Certified in Cybersecurity (CC): Security Governance, Policies, & Controls

Cybersecurity    |    Beginner
  • 10 videos | 25m 11s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Security governance is a huge part of overall corporate or organizational governance. The security practitioner must be aware of various governance elements, regulations, laws, standards, policies, and procedures. Begin this course by exploring the elements of governance, including mission charter, leadership, and corporate guidance. Then investigate various laws and regulations like General Data Protection Regulation (GDPR) and HIPAA, standards issued by the International Organization for Standardization and International Electrotechnical Commission (ISO/IEC), and the National Institute of Standards and Technology (NIST), and common policies and standard operating procedures. Next, examine the International Information System Security Certification Consortium (ISC2) code of ethics. Finally, discover security control categories and types. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline elements of governance such as mission charter, leadership, and corporate guidance
    Describe various laws and regulations that an organization may be subject to, such as general data protection regulation (gdpr), hipaa, the sarbanes-oxley act, and the payment card industry data security standard (pci-dss)
    Define standards that are often driven by laws and regulations, including the international organization for standardization and international electrotechnical commission (iso/iec), and the national institute of standards and technology (nist)
    Define common organizational policies like passwords, mobile device, browser, and acceptable-use
  • Define processes and standard operating procedures, which are usually driven by configuration guides or automated infrastructure as code
    Outline the international information system security certification consortium (isc)2 code of ethics, including the preamble and four canons
    Describe security control categories, such as administrative, physical, and technical
    Describe security control types, such as preventative, deterrent, and detective
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 50s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 1m 42s
    After completing this video, you will be able to outline elements of governance such as mission charter, leadership, and corporate guidance. FREE ACCESS
  • Locked
    3.  Regulations and Laws
    2m 57s
    Upon completion of this video, you will be able to describe various laws and regulations that an organization may be subject to, such as General Data Protection Regulation (GDPR), HIPAA, the Sarbanes-Oxley Act, and the Payment Card Industry Data Security Standard (PCI-DSS). FREE ACCESS
  • Locked
    4.  Standards
    3m 4s
    In this video, find out how to define standards that are often driven by laws and regulations, including the International Organization for Standardization and International Electrotechnical Commission (ISO/IEC), and the National Institute of Standards and Technology (NIST). FREE ACCESS
  • Locked
    5.  Policies
    2m 22s
    After completing this video, you will be able to define common organizational policies like passwords, mobile device, browser, and acceptable-use. FREE ACCESS
  • Locked
    6.  Procedures
    1m 33s
    Upon completion of this video, you will be able to define processes and standard operating procedures, which are usually driven by configuration guides or automated Infrastructure as Code. FREE ACCESS
  • Locked
    7.  (ISC)2 Code of Ethics
    2m 17s
    After completing this video, you will be able to outline the International Information System Security Certification Consortium (ISC)2 code of ethics, including the preamble and four canons. FREE ACCESS
  • Locked
    8.  Security Control Categories
    3m 23s
    Upon completion of this video, you will be able to describe security control categories, such as administrative, physical, and technical. FREE ACCESS
  • Locked
    9.  Security Control Types
    6m 37s
    After completing this video, you will be able to describe security control types, such as preventative, deterrent, and detective. FREE ACCESS
  • Locked
    10.  Course Summary
    27s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.6 of 56 users Rating 4.6 of 56 users (56)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 1341 users Rating 4.5 of 1341 users (1341)
Rating 4.6 of 91 users Rating 4.6 of 91 users (91)
Rating 4.6 of 188 users Rating 4.6 of 188 users (188)