CyberSecurity

Analyze Test Output and Generate a Report

2020-07-15T12:31:30+00:00Tags: , , , , , , , , , , , , , , , , , , |

Analyze Test Output and Generate a Report Security experts must be able to analyze log and test data, and report this information in meaningful ways, to senior management teams so they are alert of possible risks or harm, and make informed security decisions. Organizations usually have different levels of management. Security professionals need to [...]

Conduct Security Control Testing- Part 2

2020-07-15T12:45:53+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Conduct Security Control Testing- Part 2 This page is dedicated to continuing the Conduct Security Control Testing title. In this part of this tutorial, we'll take a look at control testing to help you understand the different aspects of control testing. You can see the previous section here. Log Reviews Reviewing various security logs [...]

Conduct Security Control Testing- Part 1

2020-07-15T12:43:43+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Conduct Security Control Testing- Part 1 One of the most important topics in CISSP course is conduct security control testing. In this part of this tutorial, we'll take a look at control testing to help you understand the different aspects of control testing. Security control testing employs various tools and techniques, including vulnerability assessments, [...]

Manage the Identity and Access Provisioning Lifecycle

2020-07-16T06:41:38+00:00Tags: , , , , , , , , , , , , |

Manage the Identity and Access Provisioning Lifecycle The life cycle consists of the assignment of privileges through roles and designation. The following design, a typical identity and provisioning life cycle consists of these steps: Enrolment of user or create user Determining roles, privileges, and access requirements to systems and applications Provisioning user accounts to [...]

Manage Identification and Authentication

2020-07-16T06:39:28+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Manage Identification and Authentication of People, Devices, and Services In this part of this tutorial, we'll take a look at Manage Identification and Authentication of People, Devices, and Services to help you understand the different aspects of authentication. Identity Management Implementation The core activity within identity and access management (IAM) is the management of [...]

Control Physical and Logical Access to Assets

2020-07-16T06:04:46+00:00Tags: , , , , , , , , , , , , , , , , , |

Control Physical and Logical Access to Assets Controlling access to assets is one of the central approaches to security. In this section; an asset includes information, systems, devices, and facilities. Systems An organization’s systems include any IT systems, which provide one or more services. Like a SQL Server, a FTP server, a Domain Controller, [...]

Secure Communication Channels

2020-07-16T07:09:00+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Secure Communication Channels This section focuses on securing data in motion. Such as voice, e-mail, web, fax, remote access and virtualized networks. One of the important topics in CISSP course is secure communication channels. So, in this part of this tutorial, we'll take a look at secure communication to help you understand the different [...]

Secure Network Components

2020-07-16T07:11:17+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Secure Network Components Network equipment must be securely operated and maintained. In this part of this tutorial, we'll take a look at secure networks to help you understand the different aspects of secure network components. You as a CISSP candidate need to understand security fundamentals and concepts specifically related to different types of network [...]

Go to Top