Security Operations: Provision, Baseline, and Monitor for CISSP®

This course will teach you the essential skills and knowledge required to manage an information security program. This includes the monitoring of controls and engineering an effective response to incidents.
Course info
Level
Intermediate
Updated
May 7, 2021
Duration
1h 47m
Table of contents
Description
Course info
Level
Intermediate
Updated
May 7, 2021
Duration
1h 47m
Description

As an information security professional, skills in effective incident response and control monitoring will serve you well. In this course, Security Operations: Provision, Baseline and Monitor for CISSP®, you’ll learn to manage and lead an information security program. First, you’ll explore monitoring of security controls and networks. Next, you’ll discover change control and configuration management. Finally, you’ll learn how to monitor third-party relationships. When you’re finished with this course, you’ll have the skills and knowledge of security operations needed for the CISSP examination.

About the author
About the author

Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.

More from the author
Security Operations: Respond for CISSP®
Intermediate
2h 16m
May 7, 2021
More courses by Kevin Henry
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Kevin Henry, a security consultant and computer analyst, programmer, and a holder of the CISSP, the Certified Information Systems Security Professional certification. I look forward to sharing knowledge and experiences with you. Welcome to my course on Security Operations: Provision, Baseline, and Monitor for the CISSP. This course will help you understand the principles of managing a security operations department and assist you in preparing for the exam. Some of the major topics we'll cover include system and network monitoring, configuration management, and product acquisition and implementation. And to follow along with this course, be sure to download the study guide from the course exercises section. By the end of this course, you'll be prepared to progress into the next area of the CISSP, Security Operations: Respond. I hope you'll join me on this journey to learn about security operations and the role you can play in this exciting and rewarding field through this course at Pluralsight.