CISSP 2013 Domain: Operations Security New Horizons Jordan
Price: TBA
  • Duration: 3 Hours

Course details

In today's enterprise environment, security operations takes on many faces, but always comes back to making sure that all aspects of the operation of an enterprise environment are secured and functioning correctly. This course delves into the mechanisms used to track security threats, resource protection, and securing the enterprise environment. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.

  • recognize the activities involved in securing the operations of an enterprise
  • classify audit measures as either internal or external
  • identify the technologies used to maintain resource availability
  • match the attack type to their potential effects
  • recognize different approaches to securing operations
  • identify how audit trails can be used in operations security
  • differentiate between monitoring tools and techniques
  • define a strategy for securing and maintaining resources for a given scenario
  • secure enterprise operations against network violations for a given scenario
  • identify approaches to examining operations security
  • identify the reasons for resource protection
  • distinguish between e-mail protocols
  • recognize different types of e-mail vulnerability
  • recognize security issues associated with the web interfacing
  • identify the characteristics of technologies for transferring and sharing files over the Internet
  • match the reconnaissance methods to their descriptions
  • identify the key considerations involved in implementing administrative controls
  • specify how to secure media and media storage devices
  • specify the reasons resource and e-mail should be secure
  • propose safer file sharing practices for a given scenario
  • determine how to secure media in a given scenario
Updated on 19 February, 2018

About New Horizons Jordan

As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. For 30 years, New Horizons has provided more than 30 million students with industry-leading technical training that delivers the most relevant and intuitive computer ctheirses and certifications. they’re now the world’s largest independent IT training company, and they continue to lead:
  • 300 computer training centers in 70 countries (and counting)
  • Largest Guaranteed-to-Run ctheirse schedule in the world
  • Ranked in the top 5% of the industry for training quality and customer satisfaction
  • Official training partner for technology leaders such as Microsoft, Cisco, CompTIA and VMware
  • Microsoft’s largest training provider, delivering more than 40% of all authorized Microsoft training worldwide
  • World’s largest Cisco-authorized training partner
See all New Horizons Jordan courses
Are you from New Horizons Jordan ? Claim your course!
Courses you can instantly connect with... Do an online course on CISSP starting now. See all courses

Is this the right course for you?

Didn't find what you were looking for ?

or