Prepare for the seventh domain of the CISSP exam. Learn about investigations and forensics, logging and monitoring, resource security, and more.
- Hi, I'm Mike Chapple, and I'd like to welcome you to our CISSP Security Operations course. The Certified Information Systems Security Professional, or CISSP certification, is the gold standard for information security certification. You'll find that it's a core requirement for many mid- and senior-level information security positions. Earning the CISSP requires demonstrating that you have sufficient work experience and passing an exam covering the eight domains of information security.
This course covers the seventh of those eight domains, Security Operations. I have two decades of experience as an information security professional, and I've been involved in CISSP training and certification for most of those. As you work your way through this course, you might find it helpful to have two books, that I've written, by your side. The first is the Official CISSP Study Guide, available from Sybex. This book is approved by the International Information Systems Security Certification Consortium as the official study guide for the exam, and it contains context that supplements this course and will help you be prepared when you take the exam.
The second book you'll want is the Official CISSP Practice Tests, also available from Sybex. This books contains 1,300 practice exam questions, designed to mimic those on the actual exam. It has an entire chapter dedicated to questions from each domain, along with two full-length practice tests to help you assess your progress. As we work our way through this course, we will focus on each topic covered by domain seven. We'll review how to conduct and support security investigations and the requirements for different investigation types.
We'll also cover the incident management process, and you'll learn how you can conduct logging and monitoring activities. You'll also discover the importance of solid business continuity and disaster recovery programs. And that's just a small sampling of the many topics covered in this course. These topics, combined with the information you learn in our other CISSP courses, will help you pass the CISSP exam and also provide a critical foundation for your career in information security. All right, let's get rolling.
- Conducting investigations
- Reviewing the basic concepts of computer forensics
- Using network forensic analysis techniques
- Reporting and documenting incidents
- Correlating security event Information
- Understanding continuous security monitoring activities
- Preventing data loss and theft with data loss prevention technology
- Reviewing the security issues surrounding virtualization
- Learning about the major cloud computing models
- Learning about the three tiers of public cloud computing
- Implementing the principle of separation of duties
- Building an incident response program