PLU | Security Operations (2019 EN)

Discussion in 'Information Technology' started by Kanka, Jul 26, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,047
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Kevin Henry
    Full Title: Security Operations
    Year: 2019
    Language: English
    Genre: Educational: Security
    Skill Level: Intermediate
    Price: -
    -
    Files: MP4 (+ Slides .PDF)
    Time: 02:19:31
    Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 150 kbps
    Audio: AAC at 89 Kbps, 2 channels, 44.1 KHz



    Security operations is the heartbeat of Information Security Management. This course will teach you the value of managing an operations team and ensuring the ongoing value of the Information Security Management System.

    All the elements of a security program come down to the need to have a secure operations process. In this course, Security Operations, you will explore the core requirements of implementing the processes to manage an operational security team. First, you will learn about operations functions, then about incident management and business continuity. Next, you will discover change management and secure configurations. Finally, you will explore the topics of backups and media management. By the end of this course, you will have the knowledge needed to implement an information security management program and to be a skilled information security manager.


    Lessons:
    1. Course Overview
    01. Course Overview
    2. Administration of Secure Information Systems
    02. Administration of Secure Information Systems: Part One
    03. Administration of Secure Information Systems: Part Two
    04. Security Operations Center: Part One
    05. Security Operations Center: Part Two
    06. Security Operations Center: Part Three
    07. Incident Management: Part One
    08. Incident Management: Part Two
    09. BCP/DRP: Part One
    10. BCP/DRP: Part Two
    11. BCP/DRP: Part Three
    3. Change Control and Secure Configuration
    12. Change Control and Secure Configuration: Part One
    13. Change Control and Secure Configuration: Part Two
    14. Change Control: Part One
    15. Change Control: Part Two
    16. Monitoring: Part One
    17. Monitoring: Part Two
    4. Backup and Media Management
    18. Backup and Media Management: Part One
    19. Backup and Media Management: Part Two
    20. Backup and Media Management: Part Three
    21. Media Management


    -------------