SSCP Video Course Domain 3 - Risk, Response and Recovery

Video description

Risk, Response and Recovery

Shon Harris

The fast, powerful way to prepare for your SSCP exam!

Get all the hands-on training you need to pass (ISC)²’s tough SSCP exam, get certified, and move forward in your IT security career! In this online video, the world’s #1 information security trainer walks you through every skill and concept you’ll need to master. This online video contains almost six hours of training adapted from Shon Harris’s legendary five-day SSCP boot camps–including realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-world settings!

Comprehensive coverage of SSCP domains of knowledge:

     .    Risk Management

     .    Project Sizing

     .    Potential Disasters

     .    Equipment Replacement

     .    Computer Forensics

     .    Network Monitoring

About the Shon Harris Security Series

This online video is part of a complete library of books, online services, and videos designed to help security professionals enhance their skills and prepare for their certification exams. Every product in this series reflects Shon Harris’s unsurpassed experience in teaching IT security professionals.

Category: Security

System Requirements

OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more

Table of contents

  1. Course Introduction 00:17:17
  2. Domain 3 - Risk, Response and Recovery 00:01:00
  3. Risk Management 00:00:56
  4. Why Is Risk Management Difficult? 00:01:24
  5. Necessary Level of Protection Is Different for Each Organization 00:00:56
  6. Security Team/Committee 00:01:42
  7. Risk Management Process 00:00:44
  8. Analysis Paralysis 00:00:51
  9. Planning Stage - Scope 00:02:04
  10. Planning Stage - Analysis Method 00:01:01
  11. Risk Management Tools 00:01:50
  12. Defining Acceptable Levels 00:02:24
  13. Acceptable Risk Level 00:00:52
  14. Collecting and Analyzing Data Methods 00:01:04
  15. What Is a Company Asset? 00:00:48
  16. Data Collection - Identify Assets 00:01:01
  17. Data Collection - Assigning Values 00:01:34
  18. Asset Value 00:01:03
  19. Data Collection - Identify Threats 00:01:20
  20. Data Collection - Calculate Risks 00:01:38
  21. Scenario Based - Qualitative 00:00:43
  22. Risk Approach (1) 00:00:40
  23. Qualitative Analysis Steps 00:00:56
  24. Want Real Answers? 00:00:53
  25. Qualitative Risk Analysis Ratings 00:01:21
  26. Quantitative Analysis (1) 00:01:19
  27. How Often Will This Happen? 00:00:37
  28. ARO Values and Their Meaning 00:06:51
  29. ALE Calculation 00:00:56
  30. Can a Purely Quantitative Analysis Be Accomplished? 00:01:25
  31. Risk Types 00:00:39
  32. Examples of Types of Losses 00:00:35
  33. Delayed Loss 00:00:50
  34. Cost/Benefit Analysis 00:00:58
  35. Cost of a Countermeasure 00:01:21
  36. Cost/Benefit Analysis Countermeasure Criteria 00:02:55
  37. Calculating Cost/Benefit 00:01:01
  38. Controls 00:00:30
  39. Control Selection Requirements 00:01:31
  40. Quantitative Analysis (2) 00:01:39
  41. Qualitative Analysis Approach 00:00:30
  42. Qualitative Analysis Disadvantages 00:00:49
  43. Can You Get Rid of All Risk? 00:00:21
  44. Calculating Residual Risk 00:02:13
  45. Uncertainty Analysis 00:01:11
  46. Dealing with Risk 00:01:20
  47. Management's Response to Identified Risks 00:01:51
  48. Risk Acceptance 00:01:42
  49. Risk Analysis Process Summary 00:01:08
  50. Needs for BCP 00:00:38
  51. Is Your Organization Prepared? 00:02:33
  52. Is Your Company Prepared? 00:00:38
  53. 9/11 Changed Mentalities About BCP 00:00:55
  54. Disaster Affected Many 00:00:42
  55. America Is Rebuilding 00:00:36
  56. Partial FEMA Disaster List for 2005 00:00:53
