Oreilly - CISSP Video Course Domain 10 – Operations Security
by | Released May 2009 | ISBN: 9780789741813
The fast, powerful way to prepare for your CISSP exam!30+ hours of personal video training from leading security expert Shon HarrisAchieving the (ISC)2's globally recognized CISSP can give your IT career a lift. In this DVD, the world's #1 CISSP trainer brings her legendary five-day boot camp to your computer screen. Packed with over 30 hours of instruction adapted from Shon's classes, this video course includes realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-word settings. Preparing for the CISSP has never been this easy or convenient.Master the skills and concepts you need for all ten CISSP common body of knowledge domains:Access ControlApplication SecurityBusiness Continuity and Disaster Recovery PlanningCryptographyInformation Security and Risk ManagementLegal, Regulations, Compliance, and InvestigationsOperations SecurityPhysical (Environmental) SecuritySecurity Architecture and DesignTelecommunications and Network SecuritySystem RequirementsOPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers COMPUTER: 500MHz or higher CPU; 128MB RAM or more Show and hide more
- Course Introduction 00:07:24
- Domain 10 – Operations Security 00:02:02
- Computer Operations 00:04:19
- Problem Management Procedures for Processing Problems 00:01:11
- Higher Level Look 00:00:36
- Administrative Controls Personnel Controls 00:05:50
- Resource Protection 00:02:03
- Media Labels and Controls 00:01:19
- Software Escrow 00:01:22
- Media Reuse 00:05:33
- Why Not Just Delete the Files? 00:02:57
- Backups 00:01:42
- Backup Types 00:01:08
- Incremental Backup 00:01:15
- Incremental 00:02:35
- Differential Backup 00:03:19
- Mean Time Between Failure 00:01:37
- Mean Time to Repair 00:01:30
- Redundant and Fault Tolerance 00:02:32
- Mirroring Data 00:00:59
- Direct Access Storage Device 00:07:27
- Serial Advanced Technology Architecture 00:00:50
- SAN 00:01:13
- Fault Tolerance 00:02:05
- Redundancy Mechanism 00:01:40
- Some Threats to Computer Operations 00:00:51
- Trusted Recovery of Software 00:01:10
- After System Crash 00:00:51
- Security Concerns 00:01:32
- Contingency Planning 00:01:23
- Remote Access Security 00:09:23
- Before Carrying Out Vulnerability Testing 00:00:58
- Testing for Vulnerabilities 00:01:20
- Security Testing Issues 00:02:07
- Vulnerability Scanning 00:01:42
- Data Leakage – Keystroke Logging 00:00:58
- Password Cracking 00:02:10
- War Dialing 00:02:16
- War Driving 00:03:26
- Penetration Testing 00:10:05
- Post-Testing and Assessment Steps 00:02:14
- Penetration Testing Variations 00:00:55
- Types of Testing 00:01:17
- Protection Mechanism – Honeypot 00:01:49
- Log Reviews 00:01:00
- Domain 10 Review 00:07:06
- Course Closure 00:24:37
Show and hide more
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.