From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Acquisition process
From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Acquisition process
- [Brad] Welcome back to Cybrary's ISSE course. I'm your instructor, Brad Rhodes. Let's talk about the acquisition process. So in this lesson, we're going to look at security requirements, contracts, supply chain risk, and source selection as related to acquisition. Why do we do acquisition? Well, sometimes it's cheaper and faster to actually buy something than it is to build it ourselves. So when we talk about procuring something as an ISSE, we need to understand those security requirements. We're going to start with boundaries. Is this system going to be connected to the internet, IE, external? If it is, that drives our requirements then. If it's an internal matter, then obviously that's different. We need to look at resources, hardware, software, connectivity, hardware's pretty straightforward. If we're building, say a private cloud, then we need to have the hardware that goes with it. If we're going to serve a software solution that is unique and developed or built by our company…
Contents
-
-
-
Objectives and introduction to systems security engineering4m 15s
-
(Locked)
Fundamentals7m 52s
-
(Locked)
Processes6m 56s
-
(Locked)
Development methodologies5m 45s
-
(Locked)
Technical management6m 29s
-
(Locked)
Acquisition process7m 18s
-
(Locked)
Trusted systems and networks4m 58s
-
(Locked)
Module summary2m 15s
-
-
-
-
-
-
-
-
-