From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Trusted systems and networks
From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Trusted systems and networks
- [Instructor] Welcome back to Cybrary's ISSEP course, I'm your instructor, Brad Rhodes. We are going to now talk about trusted systems and networks in domain one of ISSEP. So, this lesson's going to briefly cover the TSN Trusted Systems Network analysis methodology, and then we're going to talk about why the heck do we do TSN, what does that mean as an ISSEP, and what should you know? So the TSN analysis methodology is really focused on looking at commercial off-the-shelf technologies, and how they are integrated into government systems. And so we do three things here. We do a criticality analysis, right, which is, if I am going to rely solely on something that I procured, a commercial off-the-shelf or from industry, I need to understand what is the consequence that that thing fails, or the company goes out of business, or something like that. Then we also look at threat assessments and vulnerability assessment. We're going to talk a lot more coming up about risk management, but this…
Contents
-
-
-
Objectives and introduction to systems security engineering4m 15s
-
(Locked)
Fundamentals7m 52s
-
(Locked)
Processes6m 56s
-
(Locked)
Development methodologies5m 45s
-
(Locked)
Technical management6m 29s
-
(Locked)
Acquisition process7m 18s
-
(Locked)
Trusted systems and networks4m 58s
-
(Locked)
Module summary2m 15s
-
-
-
-
-
-
-
-
-