CISSP – Security and Risk Management & Asset Security

CISSP Certification Domain 1 & 2 – Learning Security and Risk Management and Asset Security in this Course.

Welcome to this course: CISSP Certification Domain 1 & 2: The Complete Course. The CISSP certification is the industry’s gold standard, necessary for many mid and senior-level positions. In reality, organizations have many other things to do than practice security. In this course we will cover many of the disciplines that are necessary for organizations to practice security in a holistic manner. Understanding and applying risk management concepts, threat modeling, and establishing business continuity requirements are some of the main topics covered in this course. Each organization must develop an enterprisewide security program that consists of technologies, procedures, and processes covered throughout this course. An asset is, by definition, anything of worth to an organization. Information security is the preservation of confidentiality and integrity and the availability of assets. While every asset needs to be protected, as discussed in risk management, this course focuses exclusively on protecting information assets. Assets have intrinsic value to the business and are classified into various types. The type of asset and its value are used to determine the required level of security assurance. Information is typically the most valuable asset to an organization and lies at the heart of every information system, so precision focus on its protection makes a lot of sense.

What you’ll learn

  • Understand and apply concepts of confidentiality, integrity and availability.
  • Evaluate and apply security governance principles.
  • Determine compliance requirements.
  • Understand legal and regulatory issues that pertain to information security in a global context.
  • Understand, adhere to, and promote professional ethics.
  • Develop, document, and implement security policy, standards, procedures, and guidelines.
  • Identify, analyze, and prioritize Business Continuity (BC) requirements.
  • Contribute to and enforce personnel security policies and procedures.
  • Understand and apply risk management concepts.
  • Understand and apply threat modeling concepts and methodologies.
  • Apply risk-based management concepts to the supply chain.
  • Establish and maintain a security awareness, education, and training program.
  • Identify and classify information and assets.
  • Determine and maintain information and asset ownership.
  • Protect privacy.
  • Ensure appropriate asset retention.
  • Determine data security controls.
  • Establish information and asset handling requirements.

Course Content

  • Be a Leader in the Field of Information Security –> 1 lecture • 2min.
  • Getting Started With This Course –> 1 lecture • 9min.
  • Learn and Understand Security Definitions –> 9 lectures • 1hr 3min.
  • Learn and Understand Governance –> 21 lectures • 2hr 11min.
  • Information Systems Risk Management –> 20 lectures • 1hr 56min.
  • Learn and Understand Personnel Security –> 12 lectures • 1hr 4min.
  • Learn About Security-Awareness Training –> 6 lectures • 33min.
  • Security and Risk Management Summary –> 1 lecture • 3min.
  • Asset Security –> 1 lecture • 1min.
  • Understanding Information Life Cycle –> 6 lectures • 38min.

CISSP - Security and Risk Management & Asset Security

Requirements

  • A PC or Mac.
  • Internet Access.

Welcome to this course: CISSP Certification Domain 1 & 2: The Complete Course. The CISSP certification is the industry’s gold standard, necessary for many mid and senior-level positions. In reality, organizations have many other things to do than practice security. In this course we will cover many of the disciplines that are necessary for organizations to practice security in a holistic manner. Understanding and applying risk management concepts, threat modeling, and establishing business continuity requirements are some of the main topics covered in this course. Each organization must develop an enterprisewide security program that consists of technologies, procedures, and processes covered throughout this course. An asset is, by definition, anything of worth to an organization. Information security is the preservation of confidentiality and integrity and the availability of assets. While every asset needs to be protected, as discussed in risk management, this course focuses exclusively on protecting information assets. Assets have intrinsic value to the business and are classified into various types. The type of asset and its value are used to determine the required level of security assurance. Information is typically the most valuable asset to an organization and lies at the heart of every information system, so precision focus on its protection makes a lot of sense.

In this course, you’ll learn:

  • Understand and apply concepts of confidentiality, integrity and availability
  • Evaluate and apply security governance principles
  • Determine compliance requirements
  • Understand legal and regulatory issues that pertain to information security in a global context
  • Understand, adhere to, and promote professional ethics
  • Develop, document, and implement security policy, standards, procedures, and guidelines
  • Identify, analyze, and prioritize Business Continuity (BC) requirements
  • Contribute to and enforce personnel security policies and procedures
  • Understand and apply risk management concepts
  • Understand and apply threat modeling concepts and methodologies
  • Apply risk-based management concepts to the supply chain
  • Establish and maintain a security awareness, education, and training program
  • Identify and classify information and assets
  • Determine and maintain information and asset ownership
  • Protect privacy
  • Ensure appropriate asset retention
  • Determine data security controls

This course will help you to enter the exam room with confidence, knowing that you have done all you can to prepare for the big day. So let’s get started.

Get Tutorial