O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CISSP Video Course Domain 8 – Business Continuity

Video Description

The fast, powerful way to prepare for your CISSP exam!

30+ hours of personal video training from leading security expert Shon Harris

Achieving the (ISC)2’s globally recognized CISSP can give your IT career a lift. In this DVD, the world’s #1 CISSP trainer brings her legendary five-day boot camp to your computer screen. Packed with over 30 hours of instruction adapted from Shon’s classes, this video course includes realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-word settings. Preparing for the CISSP has never been this easy or convenient.

Master the skills and concepts you need for all ten CISSP common body of knowledge domains:

  • Access Control

  • Application Security

  • Business Continuity and Disaster Recovery Planning

  • Cryptography

  • Information Security and Risk Management

  • Legal, Regulations, Compliance, and Investigations

  • Operations Security

  • Physical (Environmental) Security

  • Security Architecture and Design

  • Telecommunications and Network Security

  • System Requirements

    OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
    MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
    COMPUTER: 500MHz or higher CPU; 128MB RAM or more

    Table of Contents

    1. Course Introduction 00:07:24
    2. Domain 8 – Business Continuity 00:01:06
    3. Needs for BCP 00:03:49
    4. 9/11 Changed Mentalities About BCP 00:03:07
    5. Do We Have a Plan? 00:02:15
    6. What Is the Purpose of a BCP? 00:02:26
    7. More Reasons to Have Plans in Place 00:02:41
    8. BCP Is a Core Component of Every Security Program 00:01:01
    9. Steps of BCP Process 00:01:57
    10. Different BCP Model 00:01:15
    11. Documentation 00:01:08
    12. BCP Policy Outlines 00:01:43
    13. Who Is In Charge and Who Can We Blame? 00:01:52
    14. What's Needed In a Team? 00:00:51
    15. BCP Development Team 00:01:31
    16. Project Sizing 00:01:44
    17. Properly Determining Scope Is Important 00:00:50
    18. BCP Risk Analysis Steps 00:02:11
    19. BIA Steps 00:01:28
    20. Information from Different Sources 00:01:18
    21. Analysis 00:01:31
    22. How to Identify the Most Critical Company Functions 00:02:46
    23. Interdependencies 00:00:45
    24. Well, Of Course an Organization Knows How It Works! 00:00:54
    25. Business Silos 00:05:42
    26. Maximum Tolerable Downtime 00:05:30
    27. Range of Threats to Consider 00:02:42
    28. Thinking Outside of the Box What If… 00:00:55
    29. Biological Threats 00:00:46
    30. BIA Steps (Cont.) 00:00:56
    31. Potential Disasters 00:02:26
    32. Risk Approach 00:03:28
    33. What Have We Completed Up to Now? 00:02:39
    34. Recovery Strategies 00:01:17
    35. Alternate Business Process Procedures 00:02:36
    36. Business Process Reconstruction 00:01:46
    37. Recovery Strategies 00:00:55
    38. Facility Backups 00:02:33
    39. Compatibility Issues with Offsite Facility 00:02:04
    40. Tertiary Sites 00:00:56
    41. Subscription Costs 00:02:17
    42. Multiple Processing Centers 00:01:03
    43. Choosing Site Location 00:00:56
    44. Other Offsite Approaches 00:01:51
    45. Security Does Not Stop 00:01:12
    46. More Options 00:02:01
    47. Rolling Hot Site 00:00:58
    48. Recovery Strategies (Cont.) 00:00:41
    49. Supply and Technology Recovery 00:01:44
    50. VoIP 00:01:07
    51. Equipment Replacement 00:03:23
    52. What Items Need to Be Considered? 00:01:31
    53. Priorities 00:01:05
    54. Executive Succession Planning 00:01:29
    55. Recovery Strategies (Cont.) 00:03:14
    56. Co-Location 00:00:51
    57. Data Recovery 00:01:52
    58. Backup Redundancy 00:01:52
    59. Recovering Data 00:00:41
    60. Automated Backup Technologies 00:02:05
    61. Tape Vaulting 00:02:40
    62. Clustering for Fault Tolerance 00:01:30
    63. Disk or Database Shadowing 00:05:28
    64. Cost and Recovery Times 00:02:04
    65. Recovery Solutions 00:00:48
    66. Preventative Measures 00:01:18
    67. Reviewing Insurance 00:00:50
    68. Results from the BIA 00:01:42
    69. Basic Structure of BCP 00:04:04
    70. External Groups 00:01:29
    71. Activation Phase 00:07:51
    72. Reconstitution Phase 00:02:37
    73. Who Goes First? 00:00:56
    74. Disaster Hit – Now What? 00:01:05
    75. Termination of BCP 00:01:05
    76. Life Cycle 00:02:12
    77. Types of Tests to Choose From 00:03:49
    78. Test Objectives 00:01:02
    79. Training Requirements 00:01:58
    80. What Is Success? 00:00:51
    81. Out of Date? 00:01:01
    82. Keeping It Current 00:00:52
    83. Change Control 00:00:58
    84. Resulting Plan Should Contain 00:01:24
    85. Phases of the BCP 00:00:54
    86. Domain 8 Review 00:03:16