Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CISSP - Domain 1 - Security and Risk Management - Advanced
Introduction
Introduction (5:54)
Defining Security
Defining Security (4:11)
Security Governance
Supporting the Goals, Mission, and Objectives of the Organization (7:06)
Understanding Organizational Processes (8:59)
Defining Security Roles and Responsibilities (9:55)
Understanding Information Security Strategies (3:48)
Designing an Effective Security Program
Ensuring Oversight Committee Representation (5:16)
Utilizing Control Frameworks (12:46)
Practicing Due Care and Due Diligence (8:26)
Compliance
Applying Governance, Risk Management, and Compliance (6:27)
Ensuring Legislative and Regulatory Compliance (3:05)
Complying with Privacy Requirements (4:47)
Global Legal and Regulatory Issues
Defining Computer Cyber Crime (3:23)
Licensing and Intellectual Property (8:41)
Importing Exporting and Trans-Border Data Flow (7:01)
Protecting Privacy (4:00)
Understanding Data Breaches (3:54)
Exploring Relevant Laws and Regulations (3:36)
Understanding Professional Ethics
Exploring Topics in Computer Ethics (8:54)
Understanding Codes of Ethics (7:12)
Developing and Implementing Security Policy
Defining Security Documentation (6:42)
Business Continuity and Disaster Recovery Requirements
Initiating a Business Continuity and Disaster Recovery Project (11:09)
Assessing Exposure to Outages (8:30)
Managing Personnel Security
Employment Candidate Screening (4:44)
Understanding Employment Agreements and Policies (7:47)
Reviewing Employee, Vendor, Consultant, and Contractor Controls (11:17)
Understanding Risk Management Concepts
Defining Organizational Risk Management Concepts (6:06)
Risk Management Concepts (8:04)
Mastering Risk Assessment Methodologies (7:14)
Quantitative Risk Assessments (7:40)
Responding to Risk (6:27)
Implementing Risk Countermeasures (10:12)
Defining Access Control Types (13:13)
Assessing Monitoring and Measuring Controls (11:38)
Discussing Risk Management Frameworks (3:08)
Threat Modeling
Threat Modeling (7:51)
Acquisition Strategy and Practice
Acquisition Strategy and Practice (12:43)
Security Education, Training, and Awareness
Security Education, Training, and Awareness (7:09)
Conclusion
Course Recap (2:57)
Introduction
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock