Chapter 11. Security Operations

Techniques you’ll need to master

Identifying attack methodologies

Creating policies needed for administrative control

Applying techniques used to remove residual data

Understanding backup and recovery

Performing security assessments and penetration tests

Implementing operational security

Auditing and monitoring

Introduction

Readers preparing for the ISC2 Certified Information Systems Security Professional ...

Get CISSP Exam Cram, Third Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.