From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Module summary

Module summary

- [Brad] Welcome back to Cybrary ISSEP course. I'm your instructor, Brad Rhodes. Let's jump into our module summary for lesson six, domain five, the last domain in ISSEP. Here's what we're going to cover in this lesson. We're going to review the module, so we're going to look at all the secure operations, disposal, decommissioning stuff that we talked about. And then we're going to do a real quick wrap up of the entirety of the ISSEP domains, because we're at the end of our run through the ISSEP domains, the five of them. So in this module we reviewed secure operations. We talked about what that is, people, process, technology. We talked about CONMON. Continuous monitoring is where you got to monitor all of the controls, whether they're technical, non-technical, preventive, detective, whatever. All of that is something that we do frequently all the time. We talked about secure maintenance and the supply chain. And in the supply chain, we realized that if we can't see very far down the…

Contents