We may earn an affiliate commission when you visit our partners.
Kevin Henry

This course will teach you skills and concepts required to identify and protect the assets of the organization needed for the Certified Information Systems Security Professional (CISSP®)exam.

Read more

This course will teach you skills and concepts required to identify and protect the assets of the organization needed for the Certified Information Systems Security Professional (CISSP®)exam.

In this course, Asset Security for CISSP®, you’ll learn to fulfill the core responsibility of the information security professional - protecting the assets of the organization. First, you’ll explore asset identification. Next, you’ll discover the challenge and purpose of asset ownership. Finally, you’ll learn how to protect data and information through the data lifecycle. When you’re finished with this course, you’ll have the skills and knowledge of asset security needed for the Certified Information Systems Security Professional (CISSP®) exam.

Enroll now

What's inside

Syllabus

Course Overview
Asset Classification
The Data Lifecycle
Domain Summary
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Builds a strong foundation for learners seeking certification as Certified Information Systems Security Professionals (CISSP®)
Taught by highly reputable instructors who are recognized for their work in the information security field
Teaches skills and concepts necessary for the Certified Information Systems Security Professional (CISSP®) certification exam

Save this course

Save Asset Security for CISSP® to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Asset Security for CISSP® with these activities:
Review 'Official (ISC)2 CISSP CBK Reference Guide' by James Michael Stewart
Provides a review of all the domains covered in the CISSP CBK, which will prepare you for this course and the CISSP exam.
Show steps
  • Obtain a copy of the book.
  • Review the chapter summaries.
  • Complete the practice questions at the end of each chapter.
Review basic security concepts
Begin your journey by refreshing the general principles of information security.
Show steps
Review 'Mastering CISSP' by Darril Gibson
Provides a review of key concepts covered by the CISSP exam, which will prepare you to do well in this course.
Show steps
  • Obtain a copy of the book.
  • Review the chapter summaries.
  • Complete a mock exam online.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Attend a CISSP prep bootcamp
CISSP prep bootcamps are intensive courses that can help you prepare for the CISSP exam in a short amount of time. Attending a bootcamp will help you review the key concepts and practice taking practice exams.
Show steps
  • Research and select a CISSP prep bootcamp.
  • Register for the bootcamp.
  • Attend the bootcamp.
Complete tutorials on SANS Institute's website
The SANS Institute is an industry leader in cybersecurity and offers high-quality training materials. Completing these tutorials will help you deepen your understanding of the topics.
Show steps
  • Create an account on SANS Institute's website.
  • Search for tutorials related to CISSP.
  • Complete the tutorials.
Complete practice questions on Boson's CISSP Exam Simulator
Boson's CISSP Exam Simulator is a popular tool for practicing CISSP exam questions. Completing these practice questions will help you identify your strengths and weaknesses.
Show steps
  • Purchase Boson's CISSP Exam Simulator.
  • Complete the practice questions.
  • Review your results and identify areas for improvement.
Write a white paper on a security topic of your choice
Writing a white paper will help you research and analyze a security topic in depth and demonstrate your understanding.
Browse courses on Information Security
Show steps
  • Choose a security topic.
  • Research the topic.
  • Write the white paper.
  • Submit the white paper.

Career center

Learners who complete Asset Security for CISSP® will develop knowledge and skills that may be useful to these careers:
IT Auditor
The IT Auditor is responsible for assessing the effectiveness of an organization's IT controls.
Information Security Analyst
The Information Security Analyst is responsible for ensuring the integrity, confidentiality, and availability of an organization's IT systems. They are responsible for managing and mitigating the risks to information security.
Risk Manager
The Risk Manager is responsible for identifying and mitigating risks to an organization's assets, including IT assets.
Security Engineer
The Security Engineer is responsible for designing, implementing, and maintaining security controls to protect an organization's IT systems.
Privacy Analyst
The Privacy Analyst is responsible for identifying and mitigating the privacy risks associated with an organization's IT systems.
Data Protection Officer
The Data Protection Officer (DPO) is responsible for overseeing data protection and compliance within an organization. They ensure that the organization complies with relevant data protection regulations.
Incident Responder
The Incident Responder is responsible for responding to and managing security incidents.
Compliance Manager
The Compliance Manager is responsible for ensuring that an organization complies with relevant laws and regulations.
Penetration Tester
The Penetration Tester is responsible for conducting penetration tests to identify vulnerabilities in an organization's IT systems.
Security Architect
The Security Architect is responsible for designing and implementing security architectures for organizations.
Cybersecurity Consultant
The Cybersecurity Consultant provides advice and guidance to organizations on how to improve their cybersecurity posture.
Chief Information Security Officer
The Chief Information Security Officer (CISO) is the head of an organization's IT security program.
Business Continuity Planner
The Business Continuity Planner is responsible for developing and implementing business continuity plans to ensure that an organization can continue to operate in the event of a disruption.
Cybersecurity Researcher
The Cybersecurity Researcher conducts research to develop new cybersecurity technologies and techniques.
Operations Security Analyst
The Operations Security Analyst is responsible for monitoring and responding to security events in an organization's IT systems.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Asset Security for CISSP®.
Provides a comprehensive overview of cryptography and network security, and it valuable resource for anyone who is interested in learning more about this topic.
Provides a comprehensive overview of network security essentials, and it valuable resource for anyone who is interested in learning more about this topic.
Provides a comprehensive overview of firewalls and intrusion detection systems, and it valuable resource for anyone who is interested in learning more about this topic.
Provides a comprehensive overview of security testing, penetration testing, and risk management, and it valuable resource for anyone who is interested in learning more about this topic.
Provides a comprehensive overview of data and computer communications, and it valuable resource for anyone who is interested in learning more about this topic.
Provides a comprehensive overview of cybersecurity, and it valuable resource for anyone who is interested in learning more about this topic.
Provides a good overview of computer security basics, and it good resource for anyone who is interested in learning more about this topic.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Asset Security for CISSP®.
Exam Review Tips and Tricks for CISSP®
Most relevant
Security and Risk Management: Principles of Risk for...
Most relevant
Security Architecture and Engineering: Cryptography for...
Most relevant
Communication and Network Security for CISSP®
Most relevant
Identity and Access Management (IAM) for CISSP®
Most relevant
Certified Information Systems Security Professional...
Most relevant
Identity and Access Management (IAM) for CISSP®
Most relevant
Security Operations: Operations Management for CISSP®
Most relevant
Security Architecture and Engineering: Security Controls...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser