CISSP 2021: Fundamental Concepts & Principles
CISSP
| Expert
- 9 videos | 28m
- Includes Assessment
- Earns a Badge
Even with several years of practical experience in the security field, knowledge and application of specific security concepts and principles may have eluded even the seasoned security professional. Use this course to brush up on some of the vital, core security principles, such as confidentiality, integrity, and non-repudiation. Be reminded of the critical role of security design in the ISO OSI 7-layer Reference Model and the 4-layer TCP/IP Reference Model. Upon completion of this course, you'll be fully attuned to the most fundamental aspects of security. Furthermore, you can use this course to prepare for the CISSP exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine confidentiality as it relates to a key goal of securityDefine integrity as it relates to a key goal of securityDefine availability as it relates to a key goal of securityDefine authenticity as it relates to a key goal of security
-
Define non-repudiation as it relates to a key goal of securityOutline the iso osi reference model and describe how it's used by security practitionersOutline the tcp/ip reference model and describe how it's leveraged by security practitionersSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 45sIn this video, you’ll learn more about the course and your instructor. In this course, you’ll learn the key core principles of security, including confidentiality, integrity, and non-repudiation. You’ll also be reminded of the role of security design in the ISO OSI 7-layer reference model and the four-layer TCP IP model. FREE ACCESS
-
3m 31sIn this video, you’ll learn more about confidentiality as a security goal. There are controls that raise the level of difficulty or create resistance for threat actors and threat agents. One of those goals is confidentiality. Confidentiality measures the attacker's ability to get unauthorized data or access to information from an application or a system. Confidentiality involves using techniques, like cryptographic mechanisms, to allow only approved users the ability to view sensitive information. FREE ACCESS
-
2m 59sIn this video, you’ll learn more about integrity as a security goal. Integrity represents the I of the CIA triad. Integrity security measures an attacker's ability to manipulate, modify, change, or remove data at rest and or data in transit, realizing that the data at rest could be configuration of applications or systems. Integrity involves implementing the controls that ensure only authorized subjects can change sensitive information. FREE ACCESS
-
3m 22sIn this video, you’ll learn more about availability as a security goal. Availability is the A of the CIA triad. It measures an attacker's ability to disrupt or prevent access to services or data. Availability controls will protect systems and services from spoofing attacks, floods, denial-of-service or distributed denial-of-service, poisoning, and other attacks that negatively affect the ability to deliver data, content, or services. FREE ACCESS
-
4m 3sIn this video, you’ll learn more about authenticity as a security goal. Availability is the A of the CIA triad. It measures an attacker's ability to disrupt or prevent access to services or data. Availability controls will protect systems and services from spoofing attacks, floods, denial-of-service or distributed denial-of-service, poisoning, and other attacks that negatively affect the ability to deliver data, content, or services. FREE ACCESS
-
2m 18sIn this video, you’ll learn more about non-repudiation as a security goal. There are five pillars of information assurance. Non-repudiation is the fifth and it's defined as the inability to refuse participation in a digital transaction, contract, or communication, for example, e-mail when S/MIME is being used. Participation refers to denying participation, so when a guarantee that a message transmission or a transaction or a contract between parties on the Internet is guaranteed. FREE ACCESS
-
6m 4sIn this video, you’ll learn more about the seven-layer OSI model. It’s important to remember how security relates to these different layers. If you look at these different layers and the descriptions of these layers, one thing you’ll see is that native security is not built-in, especially to functionality at layer 1 through 4. You must use additional protocols or other extensible mechanisms to provide security, specifically at layers 2 through 4. FREE ACCESS
-
3m 19sIn this video, you’ll learn more about the TCP/IP reference model. You’ll see it has four layers. This model combines the Session, Presentation, and Application layers of OSI layers 5, 6, and 7 into one Application layer. Most of the activities in modern applications are combined by the application, whether traditional programming, or microservices, or container. In this model, the Physical layer 1 and the Link layer are combined into a single Network Access layer. FREE ACCESS
-
38sIn this video, you’ll summarize what you’ve learned in the course. In this course, you’ve learned about the CIA Triad and other fundamental concepts, like the Parkerian Hexad and non-repudiation. You also explored the OSI Reference Model and how it relates to security and the TCP/IP Reference Model. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.