Implementing a Security Assessment and Authorization Process
Course info



Course info



Description
New systems and changes to existing systems are part of any organization. Today, there is heavy emphasis on the security of all major changes to an organization's technology. The National Institute of Cybersecurity Education has a specific requirement for users to learn and understand a formal Security Assessment and Authorization process. In this course, Implementing a Security Assessment and Authorization Process, you'll first learn how to approach formally assessing the security controls of a new system. Next you'll explore the approach taken to formally authorize the system prior to allowing it to become part of your organization's technology. You'll finish the course by learning how to select the correct security testing procedures from a whole library provided by NIST (National Institute for Standards in Technology). Upon completion of this course, you'll be well versed in the knowledge needed to implement and operate a security assessment and authorization process for your organization.
Section Introduction Transcripts
Course Overview
Hi everyone. My name is Richard Harpur. Welcome to my course, Implementing a Security Assessment and Authorization Process. I am a certified information security manager and my day job is all about managing IT risks. To date, concern about information security is mainstream. That's why I authored this course. Maybe you're an IT, risk, or compliance manager, or maybe you're working in the US federal organization. Whatever your background, this course will teach you the best approach to assessment and authorization. One thing is certain, the volume of security assessment and authorization is rapidly increasing. No one wants to be responsible for introducing unacceptable risk into their organization. You'll learn difference between assessment and authorization. You'll learn several different assessment methods, 18 different security assessment families. You'll learn how to present your findings. And finally, you'll learn how good authorization process should work. By the end of this course, you will have learned all about a security assessment and authorization process and you will be confident in implementing these processes in your own organization. I hope you'll join me on this journey to learn Implementing a Security and Assessment Process at Pluralsight.