From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Module summary
From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Module summary
- [Brad] Welcome back to Cybrary's ISSEP course. I'm your instructor, Brad Rhodes. Well, we have made it to the end of module seven, the ISSE process, and hopefully you see, or saw, how the ISSEP domains support across the ISSE process and that's what we were going for in this module. So, in this lesson, we're going to review the ISSE process real quick, and then we're going to revisit those three key principles, and I think you'll probably remember what they are. So, in our discussion here in module seven, we looked at information protection needs. And that's focused on what does the customer really want? What is their information protection needs? And again, these are the areas that are under the systems engineering process. Think of those as the subset focused on security engineering. Then we define security requirements. And again, those are narrowly focused, more on things like security controls, functions, services, capabilities that are needed. We then define the architecture…
Contents
-
-
-
-
-
-
-
-
Objectives and generic systems engineering (SE)5m
-
(Locked)
Comparing SE and ISSE activities5m 42s
-
(Locked)
Discover information protection needs (discover needs)4m 6s
-
(Locked)
Define system security requirements (define system requirements)7m 18s
-
(Locked)
Define system security architecture (define system architecture)5m 25s
-
(Locked)
Develop detailed security design (develop detailed design)5m
-
(Locked)
Implement system security (implement system)5m 35s
-
(Locked)
Assess information protection effectiveness (assess effectiveness)6m 38s
-
(Locked)
Module summary5m 5s
-
-
-
-