Read Me First (IST Specific) - University of Phoenix



Read Me First

Introduction

THIS COURSE INTRODUCES STUDENTS TO THE CONCEPT OF INFORMATION SYSTEMS SECURITY WITHIN THE FRAMEWORK OF A MAJOR SECURITY CERTIFICATION – THE CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP®) CERTIFICATION. IT PROVIDES AN OVERVIEW OF THE NEW EIGHT DOMAINS OF THE CISSP® CERTIFICATION AND PREPARES STUDENTS FOR MORE DETAILED WORK IN THE SUBSEQUENT PROGRAM COURSES. THOSE DOMAINS INCLUDE; SECURITY AND RISK MANAGEMENT, ASSET SECURITY, SECURITY ENGINEERING, COMMUNICATION AND NETWORK SECURITY, IDENTITY AND ACCESS MANAGEMENT, SECURITY ASSESSMENT AND TESTING, SECURITY OPERATIONS, AND SOFTWARE DEVELOPMENT SECURITY.

If you are familiar with the ten domains format that the CISSP® certification used to follow, note that most of the content has been remapped into the current eight domains format with new topics added to these eight domains (see note below).

Course Overview

Week One of the course introduces you to the Certified Information Systems Security Professional (CISSP®) certification. You receive an overview of each of the new eight domains of the CISSP®, however, many existing books are still using the old ten domains. In addition, you will learn more about the first and second domains: Security and Risk Management and Asset Security. In the remaining four weeks, you will explore an additional two domain areas per week (excluding the final week). This will give you a thorough understanding of each domain by the end of the course and the final week will include the review of all eight domains.

The Week Two focus is on the various security models in use today and some common threats and countermeasures to protect a variety of computer hardware and software architectures. Cryptography is also covered, including specific cryptography algorithms used to mitigate threats to enterprise systems, the role of digital signatures in securing systems, and modern cryptography.

Week Three introduces you to Identify as a Service (IDaaS) and testing and assessment strategies for software development. You will also learn about regulatory requirements and governance.

Week Four takes you on a journey through security operations and software development security. You will learn how to develop preventative measures against cyber-attacks and the importance of implementing a supportive Change and Configuration Management Plan.

Week Five reviews the eight domains and has you presenting your recommendations for security to ensure that your organization will remain secure and in compliance.

Main Concepts

The main concept of this course is to take you through an in-depth understanding of the knowledge, tools, techniques, and processes used in protecting information and physical assets of an organization.

This Course in relationship to the program

INFORMATION SECURITY IS AN IMPORTANT SKILL IN A PROGRAM FOCUSED ON INFORMATION TECHNOLOGY. WITH INCREASING THREAT TO EXPLOIT VULNERABILITY IN CONNECTED SYSTEMS, THE ABILITY TO PROTECT THESE ASSETS IS SOMETHING THAT MODERN DAY COMPUTING CANNOT DO WITHOUT THE SUPPORTING RESOURCES AND TALENT.

Career Connections

AS A COURSE THAT IS MODELLED CLOSELY TO THE CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP®) CERTIFICATION EXAMINATION, THE CONTENT IN THIS COURSE HELPS YOU UNDERSTAND THE KNOWLEDGE AND SKILLS NEEDED TO OBTAIN A CAREER IN CYBERSECURITY AND ALLOWS YOU TO ACQUIRE THE SKILLS TO SIT FOR THE CISSP® CERTIFICATION EXAM.

NOTE

MOST TOPICS CAN BE MAPPED FROM THE OLD TEN DOMAINS FORMAT TO THE NEW EIGHT DOMAINS FORMAT BELOW:

1. Cryptography is absorbed into Security Engineering and Asset Security

2. Security Architecture and Design is absorbed into Security Engineering

3. Business Continuity and Disaster Recovery Planning is absorbed into Security Operation and Security and Risk Management

4. Legal, Regulations, Investigations, and Compliance is absorbed into Security and Risk Management and Security Operations

5. Physical Security is absorbed into Security Engineering and Security Operations

6. New or renamed modules are: Asset Security, Security Engineering, Security Assessment, and Testing

7. Access Control is renamed Identity and Access Management

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download