(ISC)2 Certified Information Systems Security Professional (CISSP) (SF) (Synchronous e-learning)
About This Course
• Relate confidentiality, integrity, availability, non-repudiation, authenticity, privacy and safety to due care and due diligence
• Identify and select security assessment approaches, frameworks and standards
• Relate information security governance to organizational business strategies, goals, missions and objectives
• Identify the different types and categories of information security controls and their use.
• Compare and contrast the security operations characteristics of different types of governance and administrative controls
• Develop incident response policies and plans. Link incident response to needs for security controls and their operational use
• Understand internal, external and third party assessment and testing
• Explain how governance frameworks and processes relate to the operational use of information security controls
What You'll Learn
Entry Requirements
Executives and professionals in IT, professionals in information and operational risk management, internal control and IT audit, and specialists in IT infrastructure security. Management level staff that manages technology risk may also find the course beneficial.