CISSP 2024: Threat Modeling, SCRM, & Security Awareness
CISSP 2024
| Expert
- 8 videos | 29m 51s
- Includes Assessment
- Earns a Badge
Threat modeling uses hypothetical scenarios, system and data flow diagrams, and testing to assist in securing systems, applications and data. In this course, the learner will explore threat modeling concepts and methodologies, supply chain risk management (SCRM) concepts, and ways to establish and maintain a security awareness, education, and training program. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline threat modeling concepts and methodologiesProvide an overview of risks associated with the acquisition of products and services from suppliers and providers such as product tampering, counterfeits, and implantsCompare supply chain risk mitigations including third-party assessment and monitoring, minimum security requirements, service level requirements, silicon root of trust, physically unclonable function, and software bill of materials
-
Outline methods and techniques to increase awareness and training like social engineering, phishing, security champions, and gamificationOutline the use of periodic content reviews to include emerging technologies and trends such as cryptocurrency, artificial intelligence, and blockchainIdentify methods to evaluate training program effectivenessSummarize the key concepts covered in this course
IN THIS COURSE
-
35sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
8m 49sUpon completion of this video, you will be able to outline threat modeling concepts and methodologies. FREE ACCESS
-
5m 28sAfter completing this video, you will be able to provide an overview of risks associated with the acquisition of products and services from suppliers and providers such as product tampering, counterfeits, and implants. FREE ACCESS
-
6m 37sUpon completion of this video, you will be able to compare supply chain risk mitigations including third-party assessment and monitoring, minimum security requirements, service level requirements, silicon root of trust, physically unclonable function, and software bill of materials. FREE ACCESS
-
3m 41sAfter completing this video, you will be able to outline methods and techniques to increase awareness and training like social engineering, phishing, security champions, and gamification. FREE ACCESS
-
1m 56sUpon completion of this video, you will be able to outline the use of periodic content reviews to include emerging technologies and trends such as cryptocurrency, artificial intelligence, and blockchain. FREE ACCESS
-
2m 8sAfter completing this video, you will be able to identify methods to evaluate training program effectiveness. FREE ACCESS
-
38sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.