From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Secure operations
From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Secure operations
- Welcome back to Cybrary's ISSEP course. I'm your instructor, Brad Rhodes. Let's jump into secure operations. So in this video, we're going to talk about the infamous or the famous IAAA, which we'll get to in a second. We'll talk about policy standards, procedures, and guidelines, paperwork, everybody's absolute favorite thing. Then we're going to talk about a couple of technologies that we see in secure operations, DLP, data loss prevention, and ZTA, zero trust architecture. So one of the things we do in secure operations is make sure the right people, so this is the people side of things, can actually get onto the systems they need to and get access to the things they need to. And so we do that via the IAAA process. That's identification, proving who you are. That's authentication, that's passwords, multi-factor authentication, et cetera, right? When then we do authorizations? And that's where you hear terms like mandatory access control, discretionary access control. Do you have…
Contents
-
-
-
-
-
-
-
Objectives and introduction to operations2m 58s
-
(Locked)
Secure operations3m 44s
-
(Locked)
Continuous monitoring5m 36s
-
(Locked)
Secure maintenance & supply chain7m 7s
-
(Locked)
Incident response3m 59s
-
(Locked)
Change management5m 18s
-
(Locked)
Disposal strategies4m 19s
-
(Locked)
Decommissioning and disposal processes4m 32s
-
(Locked)
Module summary3m 14s
-
-
-
-
-