Systems life cycle management Course

2 hours, 3 minutes

Syllabus

Change control and managing its security aspects: Ensuring the organization complies with their change control program

Video - 00:04:00

Verifying compliance with the change control program regarding inclusion of security.
Change control and managing its security aspects: Managing and tracking change control documentation

Video - 00:05:00

Tracking security in the change control system and ensuring traceability.
Change control and managing its security aspects: Identifying and working with the change owner

Video - 00:08:00

Ensuring the change owner considers security in their requests.
Change control and managing its security aspects: Getting security requirements into the change control process

Video - 00:04:00

Including security into any change request.
Defining and overseeing a comprehensive vulnerability management program: Managing the remediation/treatment of vulnerabilities based on risk

Video - 00:06:00

Address the remediation of risk from having treated the vulnerabilities.
Defining and overseeing a comprehensive vulnerability management program: Managing security testing as part of the vulnerability management program

Video - 00:16:00

Integrate security testing into the vulnerability management program.
Defining and overseeing a comprehensive vulnerability management program: Prioritize threats and vulnerabilities

Video - 00:10:00

Identify and prioritize threats and vulnerabilities.
Defining and overseeing a comprehensive vulnerability management program: Identify, classify and prioritize assets, systems and services based on business criticality

Video - 00:06:00

Ensure assets are properly identified and classified regarding criticality and sensitivity.
Integrating into the security architecture, new business initiatives and emerging technologies: Addressing how new business initiatives impact the security posture

Video - 00:05:00

Review new initiatives for security impact.
Integrating into the security architecture, new business initiatives and emerging technologies: Integrating security into any new business initiatives and/or when emerging technology is adopted

Video - 00:09:00

Working with the business functional owners, address security in any new initiatives or when the business adopts emerging technology.
Managing the integration of security into SDLC: Overseeing the security configuration management process

Video - 00:08:00

Confirm the inclusion of the security controls into the SDLC configuration.
Managing the integration of security into SDLC: Implementing the security controls into SDLC

Video - 00:10:00

Ensure implementation of the appropriate security controls at each phase of SDLC.
Managing the integration of security into SDLC: Integrating decision points and requirements into the life cycle

Video - 00:06:00

With the coordination of the system owners, integrate go/no go decision points into the life cycle.
Introduction to systems life cycle management

Video - 00:04:00

This is an introduction to Domain 2 of ISSMP.
ISSMP Domain 2 Practice Exam

Assessment - 44 questions

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust