LearnKey Training

CISSP Operations Security Course 2008

CISSP Operations Security Course 2008

Back to Product Page

CISSP Operations Security Course 2008

1 Sessions -
2 Hours of Interactive Training

Operations Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon goes over security administration, intrusion detection, auditing, threats and countermeasures. At the conclusion of this course, you will be familiar with the issues and concepts of the Operations Security domain required to pass the CISSP exam.

  • One of the valuable domains which leads to CISSP certification
  • Boost your earning potential through accreditation in CISSP
  • Information security skills are in demand throughout the world

About The Author
Michael Solomon, CISSP, PMP®, TICSA, is a speaker, consultant and trainer who specializes in project management and database application-level security topics. Since 1987 Solomon has worked on IT projects or instructed for more than 60 organizations including EarthLink, Nike, Lucent Technologies, BellSouth, UPS, Boart Longyear, and the U.S. Coast Guard. Solomon holds an MS in Computer Science from Emory University (1998), and a BS in Computer Science from Kennesaw State University (1987) where he was also an instructor from 1998 - 2001. He has been a contributor to various certification books.

Session 1

Section A: Administrative Management

  • Overview
  • Duty Separation
  • Least Access
  • Accountability
  • Privacy and Protection
  • Legal Requirements
  • Illegal Activities

Section B: Operation Controls

  • Record Retention
  • Backups
  • Data Removal
  • Antivirus Controls
  • Privileged Functions
  • Resource Protection

Section C: Auditing

  • Audit Procedures
  • Frequency
  • Audit Trails
  • Audit Reporting
  • Sampling
  • Retention

Section D: Monitoring

  • What is Monitoring?
  • Categories
  • Warning Banners
  • Keystroke Monitoring
  • Traffic Analysis
  • Trend Analysis
  • Tools
  • Failure Recognition

Section E: Intrusion Detection

  • Intrusion Prevention
  • IDS Types
  • Penetration Testing
  • Inappropriate Activity

Section F: Threats and Countermeasures

  • Interception
  • Human Factors
  • Fraud and Theft
  • Employee Sabotage
  • Disaster Recovery
  • Hackers
  • Espionage
  • Malicious Code