To understand the different mechanisms used to identify different types of attack and their effects, and protect system resources, e-mail and Internet communication to ensure operations security; to prepare candidates for one of the ten knowledge domains assessed in (ISC)2's CISSP certification exam
- Operations Security Overview - recognize the activities involved in securing the operations of an enterprise and identify the technologies used to maintain network and resource availability.
- Network Violations - identify the effects of various hardware and software violations on the system, and recognize how different types of operational and life-cycle assurance are used to secure operations.
- Analyzing Violations - determine the effects of different attacks on the network and identify the consequences of those effects.
- Auditing and Monitoring - recognize how different auditing and monitoring techniques are used to identify and protect against system and network attacks.
- Protecting Resources and Securing E-mail - recognize the need for resource protection, distinguish between e-mail protocols, and identify different types of e-mail vulnerability.
- The World Wide Web and File Transfer Protection - identify basic mechanisms and security issues associated with the Web, and recognize different technologies for transferring and sharing files over the Internet.
- Attack Framework and Separation of Duties - recognize key reconnaissance attack methods and identify different types of administrative management and media storage control.
- Separation of Duties and Responsibilities - identify the appropriate security measures and controls for creating a more secure workspace in given scenarios.
Mid-level and senior-level managers who are working toward or have already attained positions as CISOs, CSOs or Senior Security Engineers