LearnKey Training

CISSP Security Operations 2015 Course

CISSP Security Operations 2015 Course

CISSP Security Operations 2015 Course

2 Sessions -
4 Hours of Interactive Training

LearnKey's Security Operations 2015 course is one of 8 domains making up the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). Join LearnKey expert Michael Solomon as he presents information on security administration, intrusion detection, auditing, threats, and countermeasures. At the conclusion of this course, learners will be familiar with the issues and concepts of the Security Operations knowledge required to pass the CISSP exam.

  • Be up-to-date with training based on the most recent CISSP CBK
  • Interactive labs, and dozens of pre/post test questions
  • View your online courseware anytime, anywhere

About The Author
Michael Solomon, CISSP, PMP®, TICSA, is a speaker, consultant and trainer who specializes in project management and database application-level security topics. Since 1987 Solomon has worked on IT projects or instructed for more than 60 organizations including EarthLink, Nike, Lucent Technologies, BellSouth, UPS, Boart Longyear, and the U.S. Coast Guard. Solomon holds an MS in Computer Science from Emory University (1998), and a BS in Computer Science from Kennesaw State University (1987) where he was also an instructor from 1998 - 2001. He has been a contributor to various certification books.

Session 1

Section A: Investigations

  • Incident Investigations
  • Evidence
  • Reporting and Documenting
  • Investigative Techniques
  • Digital Forensics
  • Evidence Types
  • Evidence Admissibility, Search/Seizure
  • Investigation Types

Section B: Logging and Monitoring

  • Monitoring Definition, Categories
  • Monitoring Tools and Techniques
  • Intrusion Detection and Prevention
  • SIEM
  • Continuous Monitoring
  • Egress Monitoring
  • Egress Monitoring Techniques

Section C: Secure Resource Provisioning

  • Configuration Management
  • Configuration Items
  • Need to Know/Least Privilege
  • Separation of Duties
  • Job Rotation
  • Information Lifecycle
  • Service Level Agreements

Section D: Resource Protection

  • Media Management
  • Software
  • Hardware and Data
  • Main Phases
  • Incident Detection, Response, Mitigation
  • Incident Reporting, Recovery
  • Remediation and Lessons Learned
  • Preventative Measures

Session 2

Section A: Vulnerability and Change Management

  • Patch Management Process
  • Change Management
  • Recovery Plan
  • Recovery Time Objective
  • Backup Storage Strategy
  • Containment, Recovery, and Alternatives
  • Hot Site, Dual Redundant Site
  • Mobile Site, Selection Criteria
  • Processing Agreements
  • Recovery Strategies

Section B: Disaster and Continuity Planning

  • Recovery Process
  • External Communications, Assessment
  • Test Disaster Recovery Plans
  • Plan Test Types
  • Continuity Strategy

Section C: Physical Security and Personnel Safety

  • Reasons for Physical Security
  • Fences and Gates
  • Turnstiles, Mantraps, Lights, and Guards
  • Keys, Locks, Badges, and Biometrics
  • Motion Detectors and CCTV
  • Restricted Areas and Visitor Control
  • Technical Controls
  • Personnel Safety