CRISC 2023: Security Controls

CRISC    |    Intermediate
  • 12 videos | 1h 3m 49s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
To protect assets, organizations must apply a structured approach to software development, as well as implement, manage, and monitor security controls. Organizations must also determine the appropriate cost to protect assets. In this course, learn about security control types, how physical security and digital data security relate, and how critical infrastructure should be protected. Next, explore the Cloud Controls Matrix (CCM), how to use the annual loss expectancy (ALE) formula, and security within the software development life cycle (SDLC). Finally, examine continuous integration and continuous deployment (CI/CD), Git version control, how to use the git CLI, and the benefits of the OWASP Enterprise Security API (ESAPI). This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify the types of security control
    Outline methods for securing assets using physical controls
    Recognize how it security applies to supervisory control and data acquisition (scada), industrial control systems (icss), and operational technology (ot)
    Work with the ccm to establish cloud security control
    Outline how the annual loss expectancy (ale) is calculated and how it compares to the cost of it security controls
  • Recognize how security applies to all sdlc phases
    Identify the importance of ci/cd
    State how git is used for file version control
    Perform basic git management tasks using the cli
    List the benefits of using a secure api when writing web app code
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 20s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 36s
    Upon completion of this video, you will be able to identify the types of security control. FREE ACCESS
  • Locked
    3.  Physical Security
    5m 18s
    After completing this video, you will be able to outline methods for securing assets using physical controls. FREE ACCESS
  • Locked
    4.  Critical Infrastructure
    6m 21s
    In this video, you will recognize how IT security applies to supervisory control and data acquisition (SCADA), industrial control systems (ICSs), and operational technology (OT). FREE ACCESS
  • Locked
    5.  Working with Cloud Controls Matrix (CCM)
    6m 51s
    During this video, you will learn how to work with the CCM to establish cloud security control. FREE ACCESS
  • Locked
    6.  Annual Loss Expectancy (ALE)
    5m 49s
    Upon completion of this video, you will be able to outline how the annual loss expectancy (ALE) is calculated and how it compares to the cost of IT security controls. FREE ACCESS
  • Locked
    7.  The Software Development Life Cycle (SDLC)
    6m 26s
    In this video, you will recognize how security applies to all SDLC phases. FREE ACCESS
  • Locked
    8.  Continuous Integration and Continuous Deployment (CI/CD)
    5m 13s
    After completing this video, you will be able to identify the importance of CI/CD. FREE ACCESS
  • Locked
    9.  Git and Version Control
    5m 38s
    In this video, we will state how Git is used for file version control. FREE ACCESS
  • Locked
    10.  Using the Git Command Line Interface (CLI)
    5m 16s
    During this video, discover how to perform basic Git management tasks using the CLI. FREE ACCESS
  • Locked
    11.  The OWASP Enterprise Security API (ESAPI)
    6m 54s
    Upon completion of this video, you will be able to list the benefits of using a secure API when writing web app code. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 8s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)