CISSP Domain 7: Security operations

Last updated:February 2018

Editor's note

If there's one axiom that sums up a day in the life of an infosec professional, it might be this: Hope for the best, but prepare for the worst. Are barbarians at the gate -- or perimeter -- every day? Probably not, but the last thing you want to be is ill-equipped when, not if, they do show up. That's why it's imperative to have a broad and deep understanding of cybersecurity techniques and technologies for protecting assets, fending off attacks and recovering from any breaches. These topics are at the heart of the CISSP exam's Domain 7: Security Operations.

In this Security School, based on (ISC)² CISSP training material for Domain 7, learn about the various tools and best practices for building up your defenses, detecting suspicious behavior and responding to malicious activity. In his video, expert Adam Gordon provides a comprehensive look at intrusion detection and prevention systems and their complementary technologies. In addition, Gordon reviews cybersecurity techniques such as sandboxing, the use of honeypots and dynamic security application testing in his tip. 

Once you've reviewed the parts of this Security School on these essential cybersecurity techniques and tools, take the quiz to see how much you have learned about preventing unauthorized access, evading attackers, isolating infected resources and more.

CISSP® is a registered mark of (ISC)².

View our Security School Course Catalog to view more schools.

1Cybersecurity techniques and technologies to protect IT resources

Can't tell the difference between a sandbox and a honeypot? The following resources will familiarize you with these cybersecurity techniques and other foundations of security operations.

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close