CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks

CompTIA    |    Intermediate
  • 10 videos | 45m 51s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 189 users Rating 4.5 of 189 users (189)
Whether you're an employee or contractor, this CompTIA Security+ SY0-601 course will have something you can use to improve the organizational security at your workplace. You'll start by examining security topics related to the hiring to release process, such as background checks and investigations, non-disclosure agreements, acceptable use policy, and onboarding and offboarding. You'll move on to explore further personnel policies, including job rotation, mandatory vacations, separation of duties, clean desk space, and social media usage. You'll then recognize some useful security awareness practices, such as phishing simulations, computer-based training, role-based training, and diversity training techniques. Finally, you'll identify various business agreements, account types, regulations, and governance, such as GDPR, PCI DSS, CIS, NIST, and ISO. This course is part of a series that prepares the learner for the CompTIA Security+ (SY0-601) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe personnel policies, like aup, job rotation, mandatory vacations, separation of duties, least privilege, clean desk space, background checks, and non-disclosure agreements (ndas)
    Survey third-party risks concepts, such as vendors, supply chains, business partners, sla, mou, msa, bpa, eol, eos, and nda
    Define data policies, like data classification, governance, and retention
    Describe credential policies, including service accounts, administrator, and root accounts
  • Survey various organizational polices, such as change management , change control, and asset management
    Define regulations, standards, and legislation, such as pci-dss, gdpr, and various national, territory, or state laws
    Examine key frameworks like cis, nist, rmf/csf, iso 27001/27002/27701/31000, ssae soc 2 type ii/iii, and cloud security alliance (csa)
    Survey various benchmarks and secure configuration guides, as in platform/vendor-specific guides for web servers, os, application servers, and network infrastructure devices
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 39s
  • 10m 42s
    Upon completion of this video, you will be able to describe personnel policies, like acceptable use policies, job rotation, mandatory vacations, separation of duties, least privilege, clean desk policies, background checks, and non-disclosure agreements. FREE ACCESS
  • Locked
    3.  Third-party Risk Management
    5m 10s
    In this video, find out how to survey third-party risks concepts, such as vendors, supply chains, business partners, service-level agreements, memorandums of understanding, master service agreements, business process agreements, end-of-life, end-of-service, and non-disclosure agreements. FREE ACCESS
  • Locked
    4.  Data Policies
    6m 31s
    During this video, you will learn how to define data policies, such as data classification, governance, and retention. FREE ACCESS
  • Locked
    5.  Credential Policies
    4m 45s
    Upon completion of this video, you will be able to describe credential policies, including service accounts, administrator accounts, and root accounts. FREE ACCESS
  • Locked
    6.  Organizational Policies
    5m 28s
    In this video, learn how to survey various organizational policies, such as change management, change control, and asset management. FREE ACCESS
  • Locked
    7.  Regulations, Standards, and Legislation
    4m 35s
    In this video, you will learn how to define regulations, standards, and legislation, such as PCI-DSS, GDPR, and various national, territory, or state laws. FREE ACCESS
  • Locked
    8.  Key Frameworks
    3m 51s
    In this video, you will examine key frameworks like the CIS, NIST, RMF/CSF, ISO 27001/27002/27701/31000, SSAE SOC 2 type II/III, and the Cloud Security Alliance (CSA). FREE ACCESS
  • Locked
    9.  Benchmarks and Secure Configuration Guides
    2m 33s
    Find out how to survey various benchmarks and secure configuration guides, such as platform/vendor-specific guides for web servers, OS, application servers, and network infrastructure devices. FREE ACCESS
  • Locked
    10.  Course Summary
    38s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 42 users Rating 4.5 of 42 users (42)
Rating 4.5 of 129 users Rating 4.5 of 129 users (129)
Rating 3.5 of 302 users Rating 3.5 of 302 users (302)