CISSP 2024: Foundational Security Operations & Resource Protection

CISSP 2024    |    Expert
  • 14 videos | 36m
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 6 users Rating 4.8 of 6 users (6)
Different organizations have varying definitions of change management and configuration management in IT. In this course, learn the differences between IT change management and configuration management, compare need to know and least privilege, and explore segregation of duties (SoD) and privileged account management (PAM). Next, learn about job rotation, service-level agreements (SLAs), and how to apply resource protection for media management. Finally, examine the processes of the incident management life cycle, including preparation, detection, response, mitigation, reporting, recovery, remediation, and lessons learned. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify how to perform configuration management operations
    Outline and participate in the change management processes
    Recognize the differences between need to know and least privilege
    Outline segregation of duties (sod) and responsibilities
    Describe privileged account management
    Outline what job rotation is
  • Identify service-level agreements (sla) concepts
    Recognize how to apply resource protection for media management
    List details of the preparation, detection, and response incident management life cycle processes
    Identify the key concepts of the mitigation and reporting incident management life cycle processes
    Describe the functions of the recovery and remediation incident management life cycle processes
    Outline the key concepts of the lessons learned incident management life cycle process
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 46s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 4m 17s
    Upon completion of this video, you will be able to identify how to perform configuration management operations. FREE ACCESS
  • Locked
    3.  The Change Management Practice
    3m 57s
    After completing this video, you will be able to outline and participate in the change management processes. FREE ACCESS
  • Locked
    4.  Need to Know vs. Least Privilege
    2m 21s
    Through this video, you will be able to recognize the differences between need to know and least privilege. FREE ACCESS
  • Locked
    5.  Segregation of Duties (SoD) and Responsibilities
    3m 10s
    In this video, we will outline segregation of duties (SoD) and responsibilities. FREE ACCESS
  • Locked
    6.  Privileged Account Management (PAM)
    3m 32s
    Upon completion of this video, you will be able to describe privileged account management. FREE ACCESS
  • Locked
    7.  Job Rotation
    1m 30s
    After completing this video, you will be able to outline what job rotation is. FREE ACCESS
  • Locked
    8.  Service-level Agreements (SLA)
    3m 14s
    In this video, we will identify service-level agreements (SLA) concepts. FREE ACCESS
  • Locked
    9.  Resource Protection
    2m 9s
    Through this video, you will be able to recognize how to apply resource protection for media management. FREE ACCESS
  • Locked
    10.  Incident Management Preparation, Detection, and Response
    5m 48s
    Upon completion of this video, you will be able to list details of the preparation, detection, and response incident management life cycle processes. FREE ACCESS
  • Locked
    11.  Incident Management Mitigation and Reporting
    1m 57s
    In this video, we will identify the key concepts of the mitigation and reporting incident management life cycle processes. FREE ACCESS
  • Locked
    12.  Incident Management Recovery and Remediation
    1m 32s
    Through this video, you will be able to describe the functions of the recovery and remediation incident management life cycle processes. FREE ACCESS
  • Locked
    13.  Incident Management Lessons Learned
    1m 16s
    After completing this video, you will be able to outline the key concepts of the lessons learned incident management life cycle process. FREE ACCESS
  • Locked
    14.  Course Summary
    32s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.9 of 15 users Rating 4.9 of 15 users (15)
Rating 4.8 of 8 users Rating 4.8 of 8 users (8)
Rating 4.9 of 7 users Rating 4.9 of 7 users (7)