CRISC 2023: Security Controls
CRISC
| Intermediate
- 12 videos | 1h 3m 49s
- Includes Assessment
- Earns a Badge
To protect assets, organizations must apply a structured approach to software development, as well as implement, manage, and monitor security controls. Organizations must also determine the appropriate cost to protect assets. In this course, learn about security control types, how physical security and digital data security relate, and how critical infrastructure should be protected. Next, explore the Cloud Controls Matrix (CCM), how to use the annual loss expectancy (ALE) formula, and security within the software development life cycle (SDLC). Finally, examine continuous integration and continuous deployment (CI/CD), Git version control, how to use the git CLI, and the benefits of the OWASP Enterprise Security API (ESAPI). This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify the types of security controlOutline methods for securing assets using physical controlsRecognize how it security applies to supervisory control and data acquisition (scada), industrial control systems (icss), and operational technology (ot)Work with the ccm to establish cloud security controlOutline how the annual loss expectancy (ale) is calculated and how it compares to the cost of it security controls
-
Recognize how security applies to all sdlc phasesIdentify the importance of ci/cdState how git is used for file version controlPerform basic git management tasks using the cliList the benefits of using a secure api when writing web app codeSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 20sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 36sUpon completion of this video, you will be able to identify the types of security control. FREE ACCESS
-
5m 18sAfter completing this video, you will be able to outline methods for securing assets using physical controls. FREE ACCESS
-
6m 21sIn this video, you will recognize how IT security applies to supervisory control and data acquisition (SCADA), industrial control systems (ICSs), and operational technology (OT). FREE ACCESS
-
6m 51sDuring this video, you will learn how to work with the CCM to establish cloud security control. FREE ACCESS
-
5m 49sUpon completion of this video, you will be able to outline how the annual loss expectancy (ALE) is calculated and how it compares to the cost of IT security controls. FREE ACCESS
-
6m 26sIn this video, you will recognize how security applies to all SDLC phases. FREE ACCESS
-
5m 13sAfter completing this video, you will be able to identify the importance of CI/CD. FREE ACCESS
-
5m 38sIn this video, we will state how Git is used for file version control. FREE ACCESS
-
5m 16sDuring this video, discover how to perform basic Git management tasks using the CLI. FREE ACCESS
-
6m 54sUpon completion of this video, you will be able to list the benefits of using a secure API when writing web app code. FREE ACCESS
-
1m 8sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.