Security Operations 1 Day

Although the security architect or engineer helps set security standards and policies, operations security is the actual process for implementing, maintaining, and monitoring safeguards and controls on a daily basis to prevent security incidents. Organizations can use numerous safeguards and controls to secure their operations.

Through this course the learner will be able to identify the controls over hardware, media and the operators with access privileges to any of these resources.

1. Resource Protection
2. Incident Response
3. Attack Prevention and Response
4. Patch and Vulnerability Management

Course Content

The Role of the Operations


Department Administrative Management


Assurance Levels


Operational Responsibility


Vulnerability Testing


Configuration Management


Media Controls


Data Leakage


Network and Resource Availability


Mainframes


E-mail Security


and more...

1. Anyone who is required to develop a broad and deep knowledge and understanding of operations security

2. IT consultants, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, security engineers

3. Security professionals whose positions require CISSP certification.

1. Course helps learners to know the resources that must be protected, the privileges that must be restricted, the control mechanisms available, the potential for abuse of access, the appropriate controls, and the principles of good practice.

2. Employing tools, technologies and activities to enhance a practical understanding of operations security that includes administrative management responsibilities.

3. Reinforcing key areas of the (ISC)2® CBK® through practice questions and review sessions

4. Strategically focus your preparation for CISSP Certification

5. Develop operational security and continuity through preventive and recovery mechanisms