This document outlines the modules and lessons covered in a cybersecurity certification program. It includes 9 modules that cover topics such as security and risk management, asset security, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, software development security, and attaining and maintaining the certification. Some of the specific lessons mentioned include professional ethics, security concepts, governance principles, risk management, threat modeling, cryptography, access control, authentication, auditing, incident response, and disaster recovery.
This document outlines the modules and lessons covered in a cybersecurity certification program. It includes 9 modules that cover topics such as security and risk management, asset security, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, software development security, and attaining and maintaining the certification. Some of the specific lessons mentioned include professional ethics, security concepts, governance principles, risk management, threat modeling, cryptography, access control, authentication, auditing, incident response, and disaster recovery.
This document outlines the modules and lessons covered in a cybersecurity certification program. It includes 9 modules that cover topics such as security and risk management, asset security, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, software development security, and attaining and maintaining the certification. Some of the specific lessons mentioned include professional ethics, security concepts, governance principles, risk management, threat modeling, cryptography, access control, authentication, auditing, incident response, and disaster recovery.
Lesson 1: Understand, Adhere to, and Promote Professional Ethics
Lesson 2: Understand and Apply Security Concepts Lesson 3: Evaluate and Apply Security Governance Principles Lesson 4: Determine Compliance and Other Requirements Lesson 5: Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context Lesson 6: Understand Requirements for Investigation Types Lesson 7: Develop, Document, and Implement Security Policy, Standards, Procedures, and Lesson 8: Identify, Analyze, and Prioritize Business Continuity Requirements Lesson 9: Contribute to and Enforce Personnel Security Policies and Procedures Lesson 10: Understand and Apply Risk Management Concepts Lesson 11: Understand and Apply Threat Modeling Concepts and Methodologies Lesson 12: Apply Supply Chain Risk Management Concepts Lesson 13: Establish and Maintain a Security Awareness, Education, and Training Program
Module 2: Asset Security
Lesson 14: Identify and Classify Information and Assets Lesson 15: Establish Information and Asset Handling Requirements Lesson 16: Provision Resources Securely Lesson 17: Manage Data Lifecycle Lesson 18: Ensure Appropriate Asset Retention Lesson 19: Determine Data Security Controls and Compliance Requirements
Module 3: Security Architecture and Engineering
Lesson 20: Research, Implement, and Manage Engineering Processes Using Secure Design Principles Lesson 21: Understand the Fundamental Concepts of Security Models Lesson 22: Select Controls Based Upon System Security Requirements Lesson 23: Understand Security Capabilities of Information Systems Lesson 24: Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements Lesson 25: Select and Determine Cryptographic Solutions Lesson 26: Understand Methods of Cryptanalytic Attacks Lesson 27: Apply Security Principles to Site and Facility Design Lesson 28: Design Site and Facility Security Controls
Module 4: Communication and Network Security
Lesson 29: Assess and Implement Secure Design Principles in Network Architecture Lesson 30: Secure Network Components Lesson 31: Implement Secure Communication Channels According to Design
Module 5: Identity and Access Management (IAM)
Lesson 32: Control Physical and Logical Access to Assets Lesson 33: Manage Identification and Authentication of People, Devices, and Services Lesson 34: Federated Identity with a Third-party Service Lesson 35: Implement and Manage Authorization Mechanisms Lesson 36: Manage the Identity and Access Provisioning Lifecycle Lesson 37: Implement Authentication Systems Module 6: Security Assessment and Testing Lesson 38: Design and Validate Assessment, Test, and Audit Strategies Lesson 39: Conduct Security Controls Testing Lesson 40: Collect Security Process Data Lesson 41: Analyze Test Output and Generate Report Lesson 42: Conduct or Facilitate Security Audits
Module 7: Security Operations
Lesson 43: Understand and Comply with Investigations Lesson 44: Conduct Logging and Monitoring Activities Lesson 45: Perform Configuration Management Lesson 46: Apply Foundational Security Operations Concepts Lesson 47: Apply Resource Protection Lesson 48: Conduct Incident Management Lesson 49: Operate and Maintain Detective and Preventative Measures Lesson 50: Implement and Support Patch and Vulnerability Management Lesson 51: Understand and Participate in Change Management Process Lesson 52: Implement Recovery Strategies Lesson 53: Implement Disaster Recovery Processes Lesson 54: Test Disaster Recovery Plans Lesson 55: Participate in Business Continuity (BC) Planning and Exercises Lesson 56: Implement and Manage Physical Security Lesson 57: Address Personnel Safety and Security Concerns
Module 8: Software Development Security
Lesson 58: Understand and Integrate Security in the Software Development Lifecycle Lesson 59: Identify and Apply Security Controls in Software Development Ecosystems Lesson 60: Assess the Effectiveness of Software Security Lesson 61: Assess the Security Impact of Acquired Software Lesson 62: Define and Apply Secure Coding Guidelines and Standards Module 9: Attaining and Maintaining Your CISSP Lesson 63: Preparing for Your Examination Lesson 64: The Certification Process
CISSP 4 in 1 - Beginners Guide+ Guide To Learn CISSP Principles+ The Fundamentals of Information Security Systems For CISSP... (Jones, Daniel) (Z-Library)
Cissp Exam Certification Companion 1000 Practice Questions and Expert Strategies For Passing The Cissp Exam Certification Study Companion Series 1St Edition Bouke Full Chapter