CISSP: Security Engineering Part 2


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Even in an age of digitized data, securing the physical environment is still a critical part of security engineering. In this course, you'll learn about security threats, both natural and man-made, and techniques for preventing loss from these threats. You'll also learn about site and facility design considerations, restricted work area security, and best practices for crime prevention through secure design of the physical environment. This course is one of a series in the SkillSoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.

Target Audience
Individuals interested in information systems security concepts, methodologies and best practices; candidates for the Certified Information Systems Security Professional (CISSP) exam

Prerequisites
None

Expected Duration (hours)
2.3

Lesson Objectives

CISSP: Security Engineering Part 2

  • start the course
  • identify best practices for assessing and mitigating web-based systems vulnerabilities
  • identify best practices for assessing and mitigating mobile system vulnerabilities
  • identify best practices for assessing and mitigating embedded device and cyber-physical system vulnerabilities
  • describe cryptography features and history
  • recognize characteristics of the cryptographic life cycle
  • identify characteristics of symmetric cryptography
  • identify characteristics of asymmetric cryptography
  • identify characteristics of elliptic curve cryptography
  • identify characteristics of PKI
  • identify best practices for key management
  • use digital signatures for sending and receiving data
  • identify best practices for managing digital rights
  • identify the role of nonrepudiation when applying cryptography
  • identify the role of integrity when applying cryptography
  • distinguish between cryptanalytic attack methods
  • identify elements of site and facility security assessments
  • identify site and facility design considerations
  • describe crime prevention through environmental design when assessing sites and facilities
  • identify categories of threats that organizations face
  • identify considerations when planning facility security for an organization
  • identify best practices for computer and equipment room security
  • identify best practices for securing restricted work areas
  • identify best practices for safely and securely integrating utilities and HVAC systems in the physical environment
  • identify best practices for preventing and responding to water risks
  • identify best practices for preventing, detecting, and suppressing fires and fire-related security risks and damage
  • select appropriate security controls for a data center, and identify the most appropriate utility, water, and fire security controls to protect the physical environment
  • Course Number:
    sp_cisp_a05_it_enus

    Expertise Level
    Intermediate