12 hours 41 minutes

Video Description

This lesson offers an introduction to the unit; which covers asset security and focuses on the following: • Roles within an organization • Classification of data • System baselining and hardening • States of data

Video Transcription

Okay, let's go ahead and get chapter two. And let's talk about assets security. This is actually very small chapter. Quite honestly, The reason for that is when I s C Square took the 10 domains of the previous C I S S P curriculum and convinced them into eight, they totally
realigned. Or they totally changed the mapping of certain topics to certain domains. And
I see square even said, Look, this is mainly a cosmetic change. The material in the content is still the same, but it's aligned and it looks a little bit differently. So there are some things that I just honestly kept in other chapters because I felt like it was more of a logical grouping.
I can assure you the exact same material is covered in this class
that would be covered in in just about any other class. It may just be organized a little bit differently, but I do have a chapter to that. I've put a few pieces of information in,
and rest assured that if there's anything, if you're looking at the I S C Square died, what should be covered in Chapter two? If there's anything that's missing here, I can assure you it is in other modules, but a couple of things that we'll talk about in this chapter the first things we're gonna talk about the different roles within an organization because the hierarchy
off security function within an organization is going to drive how we protect our s our assets.
So we'll look at roles like the chief off the Surge will talk about. The information security officer will talk about data owners versus data custodians. That will be the first thing we talk about.
Then we'll move into talking about classification of data. What we mean when we classify what are the different levels of classification with the purpose and the benefits of classifying data are,
Then we'll move into system based lining and hardening. When you hear the term hardening a system, what we're actually saying is we're securing the system. We're locking it down, so to speak.
And then last but not least, we'll talk about the various states of data and how to secure data across those different states.

Up Next


Our free online CISSP (8 domains) training covers topics ranging from operations security, telecommunications, network and internet security, access control systems and methodology and business continuity planning.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor