CISSP Cert Prep: 7 Security Operations ( Apr. 2018)
Posted by Superadmin on December 25 2018 03:11:03

CISSP Cert Prep: 7 Security Operations ( Apr. 2018)

 

Prepare for the Certified Information Systems Security Professional (CISSP) exam and gain crucial knowledge about best practices in security operations. Mike Chapple walks through each topic in the seventh domain of the CISSP exam. He explains how to conduct and support investigations, find evidence using forensics, and report and document security incidents. In addition, Mike goes into logging and monitoring activities, resource security, and security principles, as well as the importance of incident response and emergency management programs. This course—along with the others in this nine-part series—prepare you for the CISSP exam and provide you with a solid foundation for a career in information security.

Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.

Note: This course is part of a series releasing throughout 2018. A complete learning path will be available once all the courses are released.

Topics include:
Conducting investigations
Forensics
Reporting and documenting incidents
Continuous security monitoring
Preventing data loss and theft
Asset management
Change management
Virtualization security
Security principles: need to know, separation of duties, and more
Building an incident response program
Personnel safety and emergency management

 


1 - Introduction



 
 
01. Welcome
02. What_you_need_to_know



2 - 1._Investigations_and_Forensics



 
 
 
https://drive.google.com/open?id=
 
03. Conducting_investigations
04. Evidence_types
05. Introduction_to_forensics
06. System_and_file_forensics
 
 
 
 
07. Network_forensics
08. Software_forensics
09. Embedded_device_forensics
10. Chain_of_custody
 
 
11. Reporting_and_documenting_incidents
12. Electronic_discovery_ediscovery


3 - 2._Logging_and_Monitoring



 
 
 
13. Correlating_security_event_information
14. Continuous_security_monitoring
15. Data_loss_prevention


4 - 3._Resource_Security



 
 
 
 
16. Physical_asset_management
17. Change_and_configuration_management
18. Virtualization
19. Virtualization_security
 
 
20. Cloud_computing_models/div>
21. Public_cloud_tiers


5 - 4._Security_Principles



 
 
 
22. Need_to_know_and_least_privilege
23. Separation_of_duties_and_responsibilities
24. Privileged_account_management


6 - 5._Incident_Management



 
 
 
 
25. Build_an_incident_response_program
26. Incident_identification
27. Escalation_and_notification
28. Mitigation
 
 
29. Recovery_and_reconstitution
30. Lessons_learned_and_reporting


7 - 6._Personnel_Safety



 
 
31. Employee_safety
32. Emergency_management


8 - Conclusion



 
27. What_s_next