CISSP 2021: Fundamental Concepts & Principles

CISSP    |    Expert
  • 9 videos | 28m
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 245 users Rating 4.5 of 245 users (245)
Even with several years of practical experience in the security field, knowledge and application of specific security concepts and principles may have eluded even the seasoned security professional. Use this course to brush up on some of the vital, core security principles, such as confidentiality, integrity, and non-repudiation. Be reminded of the critical role of security design in the ISO OSI 7-layer Reference Model and the 4-layer TCP/IP Reference Model. Upon completion of this course, you'll be fully attuned to the most fundamental aspects of security. Furthermore, you can use this course to prepare for the CISSP exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define confidentiality as it relates to a key goal of security
    Define integrity as it relates to a key goal of security
    Define availability as it relates to a key goal of security
    Define authenticity as it relates to a key goal of security
  • Define non-repudiation as it relates to a key goal of security
    Outline the iso osi reference model and describe how it's used by security practitioners
    Outline the tcp/ip reference model and describe how it's leveraged by security practitioners
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 45s
    In this video, you’ll learn more about the course and your instructor. In this course, you’ll learn the key core principles of security, including confidentiality, integrity, and non-repudiation. You’ll also be reminded of the role of security design in the ISO OSI 7-layer reference model and the four-layer TCP IP model. FREE ACCESS
  • 3m 31s
    In this video, you’ll learn more about confidentiality as a security goal. There are controls that raise the level of difficulty or create resistance for threat actors and threat agents. One of those goals is confidentiality. Confidentiality measures the attacker's ability to get unauthorized data or access to information from an application or a system. Confidentiality involves using techniques, like cryptographic mechanisms, to allow only approved users the ability to view sensitive information. FREE ACCESS
  • Locked
    3.  Integrity as a Security Goal
    2m 59s
    In this video, you’ll learn more about integrity as a security goal. Integrity represents the I of the CIA triad. Integrity security measures an attacker's ability to manipulate, modify, change, or remove data at rest and or data in transit, realizing that the data at rest could be configuration of applications or systems. Integrity involves implementing the controls that ensure only authorized subjects can change sensitive information. FREE ACCESS
  • Locked
    4.  Availability as a Security Goal
    3m 22s
    In this video, you’ll learn more about availability as a security goal. Availability is the A of the CIA triad. It measures an attacker's ability to disrupt or prevent access to services or data. Availability controls will protect systems and services from spoofing attacks, floods, denial-of-service or distributed denial-of-service, poisoning, and other attacks that negatively affect the ability to deliver data, content, or services. FREE ACCESS
  • Locked
    5.  Authenticity as a Security Goal
    4m 3s
    In this video, you’ll learn more about authenticity as a security goal. Availability is the A of the CIA triad. It measures an attacker's ability to disrupt or prevent access to services or data. Availability controls will protect systems and services from spoofing attacks, floods, denial-of-service or distributed denial-of-service, poisoning, and other attacks that negatively affect the ability to deliver data, content, or services. FREE ACCESS
  • Locked
    6.  Non-repudiation as a Security Goal
    2m 18s
    In this video, you’ll learn more about non-repudiation as a security goal. There are five pillars of information assurance. Non-repudiation is the fifth and it's defined as the inability to refuse participation in a digital transaction, contract, or communication, for example, e-mail when S/MIME is being used. Participation refers to denying participation, so when a guarantee that a message transmission or a transaction or a contract between parties on the Internet is guaranteed. FREE ACCESS
  • Locked
    7.  How the ISO OSI Reference Model Is Used
    6m 4s
    In this video, you’ll learn more about the seven-layer OSI model. It’s important to remember how security relates to these different layers. If you look at these different layers and the descriptions of these layers, one thing you’ll see is that native security is not built-in, especially to functionality at layer 1 through 4. You must use additional protocols or other extensible mechanisms to provide security, specifically at layers 2 through 4. FREE ACCESS
  • Locked
    8.  How the TCP/IP Reference Model Is Used
    3m 19s
    In this video, you’ll learn more about the TCP/IP reference model. You’ll see it has four layers. This model combines the Session, Presentation, and Application layers of OSI layers 5, 6, and 7 into one Application layer. Most of the activities in modern applications are combined by the application, whether traditional programming, or microservices, or container. In this model, the Physical layer 1 and the Link layer are combined into a single Network Access layer. FREE ACCESS
  • Locked
    9.  Course Summary
    38s
    In this video, you’ll summarize what you’ve learned in the course. In this course, you’ve learned about the CIA Triad and other fundamental concepts, like the Parkerian Hexad and non-repudiation. You also explored the OSI Reference Model and how it relates to security and the TCP/IP Reference Model. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 30 users Rating 4.4 of 30 users (30)
Rating 4.5 of 45 users Rating 4.5 of 45 users (45)
Rating 4.6 of 64 users Rating 4.6 of 64 users (64)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 110 users Rating 4.5 of 110 users (110)
Rating 4.5 of 116 users Rating 4.5 of 116 users (116)
Rating 4.6 of 66 users Rating 4.6 of 66 users (66)