CISSP: Security Principles, Governance, and Guidelines

Individuals interested in information systems security concepts, methodologies and best practices; candidates for the Certified Information Systems Security Professional (CISSP) exam

Prerequisite
None

Expected Duration
109 minutes

Description
The fundamental security principles of confidentiality, availability, and integrity guide all successful information security best practices. In this course, you’ll learn about applying these security principles, as well as best practices for establishing security governance principles. You’ll also explore how best to establish and implement comprehensive security guidelines across the organization. This course is one of a series in the SkillSoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.

Objective

Security Principles

  • start the course
  • identify best practices when applying the concept of confidentiality
  • identify best practices when applying the concept of integrity
  • identify best practices when applying the concept of availability

Applying Security Governance Principles

  • align the security function to an organization’s strategy, goals, mission, and objectives
  • use organizational processes as a method to apply security governance principles
  • use security roles and responsibilities as a method to apply security governance principles
  • apply security governance principles through the use of control frameworks
  • apply due care
  • apply due diligence

Compliance

  • apply legislative and regulatory compliance requirements to information system security practices
  • apply privacy requirement compliance in information system security practices

Legal and Regulatory Issues

  • identify characteristics of computer crimes that pertain to information security
  • identify characteristics of licensing and intellectual property that pertain to information security
  • identify characteristics of import and export controls that pertain to information security
  • identify characteristics of trans-border data flow issues that pertain to information security
  • identify characteristics of privacy issues that pertain to information security
  • identify best practices for addressing data breaches that pertain to information security

Professional Ethics

  • follow the (ISC)² Code of Professional Ethics
  • support an organization’s code of ethics

Develop and Implement Policies and Procedures

  • identify best practices for developing and implementing a documented security policy
  • identify best practices for developing and implementing documented security standards and guidelines
  • identify best practices for developing and implementing documented security procedures

Business Continuity Requirements

  • develop and document a project scope and plan
  • conduct a business impact analysis

Practice: Comprehensive Security Guidelines

  • determine best practices for developing and implementing a comprehensive information system security framework

MONTHLY SUBSCRIPTION

$129/month
 

ANNUAL SUBSCRIPTION

$1295/year

Multi-license discounts available for Annual and Monthly subscriptions.