Security School

CISSP Essentials training: Domain 10, Operations Security

  The operations department has responsibilities that pertain to everything that takes place to keep a network, computer system, applications and environment up and running in a secure and protected manner. After the network is setup is when operations kicks in, which includes the continual day-to-day maintenance of an environment. These activities are routine in nature and enable the environment, systems and applications to continue to run correctly and securely.

    Requires Free Membership to View

 

In this CISSP Essentials Security School lesson, Domain 10, Operations Security, expert CISSP exam trainer Shon Harris details the process of understanding enterprise security operations from a competitor's/enemy's/hacker's viewpoint and then developing and applying countermeasures to mitigate identified threats. A company cannot provide any level of protection for itself unless it is providing the necessary operation security methodologies, technologies and procedures.

Before viewing the Domain 10, Operations Security video below, it's recommended that students first read the Domain 10 spotlight article, which provides an overview of the concepts presented in the video, including operations responsibilities, operations personnel, configuration management, media access protection, system recovery, facsimile security, vulnerability and penetration testing and, finally, attack types.

Branded with TT Charcoal & Teal. Related link and Similar Video filmstrip included.

After watching the video, test your comprehension of this material with our Domain 10, Operations Security quiz. Upon completion, return to the CISSP Essentials Security School table of contents to select your next lesson.

About Shon Harris:
Shon Harris is a CISSP, MCSE and President of Logical Security, a firm specializing in security educational and training tools. Logical Security offers curriculum, virtual labs, instructor slides and tools for lease by training companies, security companies, military organizations, government sectors and corporations.

Shon is also a security consultant, an engineer in the Air Force's Information Warfare unit, an entrepreneur and an author. She has authored two best selling CISSP books, including CISSP All-in-One Exam Guide, and was a contributing author to the book Hacker's Challenge. Shon is currently finishing her newest book, Gray Hat Hacking: The Ethical Hacker's Handbook.

CISSP® is a registered certification mark of the International Information Systems Security Certification Consortium, Inc., also known as ISC(2).


This was first published in September 2008

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: