Systems life cycle management Course
2 hours, 3 minutes
Syllabus
                                    Change control and managing its security aspects: Ensuring the organization complies with their change control program
                                    Video - 00:04:00
                                        
                                            
                                        
                                
                                    
                                            
Verifying compliance with the change control program regarding inclusion of security.
                                        
                                    
                                    Change control and managing its security aspects: Managing and tracking change control documentation
                                    Video - 00:05:00
                                        
                                            
                                        
                                
                                    
                                            
Tracking security in the change control system and ensuring traceability.
                                        
                                    
                                    Change control and managing its security aspects: Identifying and working with the change owner
                                    Video - 00:08:00
                                        
                                            
                                        
                                
                                    
                                            
Ensuring the change owner considers security in their requests.
                                        
                                    
                                    Change control and managing its security aspects: Getting security requirements into the change control process
                                    Video - 00:04:00
                                        
                                            
                                        
                                
                                    
                                            
Including security into any change request.
                                        
                                    
                                    Defining and overseeing a comprehensive vulnerability management program: Managing the remediation/treatment of vulnerabilities based on risk
                                    Video - 00:06:00
                                        
                                            
                                        
                                
                                    
                                            
Address the remediation of risk from having treated the vulnerabilities.
                                        
                                    
                                    Defining and overseeing a comprehensive vulnerability management program: Managing security testing as part of the vulnerability management program
                                    Video - 00:16:00
                                        
                                            
                                        
                                
                                    
                                            
Integrate security testing into the vulnerability management program.
                                        
                                    
                                    Defining and overseeing a comprehensive vulnerability management program: Prioritize threats and vulnerabilities
                                    Video - 00:10:00
                                        
                                            
                                        
                                
                                    
                                            
Identify and prioritize threats and vulnerabilities.
                                        
                                    
                                    Defining and overseeing a comprehensive vulnerability management program: Identify, classify and prioritize assets, systems and services based on business criticality
                                    Video - 00:06:00
                                        
                                            
                                        
                                
                                    
                                            
Ensure assets are properly identified and classified regarding criticality and sensitivity.
                                        
                                    
                                    Integrating into the security architecture, new business initiatives and emerging technologies: Addressing how new business initiatives impact the security posture
                                    Video - 00:05:00
                                        
                                            
                                        
                                
                                    
                                            
Review new initiatives for security impact.
                                        
                                    
                                    Integrating into the security architecture, new business initiatives and emerging technologies: Integrating security into any new business initiatives and/or when emerging technology is adopted
                                    Video - 00:09:00
                                        
                                            
                                        
                                
                                    
                                            
Working with the business functional owners, address security in any new initiatives or when the business adopts emerging technology.
                                        
                                    
                                    Managing the integration of security into SDLC: Overseeing the security configuration management process
                                    Video - 00:08:00
                                        
                                            
                                        
                                
                                    
                                            
Confirm the inclusion of the security controls into the SDLC configuration.
                                        
                                    
                                    Managing the integration of security into SDLC: Implementing the security controls into SDLC
                                    Video - 00:10:00
                                        
                                            
                                        
                                
                                    
                                            
Ensure implementation of the appropriate security controls at each phase of SDLC.
                                        
                                    
                                    Managing the integration of security into SDLC: Integrating decision points and requirements into the life cycle
                                    Video - 00:06:00
                                        
                                            
                                        
                                
                                    
                                            
With the coordination of the system owners, integrate go/no go decision points into the life cycle.
                                        
                                    
                                    Introduction to systems life cycle management
                                    Video - 00:04:00
                                        
                                            
                                        
                                
                                    
                                            
This is an introduction to Domain 2 of ISSMP.
                                        
                                    
                                    ISSMP Domain 2 Practice Exam
                                    Assessment - 44 questions
                                
                            
Unlock 7 days of free training
                            - 1,400+ hands-on courses and labs
 - Certification practice exams
 - Skill assessments
 
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
 - 100s of hands-on labs in cloud-hosted cyber ranges
 - Custom certification practice exams (e.g., CISSP, Security+)
 - Skill assessments
 - Infosec peer community support
 
Infosec Skills Teams
Book a meeting to get a custom quote
- Team administration and reporting
 - Dedicated client success manager
 - 
                                
                                Single sign-on (SSO)
                                    
                                        Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
 - 
                                
                                Integrations via API
                                    
                                        Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
 - 190+ role-guided learning paths and assessments (e.g., Incident Response)
 - 100s of hands-on labs in cloud-hosted cyber ranges
 - Create and assign custom learning paths
 - Custom certification practice exams (e.g., CISSP, CISA)
 - Optional upgrade: Guarantee team certification with live boot camps
 
Award-winning training you can trust