CISSP® - Security Operations

This course covers the 7th domain of the CISSP. You'll learn about the day to day operational duties, best practices, and security concepts that security professionals will need to be familiar with prior to attempting the CISSP examination.
Course info
Rating
(14)
Level
Intermediate
Updated
Feb 7, 2017
Duration
3h 3m
Table of contents
Course Overview
Introduction to Security Operations
Digital Forensics
Logging and Monitoring
Vulnerability Management
Change Management
Operate and Maintain Protective Controls
Incident Management
Investigative Types
Evidence Handling
Resource Provisioning
Recovery Strategies
Personnel Privacy and Safety
Business Continuity and Disaster Recovery
Internal Physical Security
Securing Assets
External Physical Security
Description
Course info
Rating
(14)
Level
Intermediate
Updated
Feb 7, 2017
Duration
3h 3m
Description

This course, CISSP® - Security Operations, covers the wide breadth of topics within the Security Operations domain of the CISSP. This includes activities such as evidence collection and handling, investigative techniques and types, monitoring and logging activities such as intrusion detection and prevention, event management, and egress monitoring. In addition to this, there will also be a focus on securing the provisioning of resources, understanding foundational security operational concepts such the information lifecycle, and job rotation. The course also covers topics such as resource protection, incident management, operation of preventative measures such as firewalls, implementing a patch management program, understanding how to implement change management, and learning about recovery strategies. By the end this course, you should be familiar with a broad spectrum of topics that are covered within the Security Operations domain of the CISSP. This course will provide you with the background information that you will need when addressing questions related to Security Operations.

About the author
About the author

Lee Allen is an adversarial engineer and penetration tester at the Columbus Collaboratory. Lee specializes in Penetration Testing and IT Risk Management and has authored four technical books.

More from the author
Threat Modeling: The Big Picture
Beginner
1h 5m
27 Jun 2017
Transcript
Transcript

Hello everyone, my name is Lee Allen. Welcome to my course CISSP® - Security Operations. I am a Certified Information System Security Professional currently employed as an Adversarial Engineer at the Collumbus Collaboratory. I have authored several books about penetration testing and have many years of experience working with enterprise risk management and security operations teams.

Security Operations is one of the largest domains in ISC(s)’s Common Body of Knowledge. It covers sixteen different areas, each of which are addressed within this course.

Some of the major topics that we will cover include::

  • Foundational security operations concepts
  • Incident handling
  • Investigations
  • Internal and external Physical security and safety concerns
  • And contingency planning
By the end this course, you should be familiar with a broad spectrum of topics that are covered within the Security Operations domain of the CISSP. This course will provide you with the background information that you will need when addressing questions related to Security Operations.

I hope you’ll join me on this journey to learn the security operations concepts with the CISSP Security Operations course, at Pluralsight.