
CISSP Certification Training: Domain 7
Security Operations
Publisher: Infinite Skills
Release Date: June 2016
Duration: 8 hours 10 minutes
Watch on Safari with a 10-day trial
Start your free trial nowWhere's the cart? All videos are now exclusively on Safari. Questions? See our FAQ or contact customer service:
1-800-889-8969 / 707-827-7019
support@oreilly.com
While the course is primarily intended to assist IT professionals in their quest to pass the CISSP exam, it is also useful to business owners and business managers interested in information security as it offers a vision of how to assemble and maintain a comprehensive information security structure suitable for virtually any type of business or organization. If you're looking for a course on how to prevent your information assets from being compromised, this is it.
- Master the knowledge requirements of CISSP Domain 7 - Security Operations
- Learn how to set-up a comprehensive IT security structure suitable for any organization
- Understand security operations, provisioning, and system security maintenance tasks
- Learn about incident response requirements, digital investigations, and cryptography
- Explore the creation of business continuity plans and disaster recovery plans
- Understand the processes and technologies related to data and network recovery
- Learn to maintain the confidentiality, integrity, and availability of your information assets
Table of Contents
Chapter: Security Operations
Introduction
05m 38s
Chapter: Provisioning
Change Management
09m 16s
Physical, Virtual, And Cloud
09m 58s
Infrastructure And Firewalls
08m 13s
Security Components
10m 23s
Services, Servers, WS, And VOIP
08m 35s
Apps, Protocols, And Users
09m 24s
Asset Inventory
07m 15s
Planning
08m 27s
Acquisition
10m 15s
Deployment
08m 50s
Chapter: Maintaining Systems And Services
Maintenance
07m 27s
Repairs And AV
09m 17s
Logging
09m 29s
Remote Log Repository
08m 50s
Auditing
03m 26s
IDS And IPS
07m 21s
NIDS
09m 30s
NIDS, NIPS, And HIPS
08m 47s
DLP
07m 43s
Honeypot, Honeynet, And Honeytoken
09m 8s
SIEM And Inspections
06m 25s
Monitoring Users
09m 40s
Configuration And Performance Testing
09m 54s
Vulnerability And Penetration Testing
10m 27s
Reports And Decommissioning
08m 28s
Chapter: Incident Response
Incident Response Introduction
06m 40s
Escalation Process
08m 15s
Litigation And Criminal Act
09m 22s
Preparation
10m 43s
Detection And Containment
10m 12s
Eradication
05m 33s
Recovery And Incident Review
04m 59s
Chapter: Investigations
Investigations
08m 5s
Evidence - Part 1
06m 41s
Evidence - Part 2
06m 7s
Digital Forensics
11m 4s
Legal Proceedings And EDiscovery
09m 54s
Chapter: BCP And DRP
BCP And DRP Introduction
06m 54s
BCP And DRP Timelines
12m 15s
BCP And DRP Details
08m 57s
DRP Planning And BIA
07m 43s
DRP Plan Development
06m 43s
DR Teams And Plan Testing
09m 2s
DRP Approval Initiation And Termination
07m 59s
Maintaining The Plans
05m 5s
Chapter: Recovery Strategies
Recovery Strategies
07m 57s
Alternate Facilities - Part 1
08m 4s
Alternate Facilities - Part 2
07m 22s
Network Recovery
08m 2s
Raid 0 1
08m 18s
Raid 2 3 4 5 And Parity
08m 48s
Full Backup
06m 35s
INC Diff Backups
07m 58s
Backups Electronic Vaulting And Shadow Copies
09m 57s
Journaling, RPO, And RTO
09m 33s
Recovery Of Services And Personnel
10m 41s
Chapter: Physical Security And Safety
Physical Security And Safety
08m 17s
Chapter: Wrap Up
Wrap Up
04m 52s