CISSP®: Security Assessment and Testing
Pluralsight
Course Summary
In this course, you build upon the skills learned in previous CISSP domains and learn to put them all to use when validating the effectiveness of your controls.
-
+
Course Description
Your controls have been selected and implemented, users have been educated, and everything seems to be in order. Even if this is the case, odds are that there are still unidentified risks in your environment. If you want to be certain that your controls are working as intended, you will need to perform risk assessments and penetration testing. The 6th domain of the CISSP CBK addresses this concern with topics such as information assurance, testing strategies including penetration testing, log reviews, and third party assessment. In this course, CISSP®: Security Assessment and Testing, you build upon the skills learned in previous CISSP domain and learn to put them all to use when validating the effectiveness of your controls. First, you'll learn about security assessment and test strategies. Next, you'll learn about security controls validation, security and related data collection, as well as analyzing test results. Finally, the course will wrap up by covering third-party risk assessments. By the end this course, you should be familiar with a broad spectrum of topics that are covered within the sixth domain of the CISSP.
-
+
Course Syllabus
Course Overview- 1m 35s
—Course Overview 1m 35sAssessment and Testing Strategies- 31m 22s
—Course Introduction 3m 40s
—Ensuring Objectives Have Been Met 8m 40s
—Resource Constraints 3m 11s
—Security Assessment Foundations 5m 44s
—Security Assessment Program 2m 11s
—Assessment Viewpoints 2m 17s
—Assessment Types 4m 49s
—Summary 0m 47sSecurity Control Effectiveness Testing- 53m 45sSecurity Process Data Collection- 9m 2sTest Result Analysis- 11m 48sThird-party Assessment- 7m 11sInformation Security Continuous Monitoring- 8m 15s