Chapter 11. Security Operations

Techniques you’ll need to master

Identifying attack methodologies

Creating policies needed for administrative control

Applying techniques used to remove residual data

Understanding backup and recovery

Performing security assessments and penetration tests

Implementing operational security

Auditing and monitoring

Introduction

Readers preparing for the ISC2 Certified Information Systems Security Professional ...

Get CISSP Exam Cram, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.