From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Module summary

Module summary

- [Brad] Welcome back to Cybrary's ISSEP course. I'm your instructor, Brad Rhodes. Well, we have made it to the end of module seven, the ISSE process, and hopefully you see, or saw, how the ISSEP domains support across the ISSE process and that's what we were going for in this module. So, in this lesson, we're going to review the ISSE process real quick, and then we're going to revisit those three key principles, and I think you'll probably remember what they are. So, in our discussion here in module seven, we looked at information protection needs. And that's focused on what does the customer really want? What is their information protection needs? And again, these are the areas that are under the systems engineering process. Think of those as the subset focused on security engineering. Then we define security requirements. And again, those are narrowly focused, more on things like security controls, functions, services, capabilities that are needed. We then define the architecture…

Contents