Module Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

5 hours 58 minutes
Video Transcription
Welcome back to cyber is, Of course, I'm your instructor, Brad Roads. Well, we've made it to the end of module to
domain one ofhis ip. That's our fundamentals
in this video. We're going to review them. We're gonna review the march. We're gonna look at fundamentals, processes, development methodologies. We're gonna talk technical management, acquisition processes and TSN and highlight things that you need to remember as you're preparing for the use of concentration.
So in fundamentals, I want you to remember one thing. Simplest solution is best if you run across something in the East of materials that talks about Oh, is it a complex system versus a simple solution. Simple is always the right answer. So go simple
in processes. We talked a lot about different things and processes, but I want you to remember software assurance
Software assurance is incredibly important to us. Is because if we ingest or you software that has vulnerabilities that we didn't bother check, that could break our system. Software runs the world today, folks, and you need to be aware of those pieces in part
development methodologies. You're gonna be adaptable with your security, the security task you need to do whether you're doing waterfall, whether you're doing V, whether you're doing spiral or agile, those are all things we adapt to that organizations sometimes use one or the other or a mix, and so just be prepared for that as an ISI
in technical management, we talked about the scope, cost time triangle. You've got to memorize that chart. You need to know that if something's gonna be, ah, much larger scope, it's gonna cost more and take more time. Remember that. Do exercises related to that in acquisition processes? We
realize that supply chain risk is a huge problem for issues. If we can't get the widgets or the services we need
because of something that broke the supply chain, say, ah, global unrest or a natural disaster or whatever the case may be than our products are at risk.
And then with TSN trusted system networks, we talked about what happens when we go out and procure something commercial off the shelf. Whether we're government or a vendor, we need to understand the tacit limitations that come with that and how to protect those kinds of systems.
So in this lesson, we reviewed module to domain one. The fundamentals for Issa.
We'll see you in Module three
Up Next