Course Details

Previous Page


CompTIA CASP CAS-002: Privacy Policies & Procedures and Incident Recovery


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Creating strong privacy polices and procedures will aid in securing organizational assets. If an event does occur, it is important to have proper procedures in place to make sure that recovery occurs as quickly and as efficiently as possible. In this course, you'll learn about the policies, procedures, and business documents that are used when creating a secure network environment. You will also examine the incident response and recovery procedures that are used when security breaches occur. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.

Target Audience
Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments

Prerequisites
None

Expected Duration (hours)
1.9

Lesson Objectives

CompTIA CASP CAS-002: Privacy Policies & Procedures and Incident Recovery

  • start the course
  • identify policies, processes, and procedures for change used to secure a network environment
  • identify legal compliance and advocacy issues associated with securing a network environment
  • identify RA, SOA, and BIA when creating a secure network environment
  • identify IA, ISA, MOU, and SLA when creating a secure network environment
  • identify OLA, NDA, and BPA when creating a secure network environment
  • identify privacy principles and PII when creating a secure network environment
  • identify how to use user policies when creating a secure network environment
  • identify incident response and forensic tasks when creating a secure network environment
  • identify how to properly use training and awareness
  • identify how auditing and continuous monitoring can be used when securing a network environment.
  • identify how data retention, legal holds, and data recovery are used when securing a network environment
  • identify how asset control and data ownership and handling affect network security
  • identify detection and collection methods used when creating network security
  • identify mitigation techniques used when securing a network environment
  • identify data recovery and reconstitution techniques used when securing a network environment
  • identify response and disclosure procedures used when securing a network environment
  • define how internal and external violations affect network security
  • define how system, audit, and review logs can be used to aid in securing a network environment
  • define how and why a chain of custody procedure is critical when dealing with network security breaches
  • define how forensic analysis is used on compromised systems in order to deal with security breaches
  • define the importance of having a continuity of operations plan in place in the event that security incidents occur
  • define how the order of volatility will allow you to recover from security incidents
  • to compare and contrast security, privacy policies, and procedures based on organizational requirements and conduct incident response and recovery procedures
  • Course Number:
    sp_capr_a06_it_enus