O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CISSP Video Course Domain 10 – Operations Security

Video Description

The fast, powerful way to prepare for your CISSP exam!

30+ hours of personal video training from leading security expert Shon Harris

Achieving the (ISC)2’s globally recognized CISSP can give your IT career a lift. In this DVD, the world’s #1 CISSP trainer brings her legendary five-day boot camp to your computer screen. Packed with over 30 hours of instruction adapted from Shon’s classes, this video course includes realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-word settings. Preparing for the CISSP has never been this easy or convenient.

Master the skills and concepts you need for all ten CISSP common body of knowledge domains:

  • Access Control

  • Application Security

  • Business Continuity and Disaster Recovery Planning

  • Cryptography

  • Information Security and Risk Management

  • Legal, Regulations, Compliance, and Investigations

  • Operations Security

  • Physical (Environmental) Security

  • Security Architecture and Design

  • Telecommunications and Network Security

  • System Requirements

    OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
    MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
    COMPUTER: 500MHz or higher CPU; 128MB RAM or more

    Table of Contents

    1. Course Introduction 00:07:24
    2. Domain 10 – Operations Security 00:02:02
    3. Computer Operations 00:04:19
    4. Problem Management Procedures for Processing Problems 00:01:11
    5. Higher Level Look 00:00:36
    6. Administrative Controls Personnel Controls 00:05:50
    7. Resource Protection 00:02:03
    8. Media Labels and Controls 00:01:19
    9. Software Escrow 00:01:22
    10. Media Reuse 00:05:33
    11. Why Not Just Delete the Files? 00:02:57
    12. Backups 00:01:42
    13. Backup Types 00:01:08
    14. Incremental Backup 00:01:15
    15. Incremental 00:02:35
    16. Differential Backup 00:03:19
    17. Mean Time Between Failure 00:01:37
    18. Mean Time to Repair 00:01:30
    19. Redundant and Fault Tolerance 00:02:32
    20. Mirroring Data 00:00:59
    21. Direct Access Storage Device 00:07:27
    22. Serial Advanced Technology Architecture 00:00:50
    23. SAN 00:01:13
    24. Fault Tolerance 00:02:05
    25. Redundancy Mechanism 00:01:40
    26. Some Threats to Computer Operations 00:00:51
    27. Trusted Recovery of Software 00:01:10
    28. After System Crash 00:00:51
    29. Security Concerns 00:01:32
    30. Contingency Planning 00:01:23
    31. Remote Access Security 00:09:23
    32. Before Carrying Out Vulnerability Testing 00:00:58
    33. Testing for Vulnerabilities 00:01:20
    34. Security Testing Issues 00:02:07
    35. Vulnerability Scanning 00:01:42
    36. Data Leakage – Keystroke Logging 00:00:58
    37. Password Cracking 00:02:10
    38. War Dialing 00:02:16
    39. War Driving 00:03:26
    40. Penetration Testing 00:10:05
    41. Post-Testing and Assessment Steps 00:02:14
    42. Penetration Testing Variations 00:00:55
    43. Types of Testing 00:01:17
    44. Protection Mechanism – Honeypot 00:01:49
    45. Log Reviews 00:01:00
    46. Domain 10 Review 00:07:06
    47. Course Closure 00:24:37