CISSP 2024: Threat Modeling, SCRM, & Security Awareness

CISSP 2024    |    Expert
  • 8 videos | 29m 51s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Threat modeling uses hypothetical scenarios, system and data flow diagrams, and testing to assist in securing systems, applications and data. In this course, the learner will explore threat modeling concepts and methodologies, supply chain risk management (SCRM) concepts, and ways to establish and maintain a security awareness, education, and training program. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline threat modeling concepts and methodologies
    Provide an overview of risks associated with the acquisition of products and services from suppliers and providers such as product tampering, counterfeits, and implants
    Compare supply chain risk mitigations including third-party assessment and monitoring, minimum security requirements, service level requirements, silicon root of trust, physically unclonable function, and software bill of materials
  • Outline methods and techniques to increase awareness and training like social engineering, phishing, security champions, and gamification
    Outline the use of periodic content reviews to include emerging technologies and trends such as cryptocurrency, artificial intelligence, and blockchain
    Identify methods to evaluate training program effectiveness
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 35s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 8m 49s
    Upon completion of this video, you will be able to outline threat modeling concepts and methodologies. FREE ACCESS
  • Locked
    3.  Supply Chain Risks
    5m 28s
    After completing this video, you will be able to provide an overview of risks associated with the acquisition of products and services from suppliers and providers such as product tampering, counterfeits, and implants. FREE ACCESS
  • Locked
    4.  Mitigating Supply Chain Risks
    6m 37s
    Upon completion of this video, you will be able to compare supply chain risk mitigations including third-party assessment and monitoring, minimum security requirements, service level requirements, silicon root of trust, physically unclonable function, and software bill of materials. FREE ACCESS
  • Locked
    5.  Increasing Awareness and Training
    3m 41s
    After completing this video, you will be able to outline methods and techniques to increase awareness and training like social engineering, phishing, security champions, and gamification. FREE ACCESS
  • Locked
    6.  Periodic Content Reviews
    1m 56s
    Upon completion of this video, you will be able to outline the use of periodic content reviews to include emerging technologies and trends such as cryptocurrency, artificial intelligence, and blockchain. FREE ACCESS
  • Locked
    7.  Evaluating Program Effectiveness
    2m 8s
    After completing this video, you will be able to identify methods to evaluate training program effectiveness. FREE ACCESS
  • Locked
    8.  Course Summary
    38s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.5 of 245 users Rating 4.5 of 245 users (245)