Course Details

Previous Page


CISSP: Security Operations Part 1


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
The day to day security activities in an organization are the heart of security operations. In this course, you'll learn techniques for performing general security operations activities such as security investigations, including best practices and requirements for the types of investigations that security professionals typically take part in. This course also introduces you to techniques for using logging and monitoring activities for security purposes, establishing secure resource provisioning, and applying general security concepts such as least privilege to all security operations activities. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.

Target Audience
Individuals interested in information systems security concepts, methodologies and best practices; candidates for the Certified Information Systems Security Professional (CISSP) exam

Prerequisites
None

Expected Duration (hours)
2.4

Lesson Objectives

CISSP: Security Operations Part 1

  • start the course
  • identify characteristics of security investigations
  • describe best practices for evidence collection and handling
  • describe best practices for reporting and documenting investigation activities
  • distinguish between different investigative techniques
  • identify characteristics of digital forensics and their role in security investigations
  • identify requirements for operational investigations
  • identify requirements for criminal investigations
  • identify requirements for civil investigations
  • identify requirements for regulatory investigations
  • identify requirements for e-Discovery investigations
  • describe intrusion detection and prevention best practices
  • describe characteristics of SIEM
  • describe characteristics of continuous monitoring
  • describe characteristics of egress monitoring
  • identify best practices for securing asset inventory
  • identify best practices for using configuration management as a technique to secure resources
  • describe best practices for securing physical assets
  • describe best practices for securing virtual assets
  • describe best practices for securing cloud assets
  • identify best practices for securing applications
  • apply the concept of least privilege to security operations
  • apply the concept of separation of duties and responsibilities to security operations
  • describe best practices for monitoring special privileges in security operations
  • describe best practices for using job rotation in security operations
  • describe the role of the information lifecycle in security operations
  • describe the role of service-level agreements in security operations
  • identify best practices for incorporating fundamental security concepts in operational activities including investigations and monitoring
  • Course Number:
    sp_cisp_a09_it_enus