HOME > IT & Software > CISSP Domain 7- Security Operations

CISSP Domain 7- Security Operations

SynopsisCISSP – Domain 7- Security Operations, available at $19...
CISSP Domain 7- Security Operations  No.1

CISSP – Domain 7- Security Operations, available at $19.99, with 45 lectures, 1 quizzes, and has 1 subscribers.

You will learn about Understanding Information Security Concepts in Domain 7 Security Operations Investigations Provisioning of Resources through Configuration Management Foundational Security Operations Concepts Resource Protection Incident Response Preventative Measures against Attacks Patch and Vulnerability Management Change and Configuration Management The Disaster Recovery Process Test Plan Review Business Continuity and Other Risk Areas Access Control Internal Security Building and Inside Security Personnel Safety This course is ideal for individuals who are Network, IT, Server Managers and Security Administrators who want to earn a CISSP Certificate It is particularly useful for Network, IT, Server Managers and Security Administrators who want to earn a CISSP Certificate.

Enroll now: CISSP – Domain 7- Security Operations

Summary

Title: CISSP – Domain 7- Security Operations

Price: $19.99

Number of Lectures: 45

Number of Quizzes: 1

Number of Published Lectures: 45

Number of Published Quizzes: 1

Number of Curriculum Items: 46

Number of Published Curriculum Objects: 46

Original Price: $34.99

Quality Status: approved

Status: Live

What You Will Learn

  • Understanding Information Security Concepts in Domain 7 Security Operations
  • Investigations
  • Provisioning of Resources through Configuration Management
  • Foundational Security Operations Concepts
  • Resource Protection
  • Incident Response
  • Preventative Measures against Attacks
  • Patch and Vulnerability Management
  • Change and Configuration Management
  • The Disaster Recovery Process
  • Test Plan Review
  • Business Continuity and Other Risk Areas
  • Access Control
  • Internal Security
  • Building and Inside Security
  • Personnel Safety
  • Who Should Attend

  • Network, IT, Server Managers and Security Administrators who want to earn a CISSP Certificate
  • Target Audiences

  • Network, IT, Server Managers and Security Administrators who want to earn a CISSP Certificate
  • CISSP is the gold standard for security certifications. It covers the breadth of information security’s deep technical and managerial concepts. Learning to effectively design, engineer, and manage the overall security posture of an organization. This course covers Domain 7- Security Operations. From Incident and Investigations Response that involves investigation of evidence to facility access management and disaster recovery planning, testing, and implementation, this domain requires putting security principles and concepts into practice including personnel safety business continuity patch and vulnerability management.

    With nearly 10,000 training videos available for desktop applications, technical concepts, security and business skills that comprise hundreds of courses, Intellezy has many of the videos and courses you and your workforce needs to stay relevant and take your skills to the next level. Our video content is engaging and offers an assessments that can be used to test knowledge levels pre and/or post course. Our training content is also frequently refreshed to keep current with changes in the software. This ensures you and your employees get the most up-to-date information and techniques for success. And, because our video development is in-house, we can adapt quickly and create custom content for a more exclusive approach to software and computer system roll-outs.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction

    Chapter 2: Investigations

    Lecture 1: The Crime Scene

    Lecture 2: Policy, Roles, and Responsibilities

    Lecture 3: Incident Handling and Response

    Lecture 4: Recovery Phase

    Lecture 5: Evidence Collection and Processing

    Lecture 6: Continuous and Egress Monitoring

    Lecture 7: Data Leak/Loss Prevention (DLP)

    Chapter 3: Provisioning of Resources through Configuration Management

    Lecture 1: Provisioning of Resources through Configuration Management

    Chapter 4: Foundational Security Operations Concepts

    Lecture 1: Key Themes

    Lecture 2: Controlling and Managing Privileged Accounts, Groups and Roles

    Lecture 3: Separations of Duties and Responsibilities

    Lecture 4: Monitor Special Privileges and Job Rotation

    Lecture 5: Managing the Information Lifecycle

    Lecture 6: Service Level Agreements (SLAs)

    Chapter 5: Resource Protection

    Lecture 1: Resource Protection

    Chapter 6: Incident Response

    Lecture 1: IR Concepts

    Lecture 2: IR Phases

    Chapter 7: Preventative Measures against Attacks

    Lecture 1: Unauthorized Disclosure

    Lecture 2: Network Intrusion Detection System Architecture

    Lecture 3: Other Preventative Measures against Attacks

    Chapter 8: Patch and Vulnerability Management

    Lecture 1: Patch and Vulnerability Management

    Chapter 9: Change and Configuration Management

    Lecture 1: Change Management

    Lecture 2: Configuration Management

    Lecture 3: Recovery Site Strategies

    Lecture 4: System Resilience and Fault Tolerance Requirements

    Chapter 10: The Disaster Recovery Process

    Lecture 1: Documenting the Plan

    Lecture 2: Response

    Lecture 3: Personnel and Communications

    Lecture 4: Recovery Concepts

    Lecture 5: Exercise, Assess, and Maintaining the Plan

    Chapter 11: Test Plan Review

    Lecture 1: Tabletop Exercise/Structured Walk-Through Test

    Lecture 2: Walk-Through Drill/Simulation Test

    Lecture 3: Functional Drill/Parallel Test

    Lecture 4: Full-Interruption/Full-Scale Test

    Lecture 5: Update and Maintenance of the Plan

    Chapter 12: Business Continuity and Other Risk Areas

    Lecture 1: Implementation and Operation of Perimeter Security

    Chapter 13: Access Control

    Lecture 1: Card Types

    Lecture 2: Closed Circuit TV

    Chapter 14: Internal Security

    Lecture 1: Interior Intrusion Detection Systems

    Chapter 15: Building and Inside Security

    Lecture 1: Building and Inside Security

    Chapter 16: Personnel Safety

    Lecture 1: Personnel Safety

    Chapter 17: Conclusion

    Lecture 1: Course Recap

    Chapter 18: CISSP – Domain 7- Security Operations Assessment

    Chapter 19: BONUS LECTURES: Cyber Security for the End User Course

    Lecture 1: Understanding Cyber Threats

    Lecture 2: Using Email and the Internet Wisely

    Instructors

  • CISSP Domain 7- Security Operations  No.2
    Intellezy Trainers
    Multi-Award-Winning eLearning Specialists
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 0 votes
  • 3 stars: 0 votes
  • 4 stars: 0 votes
  • 5 stars: 0 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!