CISSP D-1 Security & Risk Management
- Description
- Curriculum
- FAQ
- Notice
- Reviews

Become a CISSP: Certified Information Systems Security Professional
Accelerate your cybersecurity career with the CISSP certification. Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities. Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career
What is cover in this Domain (1)?
- CIA Triad
- Security Governance principles
- Determine Compliance Requirements
- Global Legal & Regulatory Issues
- Professional Ethics
- Policy, Procedure, Standards & Guidelines
- Business Continuity
- Personal Policies & Procedures
- Risk Management
- Threat Modeling
- Supply Chain Risk Management
- Security Awareness, Education, & Training Program
What is the target audience?
This course is intended for absolute beginners and IT professionals looking to make the move into the Cyber Security field. No programming experience or prior security knowledge is required. A basic understanding of networking and TCP/IP is helpful. This course is intended for anyone who is interested in a career in Cyber Security CISSP concepts teach many professionals to plan for and address Cyber Security issues on a daily basis using free open source software tools.
-
2Types of LawsCompliance Requirements Legal Compliance Many compliance expectations come from statutory or regulatory expectations........
-
3Intellectual Property Protection
-
4Types of LawsCompliance Requirements Legal Compliance Many compliance expectations come from statutory or regulatory expectations........
-
10Overview of BCP Four Main Steps
-
11Overview of BCP Four Main Steps
-
12Overview of BCP Four Main Steps
-
131.0 Project scope and planning Â
-
141.0 Project scope and planning Â
-
152.0 Business Impact Assessment (BIA)
-
163.0 Continuity Planning
-
173.0 Continuity Planning
-
182.0 Business Impact Assessment (BIA)
-
194.0 Plan Approval and Implementation
-
20Personnel Security
-
21Personnel Security
-
224.0 Plan Approval and Implementation
-
29Risk Management Overview
Risk Management is the processes of identifying, analyzing, assessing, mitigating, or transferring risk.
- It’s main goal is the reduction of probability or impact of a risk to acceptable levels
- Eliminating risk to zero is impossible, however, significant risk reduction is possible
-
30Risk Management Overview
Risk Management is the processes of identifying, analyzing, assessing, mitigating, or transferring risk.
- It’s main goal is the reduction of probability or impact of a risk to acceptable levels
- Eliminating risk to zero is impossible, however, significant risk reduction is possible
-
31Risk Management Processes
-
32Risk Management Processes
-
33Quantitative Risk Analysis
-
34Threat modeling
-
35Quantitative Risk Analysis
-
36Risk Response
-
37Risk Response
-
38Quantitative Risk Analysis
-
39Supply Chain Risk Management (SCRM)
-
40Security Education, Training, and Awareness (SETA) program
-
41Risk Response
-
42Enterprise Governance of IT
-
43Security GovernanceWhat is Security Governance? The collection of practices related to supporting, defining, & directing the security efforts of an organization.
-
44Security Management
-
45Organisational Processes
-
46Organizational Roles & Responsibilities
-
47Security Control Frameworks
-
48Cyber Crimes and Data Breaches
-
49Privacy Issues
-
50Privacy Issues
-
51Professional Ethics
-
52Privacy Regulations
-
53Privacy Regulations
-
54Organisational Documents - Policy, Standards & Baseline, Procedure, Guideline
-
55Organisational Documents - Policy, Standards & Baseline, Procedure, Guideline
-
56Organisational Documents - Policy, Standards & Baseline, Procedure, Guideline
This is the largest domain in CISSP, providing a comprehensive overview of the things you need to know about information systems management. It covers:
• The confidentiality, integrity and availability of information;
• Security governance principles;
• Compliance requirements;
• Legal and regulatory issues relating to information security;
• IT policies and procedures; and
• Risk-based management concepts.