O'Reilly logo

CISSP Exam Cram, Third Edition by Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Security Operations

Techniques you’ll need to master

Identifying attack methodologies

Creating policies needed for administrative control

Applying techniques used to remove residual data

Understanding backup and recovery

Performing security assessments and penetration tests

Implementing operational security

Auditing and monitoring

Introduction

Readers preparing for the ISC2 Certified Information Systems Security Professional ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required