Companies Home Search Profile

CISSP : Domain 2 : Asset Security - Learn 2024

Focused View

CloudMatrix Learning

3:23:47

111 View
  • 1. Introduction.mp4
    02:21
  • 2. Introduction Domain 2 Asset Security.mp4
    03:29
  • 1. Introduction Asset Classification.mp4
    02:57
  • 2. Asset Inventory.mp4
    02:17
  • 3. Asset Ownership.mp4
    02:48
  • 4. Asset Management.mp4
    03:09
  • 5. Classification Principles.mp4
    02:41
  • 6. Classification Process.mp4
    02:12
  • 7. Classification Policy.mp4
    03:33
  • 8. Classification Schema.mp4
    02:36
  • 9. Classification Schema Military.mp4
    02:28
  • 10. Classification Schema Commercial.mp4
    03:33
  • 11. Summary Implementing Asset Classification.mp4
    04:02
  • 12. Lab Analyzing Asset Classification.html
  • 1. Introduction Secure Data Handling.mp4
    01:31
  • 2. Data Policies.mp4
    02:39
  • 3. Secure Data Handling.mp4
    03:00
  • 4. Marking.mp4
    02:13
  • 5. Labels.mp4
    01:49
  • 6. Data Storage.mp4
    02:23
  • 7. Data Remanence.mp4
    01:48
  • 8. Data Destruction.mp4
    03:50
  • 9. Quality Control.mp4
    03:25
  • 10. Lab Discussing Secure Data Handling.html
  • 1. Introduction Resource Provisioning and Protection.mp4
    02:14
  • 2. Purpose of Provisioning.mp4
    01:50
  • 3. Configuration Management.mp4
    06:15
  • 4. Asset Concerns in Configuration Management.mp4
    03:39
  • 5. Asset Management (Physical and Virtual).mp4
    06:45
  • 6. Applications.mp4
    02:21
  • 7. Baselining.mp4
    02:36
  • 8. Automation.mp4
    02:21
  • 9. Configuration Management (Policy and Practice).mp4
    05:58
  • 10. Configuration Management Database (CMDB).mp4
    02:36
  • 11. Media Management.mp4
    05:35
  • 12. Summary Provisioning and Protecting Resources.mp4
    05:34
  • 13. Lab Analyzing Resource Provisioning and Protection.html
  • 1. Introduction Manage Data Lifecycle.mp4
    03:01
  • 2. Data Lifecycle.mp4
    04:30
  • 3. Privacy.mp4
    03:04
  • 4. Privacy Laws.mp4
    03:07
  • 5. Private Data Ownership.mp4
    02:04
  • 6. Data Collectors, Controllers, and Processors.mp4
    02:47
  • 7. Collection Limitations.mp4
    01:32
  • 8. Data Location.mp4
    :
  • 9. Databases.mp4
    03:46
  • 10. Data.mp4
    06:57
  • 11. Summary Mananging the Data Lifecycle.mp4
    02:34
  • 12. Lab Discussing Privacy Protection.html
  • 1. Introduction Asset Retention.mp4
    02:27
  • 2. Retention.mp4
    02:43
  • 3. End of Life and End of Service.mp4
    02:09
  • 4. Retention Policy.mp4
    05:37
  • 5. Hardware and Software Retention.mp4
    05:31
  • 6. Data Retention Considerations.mp4
    02:34
  • 7. Media and Personnel Retention.mp4
    05:15
  • 8. Summary Asset Retention.mp4
    04:57
  • 9. Lab Analyzing Asset Retention.html
  • 1. Introduction Data Security Controls.mp4
    02:27
  • 2. Data Selection.mp4
    06:41
  • 3. Scoping and Tailoring.mp4
    02:46
  • 4. Data RUT ( Rest, Use, Transit).mp4
    08:27
  • 5. Data Protection.mp4
    04:04
  • 6. Data Encryption.mp4
    02:25
  • 7. Summary Implementing Data Security Controls.mp4
    03:54
  • 8. Lab Analyzing Security Controls.html
  • Description


    CISSP: Domain 2 - Asset Security: Protecting Information Assets in 2024

    What You'll Learn?


