CISSP 2024: Collecting & Analyzing Security Process Data
CISSP 2024
| Expert
- 10 videos | 22m 56s
- Includes Assessment
- Earns a Badge
Collecting and analyzing security process data is a key aspect of maintaining and improving the overall security of a business or organization, and there is a vast array of sources and metrics that must be considered. In this course, learn about account management process data collection, management review and approval data collection, and key concepts of security management key performance indicators (KPI) and key risk indicators (KRIs). Next, examine data backup verification best practices, training and awareness process data, and disaster recovery (DR) and business continuity (BC) process data. Finally, discover how to analyze test output and generate reports, and explore best practices for proper security audit reporting. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline methods for collecting security process data for account managementRecognize the purpose of collecting security process data for management review and approvalIdentify the key concepts of security management key performance indicators (kpis) and key risk indicators (kris)Outline backup verification best practices
-
Identify what training and awareness data is and the key concepts of security training monitoring and reportingRecognize the key concepts of disaster recovery (dr) and business continuity (bc) process dataDescribe analysis and report generation for remediation testing output, exception handling output, and ethical disclosureIdentify best practices for proper security audit reportingSummarize the key concepts covered in this course
IN THIS COURSE
-
44sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
2m 21sUpon completion of this video, you will be able to outline methods for collecting security process data for account management. FREE ACCESS
-
2m 39sAfter completing this video, you will be able to recognize the purpose of collecting security process data for management review and approval. FREE ACCESS
-
3m 45sThrough this video, you will be able to identify the key concepts of security management key performance indicators (KPIs) and key risk indicators (KRIs). FREE ACCESS
-
2m 31sUpon completion of this video, you will be able to outline backup verification best practices. FREE ACCESS
-
2m 3sIn this video, we will identify what training and awareness data is and the key concepts of security training monitoring and reporting. FREE ACCESS
-
3m 23sThrough this video, you will be able to recognize the key concepts of disaster recovery (DR) and business continuity (BC) process data. FREE ACCESS
-
2m 53sAfter completing this video, you will be able to describe analysis and report generation for remediation testing output, exception handling output, and ethical disclosure. FREE ACCESS
-
1m 55sUpon completion of this video, you will be able to identify best practices for proper security audit reporting. FREE ACCESS
-
44sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.