  57. Do We Have a Plan? 00:02:15
  58. What Is the Purpose of a BCP? 00:02:26
  59. More Reasons to Have Plans in Place 00:02:02
  60. Framework 00:00:39
  61. BCP Is a Core Component of Every Security Program 00:01:01
  62. Steps of BCP Process 00:01:56
  63. Different BCP Model 00:01:15
  64. Documentation 00:01:08
  65. BCP Policy Outlines 00:01:43
  66. Who Is In Charge and Who Can We Blame? 00:01:52
  67. What's Needed In a Team? 00:00:51
  68. BCP Development Team 00:01:31
  69. Project Sizing 00:01:44
  70. Properly Determining Scope Is Important 00:00:50
  71. BCP Risk Analysis Steps 00:02:11
  72. BIA Steps 00:01:28
  73. Information from Different Sources 00:01:18
  74. Analysis 00:01:09
  75. Critical Functions 00:03:08
  76. Interdependencies 00:00:45
  77. Well, Of Course an Organization Knows How It Works! 00:00:54
  78. Business Silos 00:02:16
  79. BIA Steps (Cont.) 00:02:26
  80. Who Connects to Who? 00:00:38
  81. BIA Steps (Cont.) 00:02:00
  82. MTD 00:00:31
  83. Example 00:01:52
  84. MTD Definitions 00:01:15
  85. BIA Steps (Cont.) 00:02:54
  86. Thinking Outside of the Box What If.. 00:00:55
  87. Biological Threats 00:00:46
  88. BIA Steps (Cont.) 00:00:56
  89. Potential Disasters 00:02:26
  90. Risk Approach (2) 00:00:42
  91. Ranking by Risk Level 00:01:02
  92. Potential Losses 00:01:14
  93. Include All RISK Components 00:03:00
  94. BIA Steps (Cont.) 00:01:27
  95. Alternate Business Process Procedures 00:02:36
  96. Business Process Reconstruction 00:02:03
  97. Facility Recovery 00:00:38
  98. Facility Backups - Hot Site 00:00:52
  99. Facility Backups - Warm Site 00:00:58
  100. Facility Backups - Cold Site 00:00:43
  101. Compatibility Issues with Offsite Facility 00:02:04
  102. Tertiary Sites 00:00:56
  103. Subscription Costs 00:02:17
  104. Multiple Processing Centers 00:00:51
  105. Location, Location, Location 00:01:08
  106. Other Offsite Approaches 00:01:51
  107. Security Does Not Stop 00:01:12
  108. More Options 00:02:01
  109. Rolling Hot Site 00:00:58
  110. Recovery Strategies (Cont.) 00:00:41
  111. Supply and Technology Recovery 00:01:44
  112. VoIP 00:01:07
  113. Equipment Replacement 00:03:23
  114. What Items Need to Be Considered? 00:01:31
  115. Priorities 00:00:09
  116. Anything Else? 00:00:42
  117. Replacements 00:01:43
  118. Recovery Strategies (Cont.) 00:03:14
  119. Co-Location 00:00:51
  120. Data Recovery 00:01:52
  121. Backup Redundancy 00:01:52
  122. Recovering Data 00:00:41
  123. Automated Backup Technologies 00:02:04
  124. Tape Vaulting 00:01:59
  125. Data Recovery (Cont.) 00:00:41
  126. Clustering for Fault Tolerance 00:01:30
  127. Disk or Database Shadowing 00:01:27
  128. Which Option to Use 00:00:31
  129. Cost Effective Measures 00:01:14
  130. Resources, Time, Solutions 00:00:46
  131. Determining Recovery Solutions 00:01:31
  132. Cost and Recovery Times 00:00:54
  133. Proactive 00:01:10
  134. Recovery Solutions 00:00:48
  135. Preventative Measures 00:01:18
  136. Reviewing Insurance 00:00:50
  137. Results from the BIA 00:01:12
  138. Now Ready to Develop the Plan 00:01:50
  139. Products That Can Help 00:01:05
  140. Plan Components 00:01:39
  141. External Groups 00:01:25
  142. Policy Components 00:00:43
  143. Damage Assessment 00:01:39
  144. Notifying Personnel 00:01:16
  145. Plan Activation 00:00:42
  146. Emergency Response 00:00:47
  147. Policy Components (Cont.) 00:00:35
  148. Recovery Procedures 00:00:45
  149. Documentation of Recovery Steps 00:01:12
  150. Policy Components (Cont.) 00:02:41
  151. Returning to Original Facility 00:01:09
  152. Disaster Hit - Now What? 00:01:05
