Module Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
5 hours 58 minutes
Difficulty
Intermediate
CEU/CPE
6
Video Transcription
00:00
Welcome back to cyber is, Of course, I'm your instructor, Brad Roads. Well, we've made it to the end of module to
00:07
domain one ofhis ip. That's our fundamentals
00:11
in this video. We're going to review them. We're gonna review the march. We're gonna look at fundamentals, processes, development methodologies. We're gonna talk technical management, acquisition processes and TSN and highlight things that you need to remember as you're preparing for the use of concentration.
00:26
So in fundamentals, I want you to remember one thing. Simplest solution is best if you run across something in the East of materials that talks about Oh, is it a complex system versus a simple solution. Simple is always the right answer. So go simple
00:40
in processes. We talked a lot about different things and processes, but I want you to remember software assurance
00:45
Software assurance is incredibly important to us. Is because if we ingest or you software that has vulnerabilities that we didn't bother check, that could break our system. Software runs the world today, folks, and you need to be aware of those pieces in part
00:59
development methodologies. You're gonna be adaptable with your security, the security task you need to do whether you're doing waterfall, whether you're doing V, whether you're doing spiral or agile, those are all things we adapt to that organizations sometimes use one or the other or a mix, and so just be prepared for that as an ISI
01:19
in technical management, we talked about the scope, cost time triangle. You've got to memorize that chart. You need to know that if something's gonna be, ah, much larger scope, it's gonna cost more and take more time. Remember that. Do exercises related to that in acquisition processes? We
01:34
realize that supply chain risk is a huge problem for issues. If we can't get the widgets or the services we need
01:40
because of something that broke the supply chain, say, ah, global unrest or a natural disaster or whatever the case may be than our products are at risk.
01:49
And then with TSN trusted system networks, we talked about what happens when we go out and procure something commercial off the shelf. Whether we're government or a vendor, we need to understand the tacit limitations that come with that and how to protect those kinds of systems.
02:04
So in this lesson, we reviewed module to domain one. The fundamentals for Issa.
02:12
We'll see you in Module three
Up Next
Information Systems Security Engineering Professional (ISSEP)

This ISSEP course provides students with the foundational knowledge of the concentration area of the CISSP certification that includes a focus on the processes used to develop secure systems. Students will learn key concepts and skills of the five ISSEP domains.

Instructed By