Description
In this module, you learn about limiting access, sharing sensitive information, protecting data, and securing systems. You will gain an understanding of the need-to-know principle, giving minimal access to users, separating different responsibilities, having multiple people control important tasks, and safeguarding information through methods like secret sharing and split knowledge. You will also review approaches like defense in depth, validating inputs, hiding data, and using encryption to keep information safe. Finally, you will cover concepts like layering and simplifying mechanisms for better security.
Vulnerability and Patch Management Planning
System Security Components
Vulnerability and Patch Management Security
System Engineering Life Cycle
System Vulnerabilities and Mitigations
Vulnerability and Patch Management Issues
Confidentiality, Integrity and Availability
Legal and Ethical Requirements
Introduction to Risk
Access Control
Risk Management Framework Organizational Prepare Step
Risk Management Framework Categorize Step




