• Online, Self-Paced
Course Description

Appropriate IT asset management is a critical element of an overall IT security administration approach. This course covers hardware, software, and data asset management best practices. It also includes best practices for implementing compliance, participating in change management activities, and conducting security awareness and training in the enterprise. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.

Learning Objectives

Participating in Asset Management

  • start the course
  • identify best practices for life cycle asset management
  • identify best practices for hardware asset management
  • identify best practices for software asset management
  • identify best practices for data asset management

Implementing Compliance with Controls

  • describe how to use technical controls to implement and assess compliance
  • describe how to use operational controls to implement and assess compliance
  • describe how to use managerial controls to implement and assess compliance

Participating in Change Management

  • identify activities in implementing a configuration management plan
  • identify activities in performing a security impact assessment
  • identify system architecture and interoperability of systems activities in change management processes
  • describe activities for implementing and testing patches, fixes, and updates

Participating in Security Ops Activities

  • identify security awareness and training activities
  • identify physical security operations activities

Practice: Security Operations

  • identify appropriate activities for participating in change management, security operations, and security administration processes

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.