Module Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
5 hours 58 minutes
Difficulty
Intermediate
CEU/CPE
6
Video Transcription
00:00
>> Welcome back to Cybrary's ISA course.
00:00
I'm your instructor, Brad Rhodes.
00:00
Well, we've made it to the end of Module 2,
00:00
Domain 1 of ISA, that's our fundamentals.
00:00
In this video, we're going to review the module.
00:00
We're going to look at fundamentals, processes,
00:00
development methodologies,
00:00
and we're going to talk technical management,
00:00
acquisition processes, and TSN,
00:00
and highlight things that you need to
00:00
remember as you're preparing for the ISA concentration.
00:00
In fundamentals, I want you to remember one thing.
00:00
Simplest solution is best.
00:00
If you run across something in
00:00
the ISA materials that talks about,
00:00
oh, is it a complex system versus a simple solution?
00:00
Simple is always the right answer. Go simple.
00:00
In processes, we talked a lot
00:00
about different things in processes,
00:00
but I want you to remember software assurance.
00:00
Software assurance is incredibly important to ISA,
00:00
because if we ingest or use software that
00:00
has vulnerabilities that we didn't bother
00:00
to check, that could break our system.
00:00
Software runs the world today, folks,
00:00
and you need to be aware of those pieces and parts.
00:00
Development methodologies.
00:00
You're going to be adaptable
00:00
with the security tasks you need to do,
00:00
whether you're doing waterfall,
00:00
whether you're doing V,
00:00
whether you're doing spiral or agile.
00:00
Those are all things we adapt to that.
00:00
Organizations sometimes use one or the other or a mix,
00:00
and so just be prepared for that as an ISA.
00:00
In technical management, we talked about
00:00
the scope, cost, time triangle.
00:00
You've got to memorize that chart.
00:00
You need to know that.
00:00
If something's going to be a much larger scope,
00:00
it's going to cost more and take more time.
00:00
Remember that. Do exercises related to that.
00:00
In acquisition processes, we realize
00:00
that supply chain risk is a huge problem for ISAs.
00:00
If we can't get the widgets or the services we need,
00:00
because of something that broke the supply chain, say,
00:00
global unrest or a natural disaster,
00:00
or whatever the case may be,
00:00
then our products are at risk.
00:00
Then with TSN, trusted system networks,
00:00
we talked about, what happens when we
00:00
go out and procure something commercial off the shelf?
00:00
Whether we're government or a vendor,
00:00
we need to understand the tacit limitations that
00:00
come with that and how to protect those kinds of systems.
00:00
In this lesson, we reviewed Module 2,
00:00
Domain 1, the fundamentals for ISA.
00:00
We'll see you in Module 3.
Up Next