Implementing a Security Assessment and Authorization Process
Pluralsight
Course Summary
This course teaches you how to approach reviewing the security of systems before introducing them to your environment and how to formally authorize systems. Both are key skills in the National Initiative for Cybersecurity Education framework.
-
+
Course Description
New systems and changes to existing systems are part of any organization. Today, there is heavy emphasis on the security of all major changes to an organization's technology. The National Institute of Cybersecurity Education has a specific requirement for users to learn and understand a formal Security Assessment and Authorization process. In this course, Implementing a Security Assessment and Authorization Process, you'll first learn how to approach formally assessing the security controls of a new system. Next you'll explore the approach taken to formally authorize the system prior to allowing it to become part of your organization's technology. You'll finish the course by learning how to select the correct security testing procedures from a whole library provided by NIST (National Institute for Standards in Technology). Upon completion of this course, you'll be well versed in the knowledge needed to implement and operate a security assessment and authorization process for your organization.
-
+
Course Syllabus
Course Overview- 1m 38s
—Course Overview 1m 38sWhy Care About Security Assessments and Authorization?- 25m 6s
—Overview 2m 37s
—Value of Assessment and Authorization 3m 20s
—What Does It Mean? 4m 6s
—Assessments of Third Parties 3m 44s
—National Initiative for Cybersecurity Education 1m 42s
—Course Roadmap 2m 49s
—Real World Example 5m 40s
—Summary 1m 4sLearning Assessment Fundamentals- 17m 19sLooking at a Typical Assessment Process- 15m 20sComparing Assessment Methods- 15m 17sAssessing Controls- 35m 36sConformance Testing- 17m 7sPresenting Your Assessment Findings- 9m 16sSecurity Authorization- 9m 55s