Course Details

Previous Page


CISSP: Security Principles, Governance, and Guidelines


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
The fundamental security principles of confidentiality, availability, and integrity guide all successful information security best practices. In this course, you'll learn about applying these security principles, as well as best practices for establishing security governance principles. You'll also explore how best to establish and implement comprehensive security guidelines across the organization. This course is one of a series in the SkillSoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.

Target Audience
Individuals interested in information systems security concepts, methodologies and best practices; candidates for the Certified Information Systems Security Professional (CISSP) exam

Prerequisites
None

Expected Duration (hours)
1.8

Lesson Objectives

CISSP: Security Principles, Governance, and Guidelines

  • start the course
  • identify best practices when applying the concept of confidentiality
  • identify best practices when applying the concept of integrity
  • identify best practices when applying the concept of availability
  • align the security function to an organization's strategy, goals, mission, and objectives
  • use organizational processes as a method to apply security governance principles
  • use security roles and responsibilities as a method to apply security governance principles
  • apply security governance principles through the use of control frameworks
  • apply due care
  • apply due diligence
  • apply legislative and regulatory compliance requirements to information system security practices
  • apply privacy requirement compliance in information system security practices
  • identify characteristics of computer crimes that pertain to information security
  • identify characteristics of licensing and intellectual property that pertain to information security
  • identify characteristics of import and export controls that pertain to information security
  • identify characteristics of trans-border data flow issues that pertain to information security
  • identify characteristics of privacy issues that pertain to information security
  • identify best practices for addressing data breaches that pertain to information security
  • follow the (ISC)² Code of Professional Ethics
  • support an organization's code of ethics
  • identify best practices for developing and implementing a documented security policy
  • identify best practices for developing and implementing documented security standards and guidelines
  • identify best practices for developing and implementing documented security procedures
  • develop and document a project scope and plan
  • conduct a business impact analysis
  • determine best practices for developing and implementing a comprehensive information system security framework
  • Course Number:
    sp_cisp_a01_it_enus