  153. Termination of BCP 00:01:05
  154. Life Cycle 00:00:48
  155. Who Has the Plan? 00:00:51
  156. Results 00:00:32
  157. Types of Tests to Choose From 00:03:49
  158. Test Objectives 00:01:02
  159. Training Requirements 00:01:22
  160. Lessons Learned 00:00:36
  161. What Is Success? 00:00:51
  162. Out of Date? 00:01:01
  163. Keeping It Current 00:00:52
  164. Change Control 00:00:58
  165. Resulting Plan Should Contain.. 00:01:24
  166. Phases of the BCP 00:00:54
  167. Agenda 2 00:02:43
  168. Countries Working Together 00:01:00
  169. Security Principles for International Use 00:00:39
  170. Determine If a Crime Has Indeed Been Committed 00:00:49
  171. Bringing In Law Enforcement 00:01:41
  172. Citizen versus Law Enforcement Investigation 00:01:50
  173. Role of Evidence In a Trial 00:00:34
  174. Evidence Requirements 00:00:37
  175. Chain of Custody (1) 00:00:59
  176. How Is Evidence Processed? 00:01:19
  177. Hearsay Evidence 00:01:07
  178. Agenda 3 00:02:17
  179. Evidence Collection Topics 00:01:57
  180. Computer Forensics 00:02:08
  181. Hidden Secrets 00:05:26
  182. Trying to Trap the Bad Guy 00:04:09
  183. Companies Can Be Found Liable 00:03:06
  184. Why Incident Response? 00:02:41
  185. Incident Response Alarms 00:01:37
  186. Threats 00:00:45
  187. Incident Response Framework 00:05:04
  188. Preparation and Planning 00:02:29
  189. IRT - Incident Response Team 00:03:55
  190. Incident Response Team - Mission 00:02:03
  191. Incident Response Team - Objectives 00:04:49
  192. Incident Response Team - Priorities 00:02:14
  193. Incident Response Team - Liaisons 00:05:28
  194. Detection 00:01:29
  195. Chain of Custody (2) 00:01:34
  196. Poking into Network Traffic 00:01:01
  197. Snort 00:02:13
  198. Containment 00:01:00
  199. Containment - Some Considerations 00:02:45
  200. Notification 00:02:18
  201. Investigation 00:01:42
  202. Rules of Evidence 00:02:08
  203. Acceptable Evidence 00:02:18
  204. Exclusionary Rules 00:00:55
  205. Evidence Recognition 00:00:53
  206. Evidence Discovery 00:01:46
  207. Search and Seizure 00:02:01
  208. Network Monitoring 00:04:48
  209. Reviewing System Logs 00:01:52
  210. Interviewing 00:01:16
  211. Terminating the Investigation 00:01:21
  212. Recovery 00:00:56
  213. Response 00:01:18
  214. Follow-Up 00:03:33
  215. Electronic Forensic 00:01:57
  216. Media Analysis Procedures 00:00:44
  217. Media Analysis - IACIS Framework 00:02:53
  218. Step 1 - Sterile Media 00:00:57
  219. Step 2 - Legal Software 00:01:00
  220. Step 3 - Physical Examination of the Evidence 00:01:51
  221. Step 4 - Avoid Altering the Evidence 00:02:29
  222. Step 5 - Capture Date/Time and CMOS (RTC/NVRAM) Information 00:01:56
  223. Step 6 - Create an Exact Image 00:00:56
  224. Step 7 - Logically Examine the Image 00:01:54
  225. Step 8 - Examine the Boot Record Data and User-Defined Files 00:01:05
  226. Step 9 - Recover and Examine All Deleted Files 00:01:36
  227. Step 10 - Create a Listing of All Files 00:01:05
  228. Step 11 - Examine Unallocated Space for Lost or Hidden Data 00:00:56
  229. Step 12 - Examine File Slack 00:02:51
  230. Step 13 - Examine All User Created Files 00:02:20
  231. Step 14 - Unlock and Examine Password-Protected Files 00:01:14
  232. Step 15 - Create Printouts of All of the Apparent Evidence 00:01:41
  233. Step 16 - Examine Executable Files and Run Applications 00:01:32
  234. Step 17 - Write the Forensic Analysis Report 00:01:30
  235. Domain 3 Review 00:02:28

Product information

  • Title: SSCP Video Course Domain 3 - Risk, Response and Recovery
  • Author(s):
  • Release date: May 2009
  • Publisher(s): Pearson
  • ISBN: 9780789741899