CISSP 2021: Security Governance Principles

CISSP    |    Expert
  • 8 videos | 42m 17s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 98 users Rating 4.5 of 98 users (98)
All security imitative begin at the top as an aspect of global corporate governance. The modern security architect must understand the role of security governance in the bigger picture as well as how it should align with the value proposition of the organization. This course will help you get familiar with the principles of security governance, aspects of compliance and industry standards, and the components of conducting investigations. After you are done with this course, you will be able to recognize and assess issues related to security governance, compliance, and regulations. Further, this course will help you prepare for the CISSP exam.


  • Discover the key concepts covered in this course
    Describe methods for aligning security with business strategy, goals, mission, and objectives
    Define various organizational roles, responsibilities, and processes such as acquisitions and divestitures
    Describe the concepts of due care and due diligence, providing real-world examples
  • Outline contractual and legal industry standards and other regulatory privacy requirements
    Define issues that pertain to cybercrime, data breaches, ip, import/export, and transborder data flow
    List the requirements for investigation types such as administrative, criminal, civil, regulatory, and industry standards
    Summarize the key concepts covered in this course


  • 1m 33s
    Meet your instructor. Explore how security initiatives begin at the top, as part of global corporate governance. Security architects must understand the role of security governance in the bigger picture, as well as key alignment with the value proposition of the organization. This course covers several objectives in domain, part of the CISSP body of knowledge, security, and risk management. FREE ACCESS
  • 6m 3s
    Learn how to align security with business. All security practitioners, engineers, architects, and developers must understand that security must meet the needs and goals of your business. Every security initiative must be coupled and aligned and have synergy with the strategic and tactical goals of the enterprise. This alignment must permeate through all organizational processes. FREE ACCESS
  • Locked
    3.  Organizational Roles, Responsibilities, and Processes
    4m 59s
    Explore organizational roles, responsibilities, and processes, as security initiatives require a broad awareness of all organizational roles and responsibilities. Understand identity and access management, which includes placing the right people in the right group and containers, with the correct rights and permissions. You’ll learn to handle different structures, from traditional top-down organizations to functional organizations to flat horizontal organizations. FREE ACCESS
  • Locked
    4.  Due Care and Due Diligence
    5m 42s
    Explore governance, due diligence and due care. Security governance guides the course and the control of organizational security operations, initiatives, and activities. Due diligence relates to thorough research, information gathering, and planning before committing to a strategy. Due care can involve using security principles like least privilege, defense in depth, separation of duties, zero trust for continual improvement and maturity. FREE ACCESS
  • Locked
    5.  Compliance and Other Requirements
    11m 17s
    Learn about a component of governance known as compliance, along with other requirements. This includes privacy, protecting data, and intellectual property. Compliance means observing a rule, such as a policy, standard, specification, or law. Regulatory compliance, which is different from organizational compliance, outlines the goals organizations want to accomplish to certify or be accredited. FREE ACCESS
  • Locked
    6.  Legal and Regulatory Issues
    8m 8s
    Explore legal and regulatory issues. Organizations typically face cyber threats in three main areas: disruption, where cybercriminals use new ransomware; then distortion, the spread of misinformation using bots, distributed denial of service attacks, and other automated sources to cause a compromise of trust; finally, deterioration where advances in smart technology negatively impact an enterprise's ability to control information. FREE ACCESS
  • Locked
    7.  Requirements for Investigations
    3m 44s
    Learn about investigations and their requirements. Security investigations often go beyond working with HR. Employment candidates go through screening processes and elaborate investigations and background checks depending upon the sensitivity of their roles and responsibilities. Additionally, different organizations will do periodic investigations or periodic reviews as part of their employment policy. FREE ACCESS
  • Locked
    8.  Course Summary
    Review what you’ve learned in this course. You’ve learned about security governance principles and how to align security with business roles and responsibilities. You also learned about governance, due care, and due diligence. Finally, you explored a wide variety of compliance, legal, and regulatory as well as import/export issues. FREE ACCESS


Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.


Rating 4.5 of 84 users Rating 4.5 of 84 users (84)
Rating 4.3 of 43 users Rating 4.3 of 43 users (43)
Rating 4.8 of 44 users Rating 4.8 of 44 users (44)


Rating 4.5 of 292 users Rating 4.5 of 292 users (292)
Rating 4.8 of 29 users Rating 4.8 of 29 users (29)
Rating 4.6 of 17 users Rating 4.6 of 17 users (17)