(ISC)² & Security Fundamentals

Expert
  • 11 videos | 39m 56s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 391 users Rating 4.5 of 391 users (391)
What is (ISC)²? How does it help security? Find out from this course, which will introduce you to the (ISC)² organization, its Code of Professional Ethics, and its CISSP exam, which certifies competence in the eight domains of the (ISC)2(r) CISSP CBK(r). Next, you will study the CIA triad, and consider how to identify, classify, and determine ownership of information and assets. You'll also learn about data privacy protection requirements, such as HIPAA and PCI-DSS, as well as data loss prevention (DLP) methods. Conclude by familiarizing yourself with appropriate asset retention practices and data security controls, as well as information-handling and asset-handling requirements.

WHAT YOU WILL LEARN

  • Describe the (isc)² organization
    Define the (isc)² code of professional ethics
    Recall the cissp exam contents, format, and scoring
    Define the cia triad
    Recall how information and assets are identified and classified
    Determine ownership of information and assets
  • Describe how to protect data privacy
    Ensure appropriate retention of assets
    Determine appropriate data security controls
    Establish information-handling and asset-handling requirements
    Explain and describe (isc)² cissp fundamentals

IN THIS COURSE

  • 1m 29s
    Upon completion of this video, you will be able to describe the (ISC)² organization. FREE ACCESS
  • 2m 18s
    During this video, you will learn how to define the (ISC)² Code of Professional Ethics. FREE ACCESS
  • Locked
    3.  The CISSP Exam
    3m 31s
    Upon completion of this video, you will be able to recall the CISSP exam content, format, and scoring. FREE ACCESS
  • Locked
    4.  Confidentiality, Integrity, and Availability
    2m 51s
    Learn how to define the CIA triad. FREE ACCESS
  • Locked
    5.  Identify and Classify Information and Assets
    5m 51s
    Upon completion of this video, you will be able to recall how to identify and classify information and assets. FREE ACCESS
  • Locked
    6.  Determine Information and Asset Ownership
    3m 16s
    In this video, learn how to determine who owns information and assets. FREE ACCESS
  • Locked
    7.  Protect Privacy
    4m
    After completing this video, you will be able to describe how to protect data privacy. FREE ACCESS
  • Locked
    8.  Asset Retention
    3m 54s
    In this video, learn how to ensure assets are retained appropriately. FREE ACCESS
  • Locked
    9.  Data Security Controls
    9m 25s
    In this video, find out how to determine appropriate data security controls. FREE ACCESS
  • Locked
    10.  Requirements for Information and Asset Handling
    1m 29s
    During this video, you will learn how to establish requirements for handling information and assets. FREE ACCESS
  • Locked
    11.  Exercise: Describing (ISC)² CISSP Fundamentals
    1m 53s
    After completing this video, you will be able to explain and describe (ISC)² CISSP fundamentals. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.5 of 47 users Rating 4.5 of 47 users (47)
Rating 4.5 of 245 users Rating 4.5 of 245 users (245)