Skip to content

In this course, I developed a greater understanding of the eight Certified Information Systems Security Professional (CISSP) security domains, as well as specific security frameworks and controls. I have also been introduced to how to use security tools and audits to help protect assets and data.

License

Notifications You must be signed in to change notification settings

sondosaabed/Manage-Security-Risks

Repository files navigation

Play it safe: Manage Security Risks

In this course, I developed a greater understanding of the eight Certified Information Systems Security Professional (CISSP) security domains, as well as specific security frameworks and controls. I have also been introduced to how to use security tools and audits to help protect assets and data. These are key concepts in the cybersecurity field, and understanding them helps keeping organizations, and the people they serve, safe from threats, risks, and vulnerabilities. image

Skill sets:

  • Applying the CIA triad to workplace situations
  • Analyzing log data
  • Identifying the phases of an incident response playbook

Course Modules

Module 1: Security domains

Gaining understanding of the CISSP’s eight security domains. Then, learning about primary threats, risks, and vulnerabilities to business operations. In addition, exploring the National Institute of Standards and Technology’s (NIST) Risk Management Framework (RMF) and the steps of risk management.

Module 2: Security frameworks and controls

Focusing on security frameworks and controls, along with the core components of the confidentiality, integrity, and availability (CIA) triad. Learned about Open Web Application Security Project (OWASP) security principles and security audits.

Module 3: Introduction to cybersecurity tools

Exploring industry leading security information and event management (SIEM) tools that are used by security professionals to protect business operations. Learned how entry-level security analysts use SIEM dashboards as part of their every day work.

Module 4: Use playbooks to respond to incidents

Learning about the purposes and common uses of playbooks. Also exploring how cybersecurity professionals use playbooks to respond to identified threats, risks, and vulnerabilities.

Course Certificate

image

About

In this course, I developed a greater understanding of the eight Certified Information Systems Security Professional (CISSP) security domains, as well as specific security frameworks and controls. I have also been introduced to how to use security tools and audits to help protect assets and data.

Topics

Resources

License

Stars

Watchers

Forks