From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Module summary
From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Module summary
- [Brad] Welcome back to Cybrary ISSEP course. I'm your instructor, Brad Rhodes. Let's jump into our module summary for lesson six, domain five, the last domain in ISSEP. Here's what we're going to cover in this lesson. We're going to review the module, so we're going to look at all the secure operations, disposal, decommissioning stuff that we talked about. And then we're going to do a real quick wrap up of the entirety of the ISSEP domains, because we're at the end of our run through the ISSEP domains, the five of them. So in this module we reviewed secure operations. We talked about what that is, people, process, technology. We talked about CONMON. Continuous monitoring is where you got to monitor all of the controls, whether they're technical, non-technical, preventive, detective, whatever. All of that is something that we do frequently all the time. We talked about secure maintenance and the supply chain. And in the supply chain, we realized that if we can't see very far down the…
Contents
-
-
-
-
-
-
-
Objectives and introduction to operations2m 58s
-
(Locked)
Secure operations3m 44s
-
(Locked)
Continuous monitoring5m 36s
-
(Locked)
Secure maintenance & supply chain7m 7s
-
(Locked)
Incident response3m 59s
-
(Locked)
Change management5m 18s
-
(Locked)
Disposal strategies4m 19s
-
(Locked)
Decommissioning and disposal processes4m 32s
-
(Locked)
Module summary3m 14s
-
-
-
-
-