Read Me First (IST Specific) - University of Phoenix
Read Me First
Introduction
THIS COURSE INTRODUCES STUDENTS TO THE CONCEPT OF INFORMATION SYSTEMS SECURITY WITHIN THE FRAMEWORK OF A MAJOR SECURITY CERTIFICATION – THE CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP®) CERTIFICATION. IT PROVIDES AN OVERVIEW OF THE NEW EIGHT DOMAINS OF THE CISSP® CERTIFICATION AND PREPARES STUDENTS FOR MORE DETAILED WORK IN THE SUBSEQUENT PROGRAM COURSES. THOSE DOMAINS INCLUDE; SECURITY AND RISK MANAGEMENT, ASSET SECURITY, SECURITY ENGINEERING, COMMUNICATION AND NETWORK SECURITY, IDENTITY AND ACCESS MANAGEMENT, SECURITY ASSESSMENT AND TESTING, SECURITY OPERATIONS, AND SOFTWARE DEVELOPMENT SECURITY.
If you are familiar with the ten domains format that the CISSP® certification used to follow, note that most of the content has been remapped into the current eight domains format with new topics added to these eight domains (see note below).
Course Overview
Week One of the course introduces you to the Certified Information Systems Security Professional (CISSP®) certification. You receive an overview of each of the new eight domains of the CISSP®, however, many existing books are still using the old ten domains. In addition, you will learn more about the first and second domains: Security and Risk Management and Asset Security. In the remaining four weeks, you will explore an additional two domain areas per week (excluding the final week). This will give you a thorough understanding of each domain by the end of the course and the final week will include the review of all eight domains.
The Week Two focus is on the various security models in use today and some common threats and countermeasures to protect a variety of computer hardware and software architectures. Cryptography is also covered, including specific cryptography algorithms used to mitigate threats to enterprise systems, the role of digital signatures in securing systems, and modern cryptography.
Week Three introduces you to Identify as a Service (IDaaS) and testing and assessment strategies for software development. You will also learn about regulatory requirements and governance.
Week Four takes you on a journey through security operations and software development security. You will learn how to develop preventative measures against cyber-attacks and the importance of implementing a supportive Change and Configuration Management Plan.
Week Five reviews the eight domains and has you presenting your recommendations for security to ensure that your organization will remain secure and in compliance.
Main Concepts
The main concept of this course is to take you through an in-depth understanding of the knowledge, tools, techniques, and processes used in protecting information and physical assets of an organization.
This Course in relationship to the program
INFORMATION SECURITY IS AN IMPORTANT SKILL IN A PROGRAM FOCUSED ON INFORMATION TECHNOLOGY. WITH INCREASING THREAT TO EXPLOIT VULNERABILITY IN CONNECTED SYSTEMS, THE ABILITY TO PROTECT THESE ASSETS IS SOMETHING THAT MODERN DAY COMPUTING CANNOT DO WITHOUT THE SUPPORTING RESOURCES AND TALENT.
Career Connections
AS A COURSE THAT IS MODELLED CLOSELY TO THE CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP®) CERTIFICATION EXAMINATION, THE CONTENT IN THIS COURSE HELPS YOU UNDERSTAND THE KNOWLEDGE AND SKILLS NEEDED TO OBTAIN A CAREER IN CYBERSECURITY AND ALLOWS YOU TO ACQUIRE THE SKILLS TO SIT FOR THE CISSP® CERTIFICATION EXAM.
NOTE
MOST TOPICS CAN BE MAPPED FROM THE OLD TEN DOMAINS FORMAT TO THE NEW EIGHT DOMAINS FORMAT BELOW:
1. Cryptography is absorbed into Security Engineering and Asset Security
2. Security Architecture and Design is absorbed into Security Engineering
3. Business Continuity and Disaster Recovery Planning is absorbed into Security Operation and Security and Risk Management
4. Legal, Regulations, Investigations, and Compliance is absorbed into Security and Risk Management and Security Operations
5. Physical Security is absorbed into Security Engineering and Security Operations
6. New or renamed modules are: Asset Security, Security Engineering, Security Assessment, and Testing
7. Access Control is renamed Identity and Access Management
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
Related searches
- university of phoenix portal
- university of phoenix online sign in
- university of phoenix ecampus website
- university of phoenix ecampus portal
- university of phoenix majors list
- university of phoenix bachelor programs
- university of phoenix bachelors cost
- university of phoenix student portal
- university of phoenix ecampus log in
- university of phoenix site down
- university of phoenix biology degree
- university of phoenix employee portal