CompTIA CASP CAS-002: Privacy Policies & Procedures and Incident Recovery

Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments

Prerequisite
None

Expected Duration
113 minutes

Description
Creating strong privacy polices and procedures will aid in securing organizational assets. If an event does occur, it is important to have proper procedures in place to make sure that recovery occurs as quickly and as efficiently as possible. In this course, you’ll learn about the policies, procedures, and business documents that are used when creating a secure network environment. You will also examine the incident response and recovery procedures that are used when security breaches occur. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.

Objective

Common Business Documents and Procedures

  • start the course
  • identify policies, processes, and procedures for change used to secure a network environment
  • identify legal compliance and advocacy issues associated with securing a network environment
  • identify RA, SOA, and BIA when creating a secure network environment
  • identify IA, ISA, MOU, and SLA when creating a secure network environment
  • identify OLA, NDA, and BPA when creating a secure network environment
  • identify privacy principles and PII when creating a secure network environment

Policies

  • identify how to use user policies when creating a secure network environment
  • identify incident response and forensic tasks when creating a secure network environment
  • identify how to properly use training and awareness
  • identify how auditing and continuous monitoring can be used when securing a network environment.

E-Discovery and Data Breach

  • identify how data retention, legal holds, and data recovery are used when securing a network environment
  • identify how asset control and data ownership and handling affect network security
  • identify detection and collection methods used when creating network security
  • identify mitigation techniques used when securing a network environment
  • identify data recovery and reconstitution techniques used when securing a network environment
  • identify response and disclosure procedures used when securing a network environment

Incident and Emergency Response

  • define how internal and external violations affect network security
  • define how system, audit, and review logs can be used to aid in securing a network environment
  • define how and why a chain of custody procedure is critical when dealing with network security breaches
  • define how forensic analysis is used on compromised systems in order to deal with security breaches
  • define the importance of having a continuity of operations plan in place in the event that security incidents occur
  • define how the order of volatility will allow you to recover from security incidents

Practice: Privacy Policies and Procedures

  • to compare and contrast security, privacy policies, and procedures based on organizational requirements and conduct incident response and recovery procedures

MONTHLY SUBSCRIPTION

$129/month
 

ANNUAL SUBSCRIPTION

$1295/year

Multi-license discounts available for Annual and Monthly subscriptions.