- 10 Sections
- 65 Lessons
- 40 Hours
Expand all sectionsCollapse all sections
- PERSIAPAN2
- 1. SECURITY AND RISK MANAGEMENT (SECURITY, RISK, COMPLIANCE, LAW, REGULATIONS, AND BUSINESS CONTINUITY)12
- 2.11.1. Understand and apply concepts of confidentiality, integrity and availability
- 2.21.2. Evaluate and apply security governance principles
- 2.31.3. Determine compliance requirements
- 2.41.4. Understand legal and regulatory issues that pertain to information security in a global context
- 2.51.5. Understand, adhere to, and promote professional ethics
- 2.61.6. Develop, document, and implement security policy, standards, procedures, and guidelines
- 2.71.7. Identify, analyze, and prioritize Business Continuity (BC) requirements
- 2.81.8. Contribute to and enforce personnel security policies and procedures
- 2.91.9. Understand and apply risk management concepts
- 2.101.10. Understand and apply threat modeling concepts and methodologies
- 2.111.11. Apply risk-based management concepts to the supply chain
- 2.121.12. Establish and maintain a security awareness, education, and training program
- 2. ASSET SECURITY (PROTECTING SECURITY OF ASSETS)6
- 3. SECURITY ARCHITECTURE AND ENGINEERING (ENGINEERING AND MANAGEMENT OF SECURITY)11
- 4.13.1. Implement and manage engineering processes using secure design principles
- 4.23.2. Understand the fundamental concepts of security models
- 4.33.3. Select controls based upon systems security requirements
- 4.43.4. Understand security capabilities of information systems (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)
- 4.53.5. Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
- 4.63.6. Assess and mitigate vulnerabilities in web-based systems
- 4.73.7. Assess and mitigate vulnerabilities in mobile systems
- 4.83.8. Assess and mitigate vulnerabilities in embedded devices
- 4.93.9. Apply cryptography
- 4.103.10. Apply security principles to site and facility design
- 4.113.11. Implement site and facility security controls
- 4. COMMUNICATION AND NETWORK SECURITY (DESIGNING AND PROTECTING NETWORK SECURITY)3
- 5. IDENTITY AND ACCESS MANAGEMENT (CONTROLLING ACCESS AND MANAGING IDENTITY)5
- 6. SECURITY ASSESSMENT AND TESTING (DESIGNING, PERFORMING, AND ANALYZING SECURITY TESTING)5
- 7. SECURITY OPERATIONS (FOUNDATIONAL CONCEPTS, INVESTIGATIONS, INCIDENT MANAGEMENT, AND DISASTER RECOVERY)16
- 8.17.1. Understand and support investigations
- 8.27.2. Understand requirements for investigation types
- 8.37.3. Conduct logging and monitoring activities
- 8.47.4. Securely provisioning resources
- 8.57.5. Understand and apply foundational security operations concepts
- 8.67.6. Apply resource protection techniques
- 8.77.7. Conduct incident management
- 8.87.8. Operate and maintain detective and preventative measures
- 8.97.9. Implement and support patch and vulnerability management
- 8.107.10. Understand and participate in change management processes
- 8.117.11. Implement recovery strategies
- 8.127.12. Implement Disaster Recovery (DR) processes
- 8.137.13. Test Disaster Recovery Plans (DRP)
- 8.147.14. Participate in Business Continuity (BC) planning and exercises
- 8.157.15. Implement and manage physical security
- 8.167.16. Address personnel safety and security concerns
- 8. SOFTWARE DEVELOPMENT SECURITY (UNDERSTANDING, APPLYING, AND ENFORCING SOFTWARE SECURITY)5
- 9.18.1. Understand and integrate security in the Software Development Life Cycle (SDLC)
- 9.28.2. Identify and apply security controls in development environments
- 9.38.3. Assess the effectiveness of software security
- 9.48.4. Assess security impact of acquired software
- 9.58.5. Define and apply secure coding guidelines and standards
- PENUTUPAN2
Bundle Materi
Next