What Does MVP Stand For? It’s Not What You Think.
October 7, 2024
Article
Recommended experience
Advanced level
Ideal for IT pros, analysts, and engineers pursuing CISSP certification with basic cybersecurity knowledge and experience.
Recommended experience
Advanced level
Ideal for IT pros, analysts, and engineers pursuing CISSP certification with basic cybersecurity knowledge and experience.
Define key security concepts, including risk management and cryptography.
Implement security controls across networks, systems, and software development processes.
Evaluate threats and vulnerabilities to design secure architectures and systems.
Develop comprehensive security solutions that align with organizational goals and industry standards.
Add to your LinkedIn profile
October 2024
4 assignments
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
This comprehensive course covers the full breadth of the CISSP certification, spanning all eight domains. You will begin with Security and Risk Management, exploring essential concepts such as governance, legal regulations, and business continuity. Through detailed lessons on compliance and investigation requirements, you’ll build a solid foundation in risk management and threat modeling. Each video is crafted to clarify intricate ideas, preparing you for real-world security challenges.
Moving forward, the course delves into Asset Security and Architecture & Engineering. You will learn about data classification, secure provisioning, and security models, alongside cryptographic solutions and the design of secure systems. The focus on practical applications, such as network security and secure communication, equips you to handle complex security architectures and operational scenarios with confidence. The latter part of the course emphasizes Identity and Access Management, Security Assessment, and Security Operations. You will master identity lifecycles, authentication systems, and access controls, followed by in-depth analysis of security testing, operations, and software development security. By the end of this course, you will possess the expertise to implement, manage, and assess security systems in any enterprise environment, making you an ideal candidate for CISSP certification. This course is ideal for IT security professionals, network engineers, and anyone preparing for the CISSP exam. A basic understanding of security concepts is recommended to fully benefit from this course.
In this module, we will explore the critical aspects of security and risk management, beginning with foundational concepts and progressing through governance, compliance, and legal frameworks. You will also learn key topics such as risk management, business continuity, personnel security, and threat modeling, culminating in strategies for managing supply chain risks and delivering effective security training.
11 videos
In this module, we will focus on the management and security of information assets, covering topics such as data classification, asset handling, and secure provisioning. You'll gain an understanding of the roles involved in managing data, how to handle asset retention at different stages of its lifecycle, and how to apply security controls and compliance requirements to protect organizational resources.
6 videos
In this module, we will delve into the architectural and engineering processes crucial to building secure systems. Topics will cover security models, cryptographic solutions, and security controls development. You’ll also learn about the security of different system types, including databases and microservices, while understanding cryptanalytic attacks and the integration of security principles into facility design.
10 videos1 assignment
In this module, we will explore the foundational elements of communication and network security. You will learn how to design secure networks by understanding the OSI and TCP/IP models, implement robust network hardware and components, and ensure secure communication protocols to protect data during transmission.
3 videos
In this module, we will cover the principles of identity and access management, focusing on controlling access to both physical and logical assets. You will learn about managed identification, federated identities, and authorization processes, along with key authentication systems like SSO, OpenID, and OAuth, ensuring secure and efficient access control throughout the identity lifecycle.
6 videos
In this module, we will examine the processes involved in security assessment and testing. You will learn how to design and validate assessments and audits, test security controls, and gather critical security data. Additionally, we will focus on analyzing test outputs and creating detailed reports to enhance organizational security measures.
4 videos1 assignment
In this module, we will explore the key elements of security operations, including investigation procedures, logging and monitoring, and configuration management. You’ll also learn about resource protection, the operation of detective and preventative controls, vulnerability management, and response strategies for disasters, along with essential practices for physical security and safety.
9 videos
In this module, we will focus on the integration of security within the software development process, emphasizing the importance of secure methodologies and maturity models in the SDLC. You’ll learn about security controls in each development phase, how to assess software security through audits, and how to implement secure coding guidelines to prevent common software vulnerabilities.
4 videos2 assignments
Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
Packt
Course
Specialization
Course
Build toward a degree
Professional Certificate
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is one of a few offered on Coursera that are currently available only to learners who have paid or received financial aid, when available.
You will be eligible for a full refund until two weeks after your payment date, or (for courses that have just launched) until two weeks after the first session of the course begins, whichever is later. You cannot receive a refund once you’ve earned a Course Certificate, even if you complete the course within the two-week refund period. See our full refund policy.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.