5 hours 58 minutes
Welcome back to cyber is it's of course I'm your instructor, Brad Roads.
Let's get started with module one
of tens. We get 10 modules, which we're gonna talk about here, and we're going to jump into the overview. This is the overview of the course.
Eso Welcome to the course overview
in this video, we're going to look at our module objectives. We're gonna look at the course objectives. Now we're gonna look at the course, outline in a little more detail, see and know what you're getting into.
here is the module objectives. And so on this first model this is sort of your first taste. Your first introduction into this thing we call is up. Eso We're gonna look at the C S S P concentrations themselves. So you know what they are. The CSB concentrations are a unique set of three concentrations. You can get to
show and demonstrate subject matter expertise which I'll talk about in a second.
We're going to review the are the C s SP domains, the certified information systems, security, professional domains. Why? Because
if you are going thio, pursue the sip concentration a za professional search as an add on to your CSS P. Then you need to understand that those domains are very important. That's the basis of a lot of things with this IP and Oh, by the way, if you took your C s SP 10 years ago, the domains have changed.
So you're gonna want to go back and review. That's probably even get a new CSS people.
Then we'll talk about the sub domains specifically to give you an introduction there because we've got five of those we have to go through, and that is the bulk of this course
on. Then we're gonna talk specifically about information systems, security engineer or ISI role. So what jobs might you look at or get if you hold the Aesop's concentration?
So our course objectives for the CyberRays? This, of course, are pretty straight forward. We are going to work together to discover the sub domains. We're going to look at the skill sets that in ISI needs, and this is really important. I want you to be able to walk out of here after after spending ah chunk of your time going through this course a prepared for the exam,
and knowing what study for the exam, but be having developed some some of those ISI skills on knowing where to find the information that you need to perform as an ISI,
we're gonna talk specifically about the ISI process, and so that was defined by missed several years ago. And it is a great sort of flow when you think about how an ISI does their job and where an ISI gates in. And what are the things that is? He does,
obviously, throughout the course, we will be highlighting. And specifically, we have a module on the NIST documentation, which is a bulk of the SC. Resource is, although there's more we're gonna touch on one the I A a f which, if you've not heard of the ion, if we're gonna talk about that a little bit later, that is a great book. It's old,
but it is a great book. Foreign s C two
thio, learn and understand.
And then, of course, obviously we want to prep for the sip exam. If you're here and you want to achieve that concentration, it is a tough one. I hold that concentration and it was it was it was a great learning experience to get to that point where I felt comfortable walking in the door for that exam. And I hope that after this course, you will feel the same level of comfort.
So here's our course outline. So we're hearing module one, and you're going to see this diagram come back several times, obviously. Well, 10 times throughout the course. Um, so the first five modules are focused on the ISS IP domains, and that's foundations, risk management, planning and design, implementation and operations.
And we're gonna talk specifically in each of those modules about the different pieces in parts
on really those focus areas of things you need to know in those modules.
Um, then module seven is Theis E Process. So that's the information systems security engineer process. And that is really references. A lot of what we do out of NIST, and it talks through the entire flow on the products and documents and everything you should know as an ISI.
We're gonna talk about the software development life cycle, which or excuse me, the system development life cycle, not the software development life cycle.
This is an important distinction
when we are doing systems engineering, right we tend to be more deliberate.
We tend to really focus on the requirements. Uh, the standards, the constraints, the cost, schedule, performance what you're gonna hear a lot about. We tend to focus on that in SCLC because if we're going toe engineer a complex system, we have to get it right.
Um, software is different. And, yes, software runs the world. And yes, can you apply? You see process to
software development 100% correct. Yes, you can. But this is really focused on the systems engineering aspect of which software is only a small part.
We'll talk specifically about the Keenest standards. So that's the National Instant Institute of Standards and Technologies. Um, one of the great things that I see two, which is the organization that created CE SSP and the different concentrations. Um, is they
They looked at the standards that were out there and they didn't reinvent the wheel. And I appreciate that. I'm not I'm not a fan of reinvent the reinventing the wheel if you don't have to,
um and then finally, we're gonna talk about the concentration insights, and that's really going to be more focused on helping you to prepare for the exam and what areas you really need to focus on and study. And of course, at the end of this, you get your certificate of completion.
So what we cover in this video? We looked at the module objectives. We looked at the course objectives and we covered the course outline in a little more detail.
Hope to see you next time.
Certified Information Systems Security Professional (CISSP) 2021
CISSP is the basis of advanced information assurance knowledge for information security professionals. Often referred ...
16 CEU/CPE Hours Available
Certificate of Completion Offered
ISC2 CISSP Practice Test: Certified Information Systems Security Professional
There is a growing need for information security leaders who possess the depth of expertise ...