    • Data Classification and Control: Understand the principles of data classification and how to categorize information assets based on their sensitivity.
    • Ownership and Maintenance of Information Assets: Identify the roles and responsibilities for information asset owners, custodians, and users.
    • Privacy and Sensitive Information Protection: Examine privacy principles and regulations (e.g., GDPR, HIPAA) that govern the handling.
    • Appropriate Retention of Records and Information: Learn about record retention policies, schedules, and legal/regulatory requirements for maintaining infor.
    • Handling of Information Assets: Explore best practices for the secure handling, storage, and transportation of information assets in both physical and digital.
    • Cryptography and Encryption Concepts: Gain an understanding of cryptographic principles, algorithms, and key management practices.

    Who is this for?


  • Individuals preparing to take the CISSP exam: The course covers one of the eight domains that are tested on the CISSP exam, so it would be relevant for those studying to obtain the CISSP certification.
  • Current CISSPs looking to refresh their knowledge: Even for those who have already earned the CISSP, reviewing the specific domains can be beneficial for maintaining and updating their security expertise.
  • Information security professionals: While the course is structured around the CISSP exam, the content on protecting information assets is relevant for any security practitioner, regardless of certification status.
  • What You Need to Know?


  • Minimum of 5 years of direct full-time security work experience in at least 2 of the 8 CISSP domains
  • Understanding of information security principles, risk management, and security controls
  • Familiarity with various security technologies, policies, and procedures
  • Strong analytical and problem-solving skills
  • Knowledge of relevant laws, regulations, and industry standards
  • More details


    Description

    Course Description: CISSP Domain 2 - Asset Security (Learn 2024)


    This course is designed to provide a comprehensive understanding of the Asset Security domain within the Certified Information Systems Security Professional (CISSP) certification framework. The course covers the key concepts, principles, and best practices related to the protection and management of information assets, including physical and digital assets.


    Course Objectives:


    1. Understand the fundamental principles of asset security, including the identification, classification, and valuation of information assets.

    2. Learn the techniques and strategies for protecting information assets from various threats, such as unauthorized access, data breaches, and physical damage.

    3. Explore the role of access controls, cryptography, and other security mechanisms in safeguarding information assets.

    4. Gain knowledge on the implementation and management of security controls, including policies, procedures, and standards.

    5. Understand the importance of asset security in the context of risk management and compliance requirements.

    6. Develop the skills to effectively plan, implement, and maintain asset security measures within an organization.


    Course Outline:


    1. Introduction to Asset Security

      • Defining information assets

      • Asset identification, classification, and valuation

      • Importance of asset security in information security

    2. Protecting Information Assets

      • Access control mechanisms

      • Cryptographic techniques

      • Physical security controls

      • Logical security controls

    3. Security Control Implementation and Management

      • Security policies, procedures, and standards

      • Security awareness and training

      • Incident response and recovery planning

    4. Asset Security in Risk Management and Compliance

      • Risk assessment and mitigation strategies

      • Regulatory and industry-specific compliance requirements

      • Monitoring and auditing asset security measures

    5. Practical Applications and Case Studies

      • Implementing asset security in real-world scenarios

      • Addressing common challenges and best practices

      • Aligning asset security with organizational goals and objectives


    This course is designed for IT professionals, security practitioners, and individuals preparing for the CISSP certification exam. By the end of the course, participants will have a deep understanding of the Asset Security domain and the skills to effectively manage and protect information assets within their organizations.

    Who this course is for:

    • Individuals preparing to take the CISSP exam: The course covers one of the eight domains that are tested on the CISSP exam, so it would be relevant for those studying to obtain the CISSP certification.
    • Current CISSPs looking to refresh their knowledge: Even for those who have already earned the CISSP, reviewing the specific domains can be beneficial for maintaining and updating their security expertise.
    • Information security professionals: While the course is structured around the CISSP exam, the content on protecting information assets is relevant for any security practitioner, regardless of certification status.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    CloudMatrix Learning
    CloudMatrix Learning
    Instructor's Courses
    CloudMatrix Learning. is an innovative information technology company specializing in Learning Services. Based in the Europe, the company was established with the mission to transform how educational content is delivered and consumed by leveraging cutting-edge technologies.The flagship product of CloudMatrix Learning is a dynamic learning management system (LMS) that offers scalable solutions for educational institutions and corporate training programs. This platform integrates seamlessly with existing educational tools and provides real-time analytics that helps educators enhance their teaching methods and improve student engagement.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 60
    • duration 3:23:47
    • Release Date 2024/07/26

    Courses related to CISSP - Certified Information Systems Security Professional

    Courses related to Network Security