-
Course
- Security
Security Operations
Security operations is the heartbeat of Information Security Management. This course will teach you the value of managing an operations team and ensuring the ongoing value of the Information Security Management System.
What you'll learn
All the elements of a security program come down to the need to have a secure operations process. In this course, Security Operations, you will explore the core requirements of implementing the processes to manage an operational security team. First, you will learn about operations functions, then about incident management and business continuity. Next, you will discover change management and secure configurations. Finally, you will explore the topics of backups and media management. By the end of this course, you will have the knowledge needed to implement an information security management program and to be a skilled information security manager.
Table of contents
- Administration of Secure Information Systems: Part One | 7m 40s
- Administration of Secure Information Systems: Part Two | 7m 45s
- Security Operations Center: Part One | 9m 23s
- Security Operations Center: Part Two | 8m 14s
- Security Operations Center: Part Three | 5m 38s
- Incident Management: Part One | 5m 28s
- Incident Management: Part Two | 4m 35s
- BCP/DRP: Part One | 6m 53s
- BCP/DRP: Part Two | 6m 1s
- BCP/DRP: Part Three | 5m 51s
About the author
Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.
More Courses by Kevin