CISSP 2024: Security Governance & Compliance Issues

CISSP 2024    |    Expert
  • 12 videos | 42m
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 6 users Rating 4.2 of 6 users (6)
Security governance is the set of practices exercised by executive management to offer strategic direction, ensuring that objectives are achieved, determining that risks are managed properly, and verifying that the organizations' resources are used responsibly. Begin this course by discovering how to align security governance with organizational goals and objectives. Then you will explore organizational processes like acquisitions, divestitures, and governance committees, as well as organizational roles and responsibilities. You will investigate security control frameworks like including the International Organization for Standardization (ISO), the National Institute of Standards and Technology (NIST) and learn about due diligence, due care, cybercrimes, and data breaches. Next, you will examine licensing and intellectual property requirements, import and export controls, transborder data flow, and privacy-related issues. Finally, you will focus on contractual, legal, industry standards and regulatory requirements. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Align security governance, policies, and guidance with organizational strategy, goals, mission, and objectives
    Describe organizational processes, such as acquisitions, divestitures, and governance committees
    Compare organizational roles and responsibilities, including custodians, stewards, and officers
    Compare security control frameworks, including the international organization for standardization (iso), the national institute of standards and technology (nist), control objectives for information and related technology (cobit), and the federal risk and authorization management program (fedramp)
    Provide an overview of and examples of due care and due diligence
  • Describe cybercrimes and data breaches
    Provide an overview of licensing and intellectual property requirements
    Describe import and export controls and transborder data flow
    Define issues related to privacy, such as general data protection regulation (gdpr), the california consumer privacy act, the personal information protection law, and the protection of personal information act
    Compare contractual, legal, and industry standards and regulatory requirements
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 50s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 3m 8s
    After completing this video, you will be able to align security governance, policies, and guidance with organizational strategy, goals, mission, and objectives. FREE ACCESS
  • Locked
    3.  Organizational Processes
    6m 45s
    Upon completion of this video, you will be able to describe organizational processes, such as acquisitions, divestitures, and governance committees. FREE ACCESS
  • Locked
    4.  Organizational Roles and Responsibilities
    4m 47s
    In this video, we will compare organizational roles and responsibilities, including custodians, stewards, and officers. FREE ACCESS
  • Locked
    5.  Security Control Frameworks
    5m 32s
    In this video, we will compare security control frameworks, including the International Organization for Standardization (ISO), the National Institute of Standards and Technology (NIST), Control Objectives for Information and Related Technology (COBIT), and the Federal Risk and Authorization Management Program (FedRAMP). FREE ACCESS
  • Locked
    6.  Due Diligence and Due Care
    3m 5s
    After completing this video, you will be able to provide an overview of and examples of due care and due diligence. FREE ACCESS
  • Locked
    7.  Cybercrimes and Data Breaches
    2m 11s
    Upon completion of this video, you will be able to describe cybercrimes and data breaches. FREE ACCESS
  • Locked
    8.  Licensing and Intellectual Property Requirements
    3m 36s
    After completing this video, you will be able to provide an overview of licensing and intellectual property requirements. FREE ACCESS
  • Locked
    9.  Import and Export Controls and Transborder Data Flow
    3m 32s
    Upon completion of this video, you will be able to describe import and export controls and transborder data flow. FREE ACCESS
  • Locked
    10.  Issues Related to Privacy
    3m 51s
    After completing this video, you will be able to define issues related to privacy, such as General Data Protection Regulation (GDPR), the California Consumer Privacy Act, the Personal Information Protection Law, and the Protection of Personal Information Act. FREE ACCESS
  • Locked
    11.  Contractual, Legal, and Industry Standards and Regulatory Requirements
    3m 55s
    In this video, we will compare contractual, legal, and industry standards and regulatory requirements. FREE ACCESS
  • Locked
    12.  Course Summary
    48s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 6 users Rating 4.8 of 6 users (6)
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 4.9 of 24 users Rating 4.9 of 24 users (24)