CISSP D-1 Security & Risk Management

Become a CISSP: Certified Information Systems Security Professional

Accelerate your cybersecurity career with the CISSP certification.
Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.

Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career

What is cover in this Domain (1)?

  1. CIA Triad
  2. Security Governance principles
  3. Determine Compliance Requirements
  4. Global Legal & Regulatory Issues
  5. Professional Ethics
  6. Policy, Procedure, Standards & Guidelines
  7. Business Continuity
  8. Personal Policies & Procedures
  9. Risk Management
  10. Threat Modeling
  11. Supply Chain Risk Management
  12. Security Awareness, Education, & Training Program

What is the target audience?

This course is intended for absolute beginners and IT professionals looking to make the move into the Cyber Security field. No programming experience or prior security knowledge is required. A basic understanding of networking and TCP/IP is helpful. This course is intended for anyone who is interested in a career in Cyber Security

CISSP concepts teach many professionals to plan for and address Cyber Security issues on a daily basis using free open source software tools.

Information security Principles

1
CIA Triad

This lesson covers the fundamental information security principles or goals such as confidentiality, integrity and availability. CISSP candidates are expected to master these fundamental principles.

Information security Governance

1
Enterprise Governance of IT
2
Security Governance
3
Security Management
4
Organisational Processes
5
Organizational Roles & Responsibilities
6
Security Control Frameworks

Compliance Requirements

1
Types of Laws
2
Intellectual Property Protection

Global Legal & Regulatory Issues

1
Cyber Crimes and Data Breaches
2
Privacy Issues
3
Privacy Regulations
4
Professional Ethics
5
Organisational Documents – Policy, Standards & Baseline, Procedure, Guideline

Business Continuity Management (BCM)

1
What is Business Continuity Management – BCM?
2
Business Continuity – BC Standards & Frameworks

Business Continuity Planning - BCP Processes

1
Overview of BCP Four Main Steps
2
1.0 Project scope and planning  
3
2.0 Business Impact Assessment (BIA)
4
3.0 Continuity Planning
5
4.0 Plan Approval and Implementation
6
Personnel Security

Risk Management

1
Risk Management Overview

Risk Management is the processes of identifying, analyzing, assessing, mitigating, or transferring risk.

  • It’s main goal is the reduction of probability or impact of a risk to acceptable levels
  • Eliminating risk to zero is impossible, however, significant risk reduction is possible


2
Risk Management Processes
3
Quantitative Risk Analysis
4
Risk Response
5
Threat modeling
6
Supply Chain Risk Management (SCRM)
7
Security Education, Training, and Awareness (SETA) program
We offer classroom instructor-led and Live Online courses delivery options. Contact us for more information
While there are no mandatory requirements to attend this course, please be aware that this is an exam preparation course and all attendees are expected to have a basic understanding of the information technology/security concepts.
Security and Risk Management comprises about 15% of the CISSP exam. This is the largest domain in CISSP, providing a comprehensive overview of the things you need to know about information systems management. It covers: • The confidentiality, integrity and availability of information; • Security governance principles; • Compliance requirements; • Legal and regulatory issues relating to information security; • IT policies and procedures; and • Risk-based management concepts.
undefined

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Enrolled: 8 students
Duration: 8 hours
Lectures: 29
Level: Advanced

Archive

Working hours

Monday 8:00 am - 4.30 pm
Tuesday 8:00 am - 4.30 pm
Wednesday 8:00 am - 4.30 pm
Thursday 8:00 am - 4.30 pm
Friday 8:00 am - 4.30 pm
Saturday Closed
Sunday Closed
This website uses cookies and asks your personal data to enhance your browsing experience.