7: Security Operations
Introduction & Concepts
CISSP Domain 7: Security Operations 7.1 Understand and Comply with Investigations 7.2 Conduct...
Access Management and Operational Controls
Limiting Access & Damage Apply the Need-to-Know & Least Privilege theory: Limit access to dat...
Configuration and Vulnerability Management
Configuration & Change Management Helps in preventing incidents and outages. Configuratio...
Intrusion Detection and Response
Intrusion Systems Intrusion Detection System (IDS) Response Mechanism Passive Response: Logs...
Monitoring and Auditing
Log Files & Monitoring Log Files Purpose: Record data in databases or files. Types: Authen...
Computer Crime and Investigations
Computer Crime in the Context of CISSP CISSP mainly focuses on US law. A computer crime is a vi...
BCP & DRP
Difference between BCP and DRP BCP (Business Continuity Planning): Focuses on the whole bu...