CISSP - ISC2 Certified Information Systems Security Professional (SF)
About This Course
• Relate confidentiality, integrity, availability, non-repudiation, authenticity, privacy and safety to due care and due diligence
• Identify and select security assessment approaches, frameworks and standards
• Relate information security governance to organizational business strategies, goals, missions and objectives
• Identify the different types and categories of information security controls and their use.
• Compare and contrast the security operations characteristics of different types of governance and administrative controls
• Develop incident response policies and plans. Link incident response to needs for security controls and their operational use
• Understand internal, external and third party assessment and testing
• Explain how governance frameworks and processes relate to the operational use of information security controls
What You'll Learn
Entry Requirements
Practicing security, ICT professional or anyone that has the necessary IT qualifications that wants to enter the field of Information Security.