Categories

There are currently no items in your shopping cart.

User Panel

Forgot your password?.

CISSP Cert Prep: 7 Security Operations

Video Introducing this tutorial

Introduction

Welcome

1. Investigations and Forensics

Conducting investigations
Evidence types
Introduction to forensics
System and file forensics
Network forensics
Software forensics
Embedded device forensics
Chain of custody
Reporting and documenting incidents
Electronic discovery (ediscovery)

2. Logging and Monitoring

Correlating security event Information
Continuous security monitoring
Data loss prevention

3. Resource Security

Physical asset management
Change and configuration management
Virtualization
Virtualization security
Cloud computing models
Public cloud tiers

4. Security Principles

Need to know and least privilege
Separation of duties and responsibilities

5. Incident Management

Build an incident response program
Incident identification
Escalation and notification
Mitigation
Recovery and reconstitution
Lessons learned and reporting

Conclusion

What's next?