Security for Engineering Leaders: Defining Security

Security    |    Intermediate
  • 12 videos | 40m 18s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 200 users Rating 4.4 of 200 users (200)
Security can be defined in many ways and broken down into numerous types. Data security involves defining the necessary policies and procedures that ensure data is cared for and protected. Through this course, learn about data security attributes and parameters and examine data security from a variety of perspectives. Discover the definition of security and its types, including data security. Next, study the theory and functionality of DevSecOps, as well as risk identification, assessment, and management. Finally, examine the use of data security frameworks, including popular frameworks such as COBIT, NIST, and FISMA. After course completion, you'll be able to outline security terms, expressions, and frameworks.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    State the definition of security
    Differentiate between physical, asset, and data security
    Outline data at rest, data in motion, and data in storage
    Identify the differences between development, security, and operations as it relates to data security
    Outline the devsecops practices of scanning, early threat modeling, static code analysis, and code reviews
  • Differentiate between risk identification, risk assessment, and risk management
    Compare the cobit, nist, and fisma frameworks
    Outline the key components of the cobit framework
    State the key components of the nist framework
    Identify the key components of the fisma framework
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 48s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 4m 25s
    Upon completion of this video, you will be able to state the definition of security. FREE ACCESS
  • Locked
    3.  Types of Security
    5m 7s
    Learn how to differentiate between physical, asset, and data security. FREE ACCESS
  • Locked
    4.  Data Security
    4m 28s
    After completing this video, you will be able to outline data at rest, data in motion, and data in storage. FREE ACCESS
  • Locked
    5.  DevSecOps
    3m 37s
    During this video, you will learn how to identify the differences between development, security, and operations as it relates to data security. FREE ACCESS
  • Locked
    6.  Functional DevSecOps
    3m 24s
    In this video, find out how to outline the DevSecOps practices of scanning, early threat modeling, static code analysis, and code reviews. FREE ACCESS
  • Locked
    7.  What Is Risk?
    3m 28s
    During this video, discover how to differentiate between risk identification, risk assessment, and risk management. FREE ACCESS
  • Locked
    8.  Data Security Frameworks
    2m 51s
    Learn how to compare the COBIT, NIST, and FISMA frameworks. FREE ACCESS
  • Locked
    9.  The COBIT Framework
    3m 1s
    In this video, you will learn how to outline the key components of the COBIT framework. FREE ACCESS
  • Locked
    10.  The NIST Framework
    4m 11s
    Find out how to state the key components of the NIST framework. FREE ACCESS
  • Locked
    11.  The FISMA Framework
    4m 8s
    In this video, learn how to identify the key components of the FISMA framework. FREE ACCESS
  • Locked
    12.  Course Summary
    50s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.8 of 5 users Rating 4.8 of 5 users (5)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 106 users Rating 4.3 of 106 users (106)
Rating 4.6 of 48 users Rating 4.6 of 48 users (48)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)