity and access management is at the heart of security management and is key to the CISSP examination. Compromising identity is the main aim of most attacks on data confidentiality. In this course, you'll learn about physical and logical access control, the proper management of identity and identification of the identity lifecycle, and attacks to access control and their mitigation. You'll also learn about the design and components of network systems, how to implement secure systems, and how to mitigate common attacks. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
Risk management is an integral part of overall information systems security. In this course, you'll learn about personnel security best practices, risk management concepts, and risk analysis techniques....
[READ MORE]
Risk management is an integral part of overall information systems security. In this course, you'll learn about personnel security best practices, risk management concepts, and risk analysis techniques. You'll also be introduced to threat modeling best practices, countermeasure selection, and implementing risk controls. Finally, this course covers risk monitoring and reporting best practices. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Risk management is an integral part of overall information systems security. In this course, you'll learn about personnel security best practices, risk management concepts, and risk analysis techniques. You'll also be introduced to threat modeling best practices, countermeasure selection, and implementing risk controls. Finally, this course covers risk monitoring and reporting best practices. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
The time spent planning and establishing security controls isn't worth much if you don't spend time ensuring that those security designs work. In this course, you'll learn how to design and validate security...
[READ MORE]
The time spent planning and establishing security controls isn't worth much if you don't spend time ensuring that those security designs work. In this course, you'll learn how to design and validate security control assessment and test strategies, and perform vulnerability assessments. This course also covers how to perform log reviews, code reviews and tests, and perform penetration testing to test security controls. Finally, you'll learn about best practices for collecting security test data, and analyzing test outputs so you can identify gaps and implement any further required security controls in the overall security design. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
The time spent planning and establishing security controls isn't worth much if you don't spend time ensuring that those security designs work. In this course, you'll learn how to design and validate security control assessment and test strategies, and perform vulnerability assessments. This course also covers how to perform log reviews, code reviews and tests, and perform penetration testing to test security controls. Finally, you'll learn about best practices for collecting security test data, and analyzing test outputs so you can identify gaps and implement any further required security controls in the overall security design. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
Integrating comprehensive security controls into information systems planning and design activities is vital for establishing IS architecture that has necessary functionality combined with the ability to fend...
[READ MORE]
Integrating comprehensive security controls into information systems planning and design activities is vital for establishing IS architecture that has necessary functionality combined with the ability to fend off both internal and external threats. In this course, you'll learn best practices for implementing and managing secure engineering processes, including applying underlying security principles in IS architecture design. This course also introduces you to systems security evaluation models selecting appropriate controls and countermeasures. Finally, you'll learn about IS security capabilities and vulnerabilities and how to capitalize both for establishing security of the overall IS architecture. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Integrating comprehensive security controls into information systems planning and design activities is vital for establishing IS architecture that has necessary functionality combined with the ability to fend off both internal and external threats. In this course, you'll learn best practices for implementing and managing secure engineering processes, including applying underlying security principles in IS architecture design. This course also introduces you to systems security evaluation models selecting appropriate controls and countermeasures. Finally, you'll learn about IS security capabilities and vulnerabilities and how to capitalize both for establishing security of the overall IS architecture. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
Even in an age of digitized data, securing the physical environment is still a critical part of security engineering. In this course, you'll learn about security threats, both natural and man-made, and...
[READ MORE]
Even in an age of digitized data, securing the physical environment is still a critical part of security engineering. In this course, you'll learn about security threats, both natural and man-made, and techniques for preventing loss from these threats. You'll also learn about site and facility design considerations, restricted work area security, and best practices for crime prevention through secure design of the physical environment. This course is one of a series in the SkillSoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Even in an age of digitized data, securing the physical environment is still a critical part of security engineering. In this course, you'll learn about security threats, both natural and man-made, and techniques for preventing loss from these threats. You'll also learn about site and facility design considerations, restricted work area security, and best practices for crime prevention through secure design of the physical environment. This course is one of a series in the SkillSoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
The day to day security activities in an organization are the heart of security operations. In this course, you'll learn techniques for performing general security operations activities such as security...
[READ MORE]
The day to day security activities in an organization are the heart of security operations. In this course, you'll learn techniques for performing general security operations activities such as security investigations, including best practices and requirements for the types of investigations that security professionals typically take part in. This course also introduces you to techniques for using logging and monitoring activities for security purposes, establishing secure resource provisioning, and applying general security concepts such as least privilege to all security operations activities. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
The day to day security activities in an organization are the heart of security operations. In this course, you'll learn techniques for performing general security operations activities such as security investigations, including best practices and requirements for the types of investigations that security professionals typically take part in. This course also introduces you to techniques for using logging and monitoring activities for security purposes, establishing secure resource provisioning, and applying general security concepts such as least privilege to all security operations activities. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft