Module Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
5 hours 58 minutes
Difficulty
Intermediate
CEU/CPE
6
Video Transcription
00:00
Welcome back to CyberRays. This, of course. I'm your instructor. Brad Roads. Let's jump into our module summary for module five, domain four of ESA.
00:09
So in this video, we're going to review what we covered in the module in adolescence, and that's implementation, integration, verification and validation. And then we're gonna talk, as I discussed previously about the system lifecycle processes and why that's important to understand.
00:23
So when we think about the four areas we covered here in module five, we have implementation. That's where we build the pieces of the puzzle. We build the actual elements to a system, right? So think of that puzzle piece. Integration is where I take and put the puzzle together. So that's where we're constructing the system of interest that has
00:43
all of those different things that will operate in that environment that we've specified in our requirements.
00:49
Next we have verification, and I did this graphic intentionally because the stars there are sort of indicative or representative off our five requirements we had for our system and one of them didn't make it. Now
01:02
that might be an objective requirement. That was a nice toe. Have that. Hey, baby, that's okay that we didn't meet that requirement. But in the end, we're talking about meeting those requirements and hopefully we meet all of them as designed.
01:12
And then the last one we talked about in this particular module was validation and validation. Asked the question. Did we do it good enough? Did we meet the needs of our organization of the department of our business? Whatever we were building towards from a security controls perspective of security systems perspective, overarching systems, engineering work, does it meet
01:33
the business need?
01:34
If it doesn't, you might not validate the system, which means we probably wasted money.
01:40
So system lifecycle processes are incredibly important as an issue. You need to know these bins as an ESOP candidate. Taking the exam probably should memorize things. You should know that agreement processes are acquisition and supply. And why are the agreement process? Because we have to sign a contract related to them. You should know that
01:59
all of the things that support or enable
02:00
on actual system life cycle systems engineering are gonna be found in the organizational project enabling process things like HR. Things like knowledge management,
02:10
um, technical management process, anything related to projects anything related to configure or quality assurance that's going to be in this bin. And then, of course, we've talked about four of the technical processes here. Implementation, integration, verification and validation.
02:24
But there's a whole lot more. And as you prepare for the ESOP exam, I encourage you to read this information from the National
02:30
Institute of Standards and Technology and understand what's in each of these processes. It will help you when you get to the exam.
02:43
So in this lesson we reviewed implementation, integration, verification and validation. Those processes we talked about here for domain for Module five. And then we reviewed the system lifecycle processes and why that is so important when it comes to being not only an ISI, but for the ESOP exam.
03:01
We'll see you next time in module six. Domain five. We're gonna talk all about getting rid of things disposal.
03:07
We'll see you
Up Next
Information Systems Security Engineering Professional (ISSEP)

This ISSEP course provides students with the foundational knowledge of the concentration area of the CISSP certification that includes a focus on the processes used to develop secure systems. Students will learn key concepts and skills of the five ISSEP domains.

Instructed By