Chapter 11. Security Operations
Terms you’ll need to understand
Techniques you’ll need to master
✓ Identifying attack methodologies
✓ Creating policies needed for administrative control
✓ Applying techniques used to remove residual data
✓ Understanding backup and recovery
✓ Performing security assessments and penetration tests
✓ Implementing operational security
✓ Auditing and monitoring
Introduction
Readers preparing for the ISC2 Certified Information Systems Security Professional ...
Get CISSP Exam Cram, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.