Security Operations

Intermediate
  • 16 videos | 45m 40s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 77 users Rating 4.4 of 77 users (77)
Enterprise computer systems require a solid understanding of security practices. Explore codes of ethics, confidentiality, integrity, and availability, privacy, accountability, and non-repudiation, and security best practices.

WHAT YOU WILL LEARN

  • Identify characteristics of the (isc)2 code of ethics and best practices for compliance
    Identify best practices for compliance with organizational code of ethics
    Describe characteristics of the concept of confidentiality
    Identify characteristics of the concept of integrity
    Identify characteristics of the concept of availability
    Identify characteristics of the concept of accountability
    Identify characteristics of the concept of privacy
    Identify characteristics of the concept of non-repudiation
  • Identify characteristics of the concept of least privilege
    Identify characteristics of the concept of separation of duties
    Describe best practices for deterrent security controls
    Describe best practices for preventive security controls
    Describe best practices for detective security controls
    Describe best practices for corrective security controls
    Describe best practices for compensating security controls
    Identify appropriate best practices when implementing different types of operational security controls

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 193 users Rating 4.5 of 193 users (193)
Rating 4.3 of 16 users Rating 4.3 of 16 users (16)
Rating 3.5 of 302 users Rating 3.5 of 302 users (302)