Subscribe to The Knowledge Academy’s top courses
Get this course, plus 11,000+ of our top-rated courses, with Personal Plan
8 sections
51 Activities
51
Unlock full course by purchasing this course today! Dive deeper into the content and elevate your learning experience.
Module 1 - Understand and Apply Security Concepts
Module 2 - Evaluate and Apply Security Governance Principles
Module 3 - Determine Compliance and Other Requirements.
Module 4 - Legal and Regulatory Issues that Pertain to Information Security in a Global Context
Module 5 - Requirements for Investigation Types (i.e., Administrative, Criminal, Civil, Regulatory, Industry Standards)
Module 6 - Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines
Module 7 - Identify, Analyse, and Prioritise Business Continuity Requirements
Module 8 - Contribute to and Enforce Personnel Security Policies and Procedures
Module 9 - Understand and Apply Risk Management Concepts
Module 10 - Understand and Apply Threat Modeling Concepts and Methodologies
Module 11 - Apply Supply Chain Risk Management (SCRM) Concepts
Module 12 - Establish and Maintain a Security Awareness, Education, and Training Program
Module 13 - Understand, adhere to and promote Professional ethics
Module 1 - Identify and Classify Information and Assets
Module 2 - Establish Information and Asset Handling Requirements
Module 3 - Provision Resources Securely
Module 4 - Manage Data Lifecycle
Module 5 - Ensure Appropriate Asset Retention (e.g., EOL and EOS)
Module 6 - Determine Data Security Controls and Compliance Requirements
Module 1 - Implement and Manage Engineering Processes Using Secure Design Principles
Module 2 - Understand the Fundamental Concepts of Security Models
Module 3 - Select Controls Based Upon Systems Security Requirements
Module 4 - Understand Security Capabilities of Information Systems
Module 5 - Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Module 6 - Select and Determine Cryptographic Solutions
Module 7 - Understand Methods of Cryptanalytic Attacks
Module 8 - Apply Security Principles to Site and Facility Design
Module 9 - Design Site and Facility Security Controls
Module 1 - Assess and Implement Secure Design Principles in Network Architecture
Module 2 - Secure Network Components
Module 3 - Implement Secure Communication Channels According to Design
Module 1 - Control physical and logical access to assets
Module 2 - Managing Identity and Authentication
Module 3 - Controlling and Monitoring Access
Module 6 - Security Assessment and Testing
Module 1 - Understand and Comply with Investigations
Module 2 - Conduct Logging and Monitoring Activities
Module 3 - Perform Configuration Management (CM)
Module 4 - Securely Provisioning Resources
Module 5 - Apply Foundational Security Operations Concepts
Module 6 - Apply Resource Protection
Module 7 - Conduct Incident Management
Module 8 - Operate and Maintain Detective and Preventative Measures
Module 9 - Implement and Support Patch and Vulnerability Management
Module 10 - Understand and Participate in Change Management Processes
Module 11 - Implement Recovery Strategies
Module 12 - Implement Disaster Recovery Processes
Module 13 - Test Disaster Recovery Plans
Module 14 - Implement and Manage Physical Security
Module 15 - Address personnel safety and security concerns
Module 1 - Software Development Security
Unlock badges by purchasing this course today! Dive deeper into the content and elevate your learning experience.
Unlock certificates by purchasing this course today! Dive deeper into the content and elevate your learning experience.
Review Summary