Oreilly - CISSP Certification Training: Domain 7
by David R. Miller | Publisher: Infinite Skills | Release Date: June 2016 | ISBN: 9781491961803
This course covers in detail the information required to pass the security operations (Domain 7) portion of the Certified Information Systems Security Professional (CISSP) certification exam.While the course is primarily intended to assist IT professionals in their quest to pass the CISSP exam, it is also useful to business owners and business managers interested in information security as it offers a vision of how to assemble and maintain a comprehensive information security structure suitable for virtually any type of business or organization. If you're looking for a course on how to prevent your information assets from being compromised, this is it.Master the knowledge requirements of CISSP Domain 7 - Security OperationsLearn how to set-up a comprehensive IT security structure suitable for any organizationUnderstand security operations, provisioning, and system security maintenance tasksLearn about incident response requirements, digital investigations, and cryptographyExplore the creation of business continuity plans and disaster recovery plansUnderstand the processes and technologies related to data and network recoveryLearn to maintain the confidentiality, integrity, and availability of your information assetsDavid R. Miller (CISSP, PCI QSA, CEH) is President of the MicroLink Corporation, a provider of information systems security, compliance, and training services. He's lectured on information security at the U.S. Military Academy at West Point, the U.S. Army Advanced Battle Command, Cisco Systems Inc., Oracle Corporation, Symantec Corporation, and many others. He is the author (or co-author) of ten books on network systems and information security.
- Security Operations
- CISSP 2018 Domain 7 Update: Security Operations 00:09:46
- Introduction 00:05:39
- Provisioning
- Change Management 00:09:16
- Physical, Virtual, And Cloud 00:09:58
- Infrastructure And Firewalls 00:08:14
- Security Components 00:10:24
- Services, Servers, WS, And VOIP 00:08:36
- Apps, Protocols, And Users 00:09:24
- Asset Inventory 00:07:15
- Planning 00:08:27
- Acquisition 00:10:15
- Deployment 00:08:51
- Maintaining Systems And Services
- Maintenance 00:07:28
- Repairs And AV 00:09:17
- Logging 00:09:30
- Remote Log Repository 00:08:51
- Auditing 00:03:26
- IDS And IPS 00:07:21
- NIDS 00:09:31
- NIDS, NIPS, And HIPS 00:08:47
- DLP 00:07:44
- Honeypot, Honeynet, And Honeytoken 00:09:09
- SIEM And Inspections 00:06:25
- Monitoring Users 00:09:40
- Configuration And Performance Testing 00:09:55
- Vulnerability And Penetration Testing 00:10:27
- Reports And Decommissioning 00:08:29
- Incident Response
- Incident Response Introduction 00:06:40
- Escalation Process 00:08:15
- Litigation And Criminal Act 00:09:22
- Preparation 00:10:43
- Detection And Containment 00:10:12
- Eradication 00:05:33
- Recovery And Incident Review 00:04:59
- Investigations
- Investigations 00:08:05
- Evidence - Part 1 00:06:41
- Evidence - Part 2 00:06:07
- Digital Forensics 00:11:04
- Legal Proceedings And EDiscovery 00:09:54
- BCP And DRP
- BCP And DRP Introduction 00:06:54
- BCP And DRP Timelines 00:12:15
- BCP And DRP Details 00:08:57
- DRP Planning And BIA 00:07:43
- DRP Plan Development 00:06:44
- DR Teams And Plan Testing 00:09:02
- DRP Approval Initiation And Termination 00:07:59
- Maintaining The Plans 00:05:05
- Recovery Strategies
- Recovery Strategies 00:07:57
- Alternate Facilities - Part 1 00:08:04
- Alternate Facilities - Part 2 00:07:22
- Network Recovery 00:08:02
- Raid 0 1 00:08:18
- Raid 2 3 4 5 And Parity 00:08:49
- Full Backup 00:06:35
- INC Diff Backups 00:07:58
- Backups Electronic Vaulting And Shadow Copies 00:09:57
- Journaling, RPO, And RTO 00:09:33
- Recovery Of Services And Personnel 00:10:41
- Physical Security And Safety
- Physical Security And Safety 00:08:17
- Wrap Up