CISSP-Course

Home/Tag: CISSP-Course

Participate in Business Continuity Planning (BCP) and Exercises

2020-07-16T07:33:26+00:00Tags: , , , , , , , , , , , |

Participate in Business Continuity Planning (BCP) and Exercises Business continuity focuses on a business operating with minimal or no downtime. At result, It also includes disaster recovery. We can say that business continuity is a strategy while disaster recovery is a tactic. In this section of this tutorial, we'll take a look at business [...]

Test Disaster Recovery Plans

2020-07-15T12:18:34+00:00Tags: , , , , , , , , , , , , , , , |

Test Disaster Recovery Plans (DRP) In this section of this tutorial, we'll take a look at test disaster recovery plans (DRP) to help you understand the different aspects of test disaster recovery plans (DRP). Testing the disaster recovery plans is an effective way to assure the company is ready for a real disaster. There [...]

Implement Disaster Recovery Processes

2020-07-15T12:07:22+00:00Tags: , , , , , , , , , , , , , , |

Implement Disaster Recovery (DR) Processes The general process of disaster recovery include: Responding to the disruption Activation of the recovery team Ongoing tactical communication Assessment of the damage Recovery of critical assets and processes Response The first thing to consider when an incident occurs is whether the disaster recovery process is needed. If the [...]

System Resilience, High Availability, QoS, and Fault Tolerance

2020-07-15T12:16:02+00:00Tags: , , , , , , , , , , , , |

System Resilience, High Availability, QoS, and Fault Tolerance In this part of this tutorial, we'll take a look at System Resilience, High Availability, QoS, and Fault Tolerance to help you understand the different aspects of these concepts. As a CISSP candidate, it is important to be able to differentiate between these concepts: System Resilience: [...]

Implement Recovery Strategies

2020-07-15T12:09:43+00:00Tags: , , , , , , , , , , , , , , , , , , , , |

Implement Recovery Strategies Recovery strategies are important because they have a big impact on how long the organization will be down or have a degraded environment. Backup Storage Strategies In order to cover all reasonable scenarios, backup storage strategies often involve the following: 1- Secure offsite storage: Store backup media at a remote location. [...]

Understand and Participate in Change Management Processes

2020-07-16T08:15:19+00:00Tags: , , , , , , , , , , |

Understand and Participate in Change Management Processes In this part of this tutorial, we'll take a look at change management processes to help you understand the different aspects of change management processes. System, network, and application always require changes. A system that does not change will become less secure over time, as security updates [...]

Implement and Support Patch and Vulnerability Management

2020-06-24T05:28:17+00:00Tags: , , , , , , , , , , , , , , |

Implement and Support Patch and Vulnerability Management Patch and vulnerability management is the process of regularly assessing, testing, installing and verifying fixes and patches for software bugs and flaws as they are discovered. Some of software bugs and flaws are security vulnerabilities that could permit an attacker to control a target system and at result [...]

Operate and Maintain Detective and Preventative Measures

2020-07-15T12:11:44+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , |

Operate and Maintain Detective and Preventative Measures These days, one of the most important aspects of cyber security is operate and maintain detective and also preventative measures. In this part of this tutorial, we'll take a look at operate and maintain detective and also preventative measures to help you understand the different aspects of [...]

Conduct Incident Management

2020-07-15T11:59:03+00:00Tags: , , , , , , , , , , , , , , |

Conduct Incident Management In this section, we will discuss about the management of incidents that are potentially damaging to an organization. All incident management models have some common basic characteristics: They all require to identify the event They analyze event to determine the appropriate counteractions They correct the problems They attempt to prevent event [...]

Go to Top