Overview/Description
Even in an age of digitized data, securing the physical environment is still a critical part of security engineering. In this course, you'll learn about security threats, both natural and man-made, and techniques for preventing loss from these threats. You'll also learn about site and facility design considerations, restricted work area security, and best practices for crime prevention through secure design of the physical environment. This course is one of a series in the SkillSoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Target Audience
Individuals interested in information systems security concepts, methodologies and best practices; candidates for the Certified Information Systems Security Professional (CISSP) exam
identify best practices for assessing and mitigating web-based systems vulnerabilities
identify best practices for assessing and mitigating mobile system vulnerabilities
identify best practices for assessing and mitigating embedded device and cyber-physical system vulnerabilities
describe cryptography features and history
recognize characteristics of the cryptographic life cycle
identify characteristics of symmetric cryptography
identify characteristics of asymmetric cryptography
identify characteristics of elliptic curve cryptography
identify characteristics of PKI
identify best practices for key management
use digital signatures for sending and receiving data
identify best practices for managing digital rights
identify the role of nonrepudiation when applying cryptography
identify the role of integrity when applying cryptography
distinguish between cryptanalytic attack methods
identify elements of site and facility security assessments
identify site and facility design considerations
describe crime prevention through environmental design when assessing sites and facilities
identify categories of threats that organizations face
identify considerations when planning facility security for an organization
identify best practices for computer and equipment room security
identify best practices for securing restricted work areas
identify best practices for safely and securely integrating utilities and HVAC systems in the physical environment
identify best practices for preventing and responding to water risks
identify best practices for preventing, detecting, and suppressing fires and fire-related security risks and damage
select appropriate security controls for a data center, and identify the most appropriate utility, water, and fire security controls to protect the physical environment