CISSP: Security Operations Part 1

Individuals interested in information systems security concepts, methodologies and best practices; candidates for the Certified Information Systems Security Professional (CISSP) exam

Prerequisite
None

Expected Duration
146 minutes

Description
The day to day security activities in an organization are the heart of security operations. In this course, you’ll learn techniques for performing general security operations activities such as security investigations, including best practices and requirements for the types of investigations that security professionals typically take part in. This course also introduces you to techniques for using logging and monitoring activities for security purposes, establishing secure resource provisioning, and applying general security concepts such as least privilege to all security operations activities. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.

Objective

Understanding and Supporting Investigations

  • start the course
  • identify characteristics of security investigations
  • describe best practices for evidence collection and handling
  • describe best practices for reporting and documenting investigation activities
  • distinguish between different investigative techniques
  • identify characteristics of digital forensics and their role in security investigations

Understanding Requirements for Investigation Types

  • identify requirements for operational investigations
  • identify requirements for criminal investigations
  • identify requirements for civil investigations
  • identify requirements for regulatory investigations
  • identify requirements for e-Discovery investigations

Performing Logging and Monitoring Activities

  • describe intrusion detection and prevention best practices
  • describe characteristics of SIEM
  • describe characteristics of continuous monitoring
  • describe characteristics of egress monitoring

Secure Resource Provisioning

  • identify best practices for securing asset inventory
  • identify best practices for using configuration management as a technique to secure resources
  • describe best practices for securing physical assets
  • describe best practices for securing virtual assets
  • describe best practices for securing cloud assets
  • identify best practices for securing applications

Applying Security Operations Concepts

  • apply the concept of least privilege to security operations
  • apply the concept of separation of duties and responsibilities to security operations
  • describe best practices for monitoring special privileges in security operations
  • describe best practices for using job rotation in security operations
  • describe the role of the information lifecycle in security operations
  • describe the role of service-level agreements in security operations

Practice: Securing Operations

  • identify best practices for incorporating fundamental security concepts in operational activities including investigations and monitoring

MONTHLY SUBSCRIPTION

$129/month
 

ANNUAL SUBSCRIPTION

$1295/year

Multi-license discounts available for Annual and Monthly subscriptions.