We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Security and Risk Management

Concepts and Principles for CISSP®

Kevin Henry

This course will teach you the foundational concepts of security and risk management that are essential elements of an information security program..

Read more

This course will teach you the foundational concepts of security and risk management that are essential elements of an information security program..

Information security programs are based on a foundation of risk management. It is essential to be familiar with the concepts of risk management. In this course, Security and Risk Management: Concepts and Principles for CISSP®, you’ll learn to build a core understanding of risk and security. First, you’ll explore information security governance and regulations. Next, you’ll discover information security principles. Finally, you’ll learn how to perform risk management and threat modelling. When you’re finished with this course, you’ll have the skills and knowledge of information security needed for the CISSP® examination.

Enroll now

What's inside

Syllabus

Course Overview
Foundational Information Security Concepts
Foundational Information Security Concepts Continued
Security Governance Principles
Read more
Information Security Legal and Regulatory Issues
Legal and Investigation Types
Risk and Threat Modeling
Risk Management
Risk Treatment/Response
Supply Chain Risk Management

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Provides a solid foundation in security and risk management concepts for the CISSP® exam
Led by an experienced instructor, Kevin Henry, recognized for their expertise in information security
Covers the foundational concepts of information security, risk management, and threat modeling
Provides a comprehensive overview of information security governance and regulations
Emphasizes the importance of legal considerations in information security

Save this course

Save Security and Risk Management: Concepts and Principles for CISSP® to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Security and Risk Management: Concepts and Principles for CISSP®. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Security and Risk Management: Concepts and Principles for CISSP® will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts design, implement, and maintain security measures to protect an organization's computer networks and systems. They implement Security Governance Principles and tailor them to meet their organization's needs. They also use their knowledge of Investigation Types, Risk Assessment, and Threat Modeling to keep their organization's information secure. This course, Security and Risk Management: Concepts and Principles for CISSP®, would be highly valuable for someone in this role as it provides a strong foundation in all of these areas.
Information Security Manager
Information Security Managers are responsible for the overall security of an organization's information systems. They develop and implement security policies and procedures, and oversee the implementation of security measures. They also work with other departments to ensure that security is integrated into all aspects of the organization's operations. Someone in this role would find this course, Security and Risk Management: Concepts and Principles for CISSP®, to be very helpful. It can help them develop the skills and knowledge they need to be successful in their role, such as how to conduct Risk Management and Threat Modelling.
IT Auditor
IT Auditors evaluate the security of an organization's information systems and make recommendations for improvements. They also conduct risk assessments and compliance audits. Being able to demonstrate knowledge of auditing and risk management is important for an IT Auditor, which makes this course, Security and Risk Management: Concepts and Principles for CISSP®, a good choice.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They also help organizations to develop and implement security plans and procedures. Security Consultants may also provide expert testimony in court cases involving computer security.
Network Security Engineer
Network Security Engineers design, implement, and maintain the security of an organization's computer networks. They also monitor network traffic for suspicious activity and respond to security incidents. This course may be useful for Network Security Engineers as it provides a good overview of security concepts and principles.
Security Architect
Security Architects design and implement the security architecture for an organization's information systems. They also work with other departments to ensure that security is integrated into all aspects of the organization's operations. This course, Security and Risk Management: Concepts and Principles for CISSP®, may be helpful for Security Architects as it provides a good overview of security concepts and principles.
Chief Information Security Officer (CISO)
The Chief Information Security Officer (CISO) is responsible for the overall security of an organization's information systems. They develop and implement security policies and procedures, and oversee the implementation of security measures. They also work with other departments to ensure that security is integrated into all aspects of the organization's operations. A CISO would greatly benefit from this course, Security and Risk Management: Concepts and Principles for CISSP®, as it provides a strong foundation in all of the areas they are responsible for.
Security Analyst
Security Analysts monitor and analyze security data to identify and respond to security threats. They also conduct vulnerability assessments and penetration tests. This course, Security and Risk Management: Concepts and Principles for CISSP®, may be beneficial for Security Analysts as it can provide them a good overview of security concepts and principles.
Compliance Analyst
Compliance Analysts ensure that an organization's information systems are in compliance with applicable laws and regulations. They also conduct risk assessments and compliance audits. This course, Security and Risk Management: Concepts and Principles for CISSP®, may be helpful for a Compliance Analyst as it gives a deep dive into Legal and Investigation Types and Risk Management. This course will give you a strong foundation in the skills and knowledge you need to be successful in this role.
Incident Responder
Incident Responders are responsible for responding to security incidents. They also develop and implement incident response plans. This course, Security and Risk Management: Concepts and Principles for CISSP®, may be helpful for Incident Responders as it provides a good overview of security concepts and principles.
Penetration Tester
Penetration Testers identify and exploit vulnerabilities in an organization's computer systems. They also provide recommendations for how to fix the vulnerabilities. This course, Security and Risk Management: Concepts and Principles for CISSP®, may be helpful for Penetration Testers as it provides a good overview of security concepts and principles.
Cybersecurity Engineer
Cybersecurity Engineers design and implement security measures to protect an organization's computer networks and systems. They also monitor network traffic for suspicious activity and respond to security incidents. This course, Security and Risk Management: Concepts and Principles for CISSP®, may be helpful for Cybersecurity Engineers as it provides a good overview of security concepts and principles.
Privacy Analyst
Privacy Analysts develop and implement privacy policies and procedures. They also conduct privacy impact assessments. A Privacy Analyst may find this course, Security and Risk Management: Concepts and Principles for CISSP®, to be beneficial to them as it gives a strong foundation in Information Security Legal and Regulatory Issues.
Risk Manager
Risk Managers identify and assess risks to an organization's information systems. They also develop and implement risk management plans. This course, Security and Risk Management: Concepts and Principles for CISSP®, will teach the foundational elements of risk management that are essential for a Risk Manager. It will also provide you with the skills and knowledge you need to be successful in your role.
Compliance Manager
Compliance Managers ensure that an organization's information systems are in compliance with applicable laws and regulations. They also conduct risk assessments and compliance audits. This course, Security and Risk Management: Concepts and Principles for CISSP®, is a good choice for Compliance Managers because it provides a strong foundation in the skills and knowledge they need to be successful in their role, such as how to conduct Risk Management and how to understand Legal and Investigation Types.

