CISSP: Security Operations Part 2

Individuals interested in information systems security concepts, methodologies and best practices; candidates for the Certified Information Systems Security Professional (CISSP) exam

Prerequisite
None

Expected Duration
117 minutes

Description
One of the primary activities within security operations is detecting and responding to security-related incidents. In this course, you’ll learn incident management techniques including incident detection, response, mitigation, reporting, and recovery best practices. This course also covers how to use preventative measures such as firewalls, whitelisting and blacklisting, sandboxing, and anti-malware. In addition, you’ll be introduced to patch and vulnerability management activities such as patch testing, installation, and deployment. Finally, this course covers change management processes that security professionals regularly take part in as part of security operations, including versioning, baselining, and security impact analyses. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.

Objective

Resource Protection Techniques

  • to start the course
  • use media management as a resource protection technique
  • use hardware and software asset management as a resource protection technique

Performing Incident Management

  • identify best practices for incident detection
  • identify best practices for incident response and mitigation
  • Identify the best practices of incident reporting
  • identify best practices for incident recovery
  • identify best practices for incident remediation

Operating and Maintaining Preventative Measures

  • describe best practices for operating and maintaining firewalls as a preventative measure
  • distinguish between different intrusion detection and prevention systems
  • identify best practices for using whitelisting and blacklisting as a preventative measure
  • identify best practices for using third-party security services as a preventative measure
  • identify best practices for using sandboxing as a preventative measure
  • identify best practices for using honeypots and honeynets as a preventative measure
  • identify best practices for using anti-malware as a preventative measure

Patch and Vulnerability Management

  • identify the role of patch and vulnerability management in security operations
  • identify best practices for vetting information required for patch and vulnerability management activities
  • describe best practices for patch prioritization and scheduling activities
  • describe best practices for patch testing activities
  • describe best practices for patch installation and deployment
  • describe best practices for auditing and assessing patch management activities
  • describe best practices for ensuring patch management consistency and compliance
  • select appropriate vulnerability management systems

Change Management Processes

  • identify the role of change management in security operations
  • distinguish between the different phases of a change management process
  • describe the role of versioning and baselining in change management
  • describe the role of a security impact analysis in change management

Practice: Addressing Security Vulnerabilities

  • to select appropriate responses to security incidents, and implement strategies to mitigate security vulnerabilities

MONTHLY SUBSCRIPTION

$129/month
 

ANNUAL SUBSCRIPTION

$1295/year

Multi-license discounts available for Annual and Monthly subscriptions.