CISSP 2024: Collecting & Analyzing Security Process Data

CISSP 2024    |    Expert
  • 10 videos | 22m 56s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Collecting and analyzing security process data is a key aspect of maintaining and improving the overall security of a business or organization, and there is a vast array of sources and metrics that must be considered. In this course, learn about account management process data collection, management review and approval data collection, and key concepts of security management key performance indicators (KPI) and key risk indicators (KRIs). Next, examine data backup verification best practices, training and awareness process data, and disaster recovery (DR) and business continuity (BC) process data. Finally, discover how to analyze test output and generate reports, and explore best practices for proper security audit reporting. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline methods for collecting security process data for account management
    Recognize the purpose of collecting security process data for management review and approval
    Identify the key concepts of security management key performance indicators (kpis) and key risk indicators (kris)
    Outline backup verification best practices
  • Identify what training and awareness data is and the key concepts of security training monitoring and reporting
    Recognize the key concepts of disaster recovery (dr) and business continuity (bc) process data
    Describe analysis and report generation for remediation testing output, exception handling output, and ethical disclosure
    Identify best practices for proper security audit reporting
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 44s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 2m 21s
    Upon completion of this video, you will be able to outline methods for collecting security process data for account management. FREE ACCESS
  • Locked
    3.  Management Review and Approval Data Collection
    2m 39s
    After completing this video, you will be able to recognize the purpose of collecting security process data for management review and approval. FREE ACCESS
  • Locked
    4.  Key Performance and Risk Indicators
    3m 45s
    Through this video, you will be able to identify the key concepts of security management key performance indicators (KPIs) and key risk indicators (KRIs). FREE ACCESS
  • Locked
    5.  Data Backup Verification
    2m 31s
    Upon completion of this video, you will be able to outline backup verification best practices. FREE ACCESS
  • Locked
    6.  Training and Awareness Process Data
    2m 3s
    In this video, we will identify what training and awareness data is and the key concepts of security training monitoring and reporting. FREE ACCESS
  • Locked
    7.  Disaster Recovery (DR) and Business Continuity (BC) Process Data
    3m 23s
    Through this video, you will be able to recognize the key concepts of disaster recovery (DR) and business continuity (BC) process data. FREE ACCESS
  • Locked
    8.  Analyze Test Output and Generate Reports
    2m 53s
    After completing this video, you will be able to describe analysis and report generation for remediation testing output, exception handling output, and ethical disclosure. FREE ACCESS
  • Locked
    9.  Security Audit Reporting
    1m 55s
    Upon completion of this video, you will be able to identify best practices for proper security audit reporting. FREE ACCESS
  • Locked
    10.  Course Summary
    44s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.8 of 8 users Rating 4.8 of 8 users (8)