Security Operations

Intermediate
  • 16 videos | 45m 40s
  • Includes Assessment
  • Earns a Badge
Likes 23 Likes 23
Enterprise computer systems require a solid understanding of security practices. Explore codes of ethics, confidentiality, integrity, and availability, privacy, accountability, and non-repudiation, and security best practices.

WHAT YOU WILL LEARN

  • identify characteristics of the (ISC)2 Code of Ethics and best practices for compliance
    identify best practices for compliance with organizational code of ethics
    describe characteristics of the concept of confidentiality
    identify characteristics of the concept of integrity
    identify characteristics of the concept of availability
    identify characteristics of the concept of accountability
    identify characteristics of the concept of privacy
    identify characteristics of the concept of non-repudiation
  • identify characteristics of the concept of least privilege
    identify characteristics of the concept of separation of duties
    describe best practices for deterrent security controls
    describe best practices for preventive security controls
    describe best practices for detective security controls
    describe best practices for corrective security controls
    describe best practices for compensating security controls
    identify appropriate best practices when implementing different types of operational security controls

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Channel Cybersecurity
Likes 695 Likes 695  
Likes 23 Likes 23  
Likes 232 Likes 232  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE