This course will teach you the essential skills and knowledge required to manage an information security program. This includes the monitoring of controls and engineering an effective response to incidents.
As an information security professional, skills in effective incident response and control monitoring will serve you well. In this course, Security Operations: Provision, Baseline and Monitor for CISSP®, you’ll learn to manage and lead an information security program. First, you’ll explore monitoring of security controls and networks. Next, you’ll discover change control and configuration management. Finally, you’ll learn how to monitor third-party relationships. When you’re finished with this course, you’ll have the skills and knowledge of security operations needed for the CISSP examination.
Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.
Course Overview Hi everyone. My name is Kevin Henry, a security consultant and computer analyst, programmer, and a holder of the CISSP, the Certified Information Systems Security Professional certification. I look forward to sharing knowledge and experiences with you. Welcome to my course on Security Operations: Provision, Baseline, and Monitor for the CISSP. This course will help you understand the principles of managing a security operations department and assist you in preparing for the exam. Some of the major topics we'll cover include system and network monitoring, configuration management, and product acquisition and implementation. And to follow along with this course, be sure to download the study guide from the course exercises section. By the end of this course, you'll be prepared to progress into the next area of the CISSP, Security Operations: Respond. I hope you'll join me on this journey to learn about security operations and the role you can play in this exciting and rewarding field through this course at Pluralsight.