We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Asset Security for CISSP®

Kevin Henry

This course will teach you skills and concepts required to identify and protect the assets of the organization needed for the Certified Information Systems Security Professional (CISSP®)exam.

Read more

This course will teach you skills and concepts required to identify and protect the assets of the organization needed for the Certified Information Systems Security Professional (CISSP®)exam.

In this course, Asset Security for CISSP®, you’ll learn to fulfill the core responsibility of the information security professional - protecting the assets of the organization. First, you’ll explore asset identification. Next, you’ll discover the challenge and purpose of asset ownership. Finally, you’ll learn how to protect data and information through the data lifecycle. When you’re finished with this course, you’ll have the skills and knowledge of asset security needed for the Certified Information Systems Security Professional (CISSP®) exam.

Enroll now

What's inside

Syllabus

Course Overview
Asset Classification
The Data Lifecycle
Domain Summary
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Builds a strong foundation for learners seeking certification as Certified Information Systems Security Professionals (CISSP®)
Taught by highly reputable instructors who are recognized for their work in the information security field
Teaches skills and concepts necessary for the Certified Information Systems Security Professional (CISSP®) certification exam

Save this course

Save Asset Security for CISSP® to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Asset Security for CISSP®. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Asset Security for CISSP® will develop knowledge and skills that may be useful to these careers:
IT Auditor
The IT Auditor is responsible for assessing the effectiveness of an organization's IT controls.
Information Security Analyst
The Information Security Analyst is responsible for ensuring the integrity, confidentiality, and availability of an organization's IT systems. They are responsible for managing and mitigating the risks to information security.
Risk Manager
The Risk Manager is responsible for identifying and mitigating risks to an organization's assets, including IT assets.
Security Engineer
The Security Engineer is responsible for designing, implementing, and maintaining security controls to protect an organization's IT systems.
Privacy Analyst
The Privacy Analyst is responsible for identifying and mitigating the privacy risks associated with an organization's IT systems.
Data Protection Officer
The Data Protection Officer (DPO) is responsible for overseeing data protection and compliance within an organization. They ensure that the organization complies with relevant data protection regulations.
Incident Responder
The Incident Responder is responsible for responding to and managing security incidents.
Compliance Manager
The Compliance Manager is responsible for ensuring that an organization complies with relevant laws and regulations.
Penetration Tester
The Penetration Tester is responsible for conducting penetration tests to identify vulnerabilities in an organization's IT systems.
Security Architect
The Security Architect is responsible for designing and implementing security architectures for organizations.
Cybersecurity Consultant
The Cybersecurity Consultant provides advice and guidance to organizations on how to improve their cybersecurity posture.
Chief Information Security Officer
The Chief Information Security Officer (CISO) is the head of an organization's IT security program.
Business Continuity Planner
The Business Continuity Planner is responsible for developing and implementing business continuity plans to ensure that an organization can continue to operate in the event of a disruption.
Cybersecurity Researcher
The Cybersecurity Researcher conducts research to develop new cybersecurity technologies and techniques.
Operations Security Analyst
The Operations Security Analyst is responsible for monitoring and responding to security events in an organization's IT systems.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Asset Security for CISSP®.
Provides a comprehensive overview of cryptography and network security, and it valuable resource for anyone who is interested in learning more about this topic.
Provides a comprehensive overview of network security essentials, and it valuable resource for anyone who is interested in learning more about this topic.
Provides a comprehensive overview of firewalls and intrusion detection systems, and it valuable resource for anyone who is interested in learning more about this topic.
Provides a comprehensive overview of security testing, penetration testing, and risk management, and it valuable resource for anyone who is interested in learning more about this topic.
Provides a comprehensive overview of data and computer communications, and it valuable resource for anyone who is interested in learning more about this topic.
Provides a comprehensive overview of cybersecurity, and it valuable resource for anyone who is interested in learning more about this topic.
Provides a good overview of computer security basics, and it good resource for anyone who is interested in learning more about this topic.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Asset Security for CISSP®.
Exam Review Tips and Tricks for CISSP®
Most relevant
Security and Risk Management: Principles of Risk for...
Most relevant
Security Architecture and Engineering: Cryptography for...
Most relevant
Communication and Network Security for CISSP®
Most relevant
Identity and Access Management (IAM) for CISSP®
Most relevant
Certified Information Systems Security Professional...
Most relevant
Identity and Access Management (IAM) for CISSP®
Most relevant
Security Operations: Operations Management for CISSP®
Most relevant
Security Architecture and Engineering: Security Controls...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser