MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

SSCP®: Monitoring and Analysis & Risk, Response and Recovery

Course Summary

Part 3 of 5 in the Systems Security Certified Practitioner (SSCP®) series. This series will prepare you for the Systems Security Certified Practitioner (SSCP®) certification. Learn about cool topics like access controls, security operations, security ad


  • +

    Course Syllabus

    ● Continuous Monitoring
        ◦ Introduction
        ◦ Intrusion Detection vs. Intrusion Prevention
        ◦ Network Intrusion Detection Systems (NIDS)
        ◦ Kinds of IDS/Intrusion Prevention System (IPS)
        ◦ IDS Weaknesses
        ◦ Honeypots
    ● Analysis of Monitoring Results
        ◦ Reporting
        ◦ Monitoring and Analyzing Logs
        ◦ Log Types
        ◦ Log Management
        ◦ Monitoring Software
        ◦ Examining Log Files
        ◦ Examining Performance Logs
    ● Risk Management Process
        ◦ Risk Management Terms
        ◦ Step 1: Asset Identification
        ◦ Step 2: Threat and Vulnerability Assessment
        ◦ Step 3: Risk Calculation
        ◦ Risk Calculation Equation
        ◦ Annualized Loss Expectancy Example
        ◦ Step 4: Mitigation and Deterrence
        ◦ Control Types
        ◦ Step 5: Evaluation
    ● Security Assessment Activities
        ◦ Introduction
        ◦ Security Assessment Process: Project Initiation
        ◦ Security Assessment Process: Information Discovery
        ◦ Security Assessment Process: Risk Identification
        ◦ Security Assessment Process: Vulnerability Scan
        ◦ Security Assessment Process: Data Analysis
        ◦ Data Analysis with Nessus
        ◦ Security Assessment Process: Report and Briefing
    ● Incident Handling Analysis
        ◦ Incident Handling
        ◦ Damage and Loss Control
        ◦ Phase 1: Identify and Report
        ◦ Phase 2: Investigate
        ◦ Analyzing the Running System
        ◦ Capturing System State
        ◦ Chain of Custody
        ◦ Basic Forensic Procedures
        ◦ Phase 3: Resolve/Recover
        ◦ Recovering the System with Confidence
        ◦ Other Recovery Methods
        ◦ Phase 4: Debrief
    ● Business Continuity Plan
        ◦ Introduction
        ◦ Business Continuity vs. Disaster Recovery
        ◦ Priorities
        ◦ The BCP Cycle
        ◦ Business Impact Analysis (BIA)
        ◦ IT Contingency Planning
        ◦ Typical Recovery Plan for Failed IT Services
        ◦ Succession Planning
        ◦ BCP Test Types
        ◦ BCP Tips
    ● Disaster Recovery Plan (DRP)
        ◦ Introduction
        ◦ Recovering Power
        ◦ Recovering Facilities
        ◦ Recovering Internet Access
        ◦ Recovering Hosted/Cloud Services
        ◦ Backup and Recovery
        ◦ Recovering Incremental and Differential
        ◦ Backup Locations
        ◦ Backup vs. Backout
        ◦ Backup Tips
        ◦ High Availability (HA)
        ◦ RAID (Redundant Array of Independent Disks)
        ◦ Load Balancing/Server Farms
        ◦ Server Clusters
        ◦ Redundant Networking

     


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top