Reading list

We've selected 14 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security and Risk Management: Concepts and Principles for CISSP®.
Is considered the canonical text for the CISSP certification. Essential for learners who plan on taking the CISSP exam, it provides a comprehensive overview of security and risk management principles.
Is an essential reference for anyone involved in information security. It provides a comprehensive framework for understanding and managing cybersecurity risks.
Comprehensive reference on cryptography. It covers a wide range of topics, from the basics of cryptography to the latest advances in the field. It valuable resource for learners who want to understand the mathematical foundations of security and risk management.
Practical guide to threat modeling. It provides a step-by-step process for identifying and mitigating threats to information systems. It valuable resource for learners who want to learn how to build more secure systems.
Classic in the field of information security. It provides a broad overview of hacking techniques and how to defend against them. It valuable resource for learners who want to understand the threats to information security and how to protect against them.
Fascinating look at the human side of security. It provides insights into how attackers think and operate, and how to protect against social engineering attacks. It valuable resource for learners who want to understand the importance of human factors in information security.
Provides a comprehensive overview of security risk management in an easy-to-understand format.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security and Risk Management: Concepts and Principles for CISSP®.
Security and Risk Management: Principles of Risk for...
Most relevant
Identity and Access Management (IAM) for CISSP®
Most relevant
Security Architecture and Engineering: Security Controls...
Most relevant
Communication and Network Security for CISSP®
Most relevant
Asset Security for CISSP®
Most relevant
Security Architecture and Engineering: Cryptography for...
Most relevant
Information Technology and Security ISACA® CRISC™
Most relevant
Security Operations: Operations Management for CISSP®
Most relevant
Exam Review Tips and Tricks for CISSP®
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser