CISSP: Security Engineering Part 2

Individuals interested in information systems security concepts, methodologies and best practices; candidates for the Certified Information Systems Security Professional (CISSP) exam


Expected Duration
136 minutes

Even in an age of digitized data, securing the physical environment is still a critical part of security engineering. In this course, you’ll learn about security threats, both natural and man-made, and techniques for preventing loss from these threats. You’ll also learn about site and facility design considerations, restricted work area security, and best practices for crime prevention through secure design of the physical environment. This course is one of a series in the SkillSoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.


Assessing and Mitigating Vulnerabilities

  • start the course
  • identify best practices for assessing and mitigating web-based systems vulnerabilities
  • identify best practices for assessing and mitigating mobile system vulnerabilities
  • identify best practices for assessing and mitigating embedded device and cyber-physical system vulnerabilities

Applying Cryptography

  • describe cryptography features and history
  • recognize characteristics of the cryptographic life cycle
  • identify characteristics of symmetric cryptography
  • identify characteristics of asymmetric cryptography
  • identify characteristics of elliptic curve cryptography
  • identify characteristics of PKI
  • identify best practices for key management
  • use digital signatures for sending and receiving data
  • identify best practices for managing digital rights
  • identify the role of nonrepudiation when applying cryptography
  • identify the role of integrity when applying cryptography
  • distinguish between cryptanalytic attack methods

Planning and Assessing Sites and Facilities

  • identify elements of site and facility security assessments
  • identify site and facility design considerations
  • describe crime prevention through environmental design when assessing sites and facilities

Design and Implement Physical Security Controls

  • identify categories of threats that organizations face
  • identify considerations when planning facility security for an organization
  • identify best practices for computer and equipment room security
  • identify best practices for securing restricted work areas
  • identify best practices for safely and securely integrating utilities and HVAC systems in the physical environment
  • identify best practices for preventing and responding to water risks
  • identify best practices for preventing, detecting, and suppressing fires and fire-related security risks and damage

Practice: Establish a Secure Physical Environment

  • select appropriate security controls for a data center, and identify the most appropriate utility, water, and fire security controls to protect the physical environment





Multi-license discounts available for Annual and Monthly subscriptions.