Security for Engineering Leaders: Defining Security
Security
| Intermediate
- 12 videos | 40m 18s
- Includes Assessment
- Earns a Badge
Security can be defined in many ways and broken down into numerous types. Data security involves defining the necessary policies and procedures that ensure data is cared for and protected. Through this course, learn about data security attributes and parameters and examine data security from a variety of perspectives. Discover the definition of security and its types, including data security. Next, study the theory and functionality of DevSecOps, as well as risk identification, assessment, and management. Finally, examine the use of data security frameworks, including popular frameworks such as COBIT, NIST, and FISMA. After course completion, you'll be able to outline security terms, expressions, and frameworks.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseState the definition of securityDifferentiate between physical, asset, and data securityOutline data at rest, data in motion, and data in storageIdentify the differences between development, security, and operations as it relates to data securityOutline the devsecops practices of scanning, early threat modeling, static code analysis, and code reviews
-
Differentiate between risk identification, risk assessment, and risk managementCompare the cobit, nist, and fisma frameworksOutline the key components of the cobit frameworkState the key components of the nist frameworkIdentify the key components of the fisma frameworkSummarize the key concepts covered in this course
IN THIS COURSE
-
48sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
4m 25sUpon completion of this video, you will be able to state the definition of security. FREE ACCESS
-
5m 7sLearn how to differentiate between physical, asset, and data security. FREE ACCESS
-
4m 28sAfter completing this video, you will be able to outline data at rest, data in motion, and data in storage. FREE ACCESS
-
3m 37sDuring this video, you will learn how to identify the differences between development, security, and operations as it relates to data security. FREE ACCESS
-
3m 24sIn this video, find out how to outline the DevSecOps practices of scanning, early threat modeling, static code analysis, and code reviews. FREE ACCESS
-
3m 28sDuring this video, discover how to differentiate between risk identification, risk assessment, and risk management. FREE ACCESS
-
2m 51sLearn how to compare the COBIT, NIST, and FISMA frameworks. FREE ACCESS
-
3m 1sIn this video, you will learn how to outline the key components of the COBIT framework. FREE ACCESS
-
4m 11sFind out how to state the key components of the NIST framework. FREE ACCESS
-
4m 8sIn this video, learn how to identify the key components of the FISMA framework. FREE ACCESS
-
50sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.