8 sections

51 Activities

51

Unlock full course by purchasing this course today! Dive deeper into the content and elevate your learning experience.

Module 1 - Understand and Apply Security Concepts

Module 2 - Evaluate and Apply Security Governance Principles

Module 3 - Determine Compliance and Other Requirements.

Module 4 - Legal and Regulatory Issues that Pertain to Information Security in a Global Context

Module 5 - Requirements for Investigation Types (i.e., Administrative, Criminal, Civil, Regulatory, Industry Standards)

Module 6 - Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines

Module 7 - Identify, Analyse, and Prioritise Business Continuity Requirements

Module 8 - Contribute to and Enforce Personnel Security Policies and Procedures

Module 9 - Understand and Apply Risk Management Concepts

Module 10 - Understand and Apply Threat Modeling Concepts and Methodologies

Module 11 - Apply Supply Chain Risk Management (SCRM) Concepts

Module 12 - Establish and Maintain a Security Awareness, Education, and Training Program

Module 13 - Understand, adhere to and promote Professional ethics

Module 1 - Identify and Classify Information and Assets

Module 2 - Establish Information and Asset Handling Requirements

Module 3 - Provision Resources Securely

Module 4 - Manage Data Lifecycle

Module 5 - Ensure Appropriate Asset Retention (e.g., EOL and EOS)

Module 6 - Determine Data Security Controls and Compliance Requirements

Module 1 - Implement and Manage Engineering Processes Using Secure Design Principles

Module 2 - Understand the Fundamental Concepts of Security Models

Module 3 - Select Controls Based Upon Systems Security Requirements

Module 4 - Understand Security Capabilities of Information Systems

Module 5 - Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements

Module 6 - Select and Determine Cryptographic Solutions

Module 7 - Understand Methods of Cryptanalytic Attacks

Module 8 - Apply Security Principles to Site and Facility Design

Module 9 - Design Site and Facility Security Controls

Module 1 - Assess and Implement Secure Design Principles in Network Architecture

Module 2 - Secure Network Components

Module 3 - Implement Secure Communication Channels According to Design

Module 1 - Control physical and logical access to assets

Module 2 - Managing Identity and Authentication

Module 3 - Controlling and Monitoring Access

Module 6 - Security Assessment and Testing

Module 1 - Understand and Comply with Investigations

Module 2 - Conduct Logging and Monitoring Activities

Module 3 - Perform Configuration Management (CM)

Module 4 - Securely Provisioning Resources

Module 5 - Apply Foundational Security Operations Concepts

Module 6 - Apply Resource Protection

Module 7 - Conduct Incident Management

Module 8 - Operate and Maintain Detective and Preventative Measures

Module 9 - Implement and Support Patch and Vulnerability Management

Module 10 - Understand and Participate in Change Management Processes

Module 11 - Implement Recovery Strategies

Module 12 - Implement Disaster Recovery Processes

Module 13 - Test Disaster Recovery Plans

Module 14 - Implement and Manage Physical Security

Module 15 - Address personnel safety and security concerns

Module 1 - Software Development Security

Unlock badges by purchasing this course today! Dive deeper into the content and elevate your learning experience.

Unlock certificates by purchasing this course today! Dive deeper into the content and elevate your learning experience.

Review Summary