CISSP D-1 Security & Risk Management

Course Brochure

File size: 658 kb

CISSP Exam Outline May 2021

File size: 406 kb

Become a CISSP: Certified Information Systems Security Professional

Accelerate your cybersecurity career with the CISSP certification. Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities. Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career

What is cover in this Domain (1)?

  1. CIA Triad
  2. Security Governance principles
  3. Determine Compliance Requirements
  4. Global Legal & Regulatory Issues
  5. Professional Ethics
  6. Policy, Procedure, Standards & Guidelines
  7. Business Continuity
  8. Personal Policies & Procedures
  9. Risk Management
  10. Threat Modeling
  11. Supply Chain Risk Management
  12. Security Awareness, Education, & Training Program

What is the target audience?

This course is intended for absolute beginners and IT professionals looking to make the move into the Cyber Security field. No programming experience or prior security knowledge is required. A basic understanding of networking and TCP/IP is helpful. This course is intended for anyone who is interested in a career in Cyber Security CISSP concepts teach many professionals to plan for and address Cyber Security issues on a daily basis using free open source software tools.

Information security Principles

1
CIA Triad

This lesson covers the fundamental information security principles or goals such as confidentiality, integrity and availability. CISSP candidates are expected to master these fundamental principles.

Compliance Requirements

1
Types of Laws
Compliance Requirements Legal Compliance Many compliance expectations come from statutory or regulatory expectations........
2
Intellectual Property Protection
3
Types of Laws
Compliance Requirements Legal Compliance Many compliance expectations come from statutory or regulatory expectations........

Business Continuity Management (BCM)

1
What is Business Continuity Management - BCM?
2
What is Business Continuity Management - BCM?
3
Business Continuity - BC Standards & Frameworks
4
Business Continuity - BC Standards & Frameworks
5
Business Continuity - BC Standards & Frameworks

Business Continuity Planning - BCP Processes

1
Overview of BCP Four Main Steps
2
Overview of BCP Four Main Steps
3
Overview of BCP Four Main Steps
4
1.0 Project scope and planning  
5
1.0 Project scope and planning  
6
2.0 Business Impact Assessment (BIA)
7
3.0 Continuity Planning
8
3.0 Continuity Planning
9
2.0 Business Impact Assessment (BIA)
10
4.0 Plan Approval and Implementation
11
Personnel Security
12
Personnel Security
13
4.0 Plan Approval and Implementation

Business Continuity Planning - BCP Processes

1
Overview of BCP Four Main Steps
2
1.0 Project scope and planning  
3
2.0 Business Impact Assessment (BIA)
4
3.0 Continuity Planning
5
4.0 Plan Approval and Implementation
6
Personnel Security

Risk Management

1
Risk Management Overview

Risk Management is the processes of identifying, analyzing, assessing, mitigating, or transferring risk.

  • It’s main goal is the reduction of probability or impact of a risk to acceptable levels
  • Eliminating risk to zero is impossible, however, significant risk reduction is possible


2
Risk Management Overview

Risk Management is the processes of identifying, analyzing, assessing, mitigating, or transferring risk.

  • It’s main goal is the reduction of probability or impact of a risk to acceptable levels
  • Eliminating risk to zero is impossible, however, significant risk reduction is possible


3
Risk Management Processes
4
Risk Management Processes
5
Quantitative Risk Analysis
6
Threat modeling
7
Quantitative Risk Analysis
8
Risk Response
9
Risk Response
10
Quantitative Risk Analysis
11
Supply Chain Risk Management (SCRM)
12
Security Education, Training, and Awareness (SETA) program
13
Risk Response

Information security Governance

1
Enterprise Governance of IT
2
Security Governance
What is Security Governance? The collection of practices related to supporting, defining, & directing the security efforts of an organization.
3
Security Management
4
Organisational Processes
5
Organizational Roles & Responsibilities
6
Security Control Frameworks

Global Legal & Regulatory Issues

1
Cyber Crimes and Data Breaches
2
Privacy Issues
3
Privacy Issues
4
Professional Ethics
5
Privacy Regulations
6
Privacy Regulations
7
Organisational Documents - Policy, Standards & Baseline, Procedure, Guideline
8
Organisational Documents - Policy, Standards & Baseline, Procedure, Guideline
9
Organisational Documents - Policy, Standards & Baseline, Procedure, Guideline

Business Continuity Planning - BCP Processes

1
Overview of BCP Four Main Steps
2
1.0 Project scope and planning  
3
2.0 Business Impact Assessment (BIA)
4
3.0 Continuity Planning
5
4.0 Plan Approval and Implementation
6
Personnel Security
We offer classroom instructor-led and Live Online courses delivery options. Contact us for more information
While there are no mandatory requirements to attend this course, please be aware that this is an exam preparation course and all attendees are expected to have a basic understanding of the information technology/security concepts.
Security and Risk Management comprises about 15% of the CISSP exam.
This is the largest domain in CISSP, providing a comprehensive overview of the things you need to know about information systems management. It covers:
• The confidentiality, integrity and availability of information;
• Security governance principles;
• Compliance requirements;
• Legal and regulatory issues relating to information security;
• IT policies and procedures; and
• Risk-based management concepts.
undefined

Be the first to add a review.

Please, login to leave a review
Enrolled: 12 students
Duration: 8 hours
Lectures: 62
Level: Advanced

Archive

Working hours

Monday 8:00 am - 4.30 pm
Tuesday 8:00 am - 4.30 pm
Wednesday 8:00 am - 4.30 pm
Thursday 8:00 am - 4.30 pm
Friday 8:00 am - 4.30 pm
Saturday Closed
Sunday Closed
CISSP D-1 Security & Risk Management
This website uses cookies and asks your personal data to enhance your browsing experience.