Integrate Security Risk Consideration into Acquisitions Strategy and Practice
This lesson concludes the final module of Domain 1 of the CISSP, covering security and risk management. It covers topics that include the identification of threats, diagramming potential attacks, performing reduction analysis, and also examines technologies and processes to remediate the threats.
Learning Objectives
The objectives of this lesson are to provide you with and understanding of:
- Threat modeling and how to apply these modes within your environment
- How to integrate security risk considerations into acquisitions strategy and practice
- How to establish and manage security education, training, and awareness within your organization
Intended Audience
This lesson is designed for those looking to take the most in-demand information security professional certification currently available, the CISSP.
Prerequisites
Any experience relating to information security would be advantageous, but not essential. All topics discussed are thoroughly explained and presented in a way allowing the information to be absorbed by everyone, regardless of experience within the security field.
Feedback
If you have thoughts or suggestions for this lesson, please contact Cloud Academy at support@cloudacademy.com.