Security Operations
Intermediate
- 16 videos | 45m 40s
- Includes Assessment
- Earns a Badge
Enterprise computer systems require a solid understanding of security practices. Explore codes of ethics, confidentiality, integrity, and availability, privacy, accountability, and non-repudiation, and security best practices.
WHAT YOU WILL LEARN
-
Identify characteristics of the (isc)2 code of ethics and best practices for complianceIdentify best practices for compliance with organizational code of ethicsDescribe characteristics of the concept of confidentialityIdentify characteristics of the concept of integrityIdentify characteristics of the concept of availabilityIdentify characteristics of the concept of accountabilityIdentify characteristics of the concept of privacyIdentify characteristics of the concept of non-repudiation
-
Identify characteristics of the concept of least privilegeIdentify characteristics of the concept of separation of dutiesDescribe best practices for deterrent security controlsDescribe best practices for preventive security controlsDescribe best practices for detective security controlsDescribe best practices for corrective security controlsDescribe best practices for compensating security controlsIdentify appropriate best practices when implementing different types of operational security controls
IN THIS COURSE
-
2m 19s
-
2m 25s
-
3m 36s
-
3m 1s
-
3m 1s
-
3m 52s
-
2m 45s
-
3m 28s
-
2m 53s
-
2m 28s
-
2m 28s
-
2m 36s
-
3m 28s
-
2m 22s
-
2m 20s
-
2m 38s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.