Course Name: Emerging Threats & Countermeasures
Provide a 600 word (double spaced) minimum reflection.
Demonstrate a connection to your current work environment.
You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
****This is a Practical Connection Assignment
TextBook: Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (In Classroom)
ISBN: 9781119475958
So far the Topics covered in this course:
Week 1
Chapter 1: Security Governance Through Principles and Policies
- Petac Eugen, & Duma Petrut. (2018). Exploring the New Era of Cybersecurity Governance. Ovidius University Annals: Economic Sciences Series, 1, 358
Week 2
Chapter 2: Personnel Security and Risk Management Concepts
Week 3
Chapter 3: Business Continuity PlanningWeek 5
Chapter 6: Cryptography and Symmetric Key Algorithms
Chapter 7: PKI & Cryptographic Applications
Week 6
Chapter 8: Principles of Security Models, Design, & Capabilities
Week 7
Chapter 9: Security Vulnerabilities, Threats, & Countermeasures
Week 8
Chapter 5: Protecting Security of Assets
Chapter 10: Physical Security Requirements
Week 9
Chapter 11: Secure Network Architecture & Secure Network Components
Chapter 12: Secure Communications and Network Attacks


0 comments