CompTIA CASP CAS-002: Privacy Policies & Procedures and Incident Recovery New Horizons Lebanon
Price: TBA
  • Duration: 2 Hours

Course details

  • Creating strong privacy polices and procedures will aid in securing organizational assets. If an event does occur, it is important to have proper procedures in place to make sure that recovery occurs as quickly and as efficiently as possible. In this course, you'll learn about the policies, procedures, and business documents that are used when creating a secure network environment. You will also examine the incident response and recovery procedures that are used when security breaches occur. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
  • start the course
  • identify policies, processes, and procedures for change used to secure a network environment
  • identify legal compliance and advocacy issues associated with securing a network environment
  • identify RA, SOA, and BIA when creating a secure network environment
  • identify IA, ISA, MOU, and SLA when creating a secure network environment
  • identify OLA, NDA, and BPA when creating a secure network environment
  • identify privacy principles and PII when creating a secure network environment
  • identify how to use user policies when creating a secure network environment
  • identify incident response and forensic tasks when creating a secure network environment
  • identify how to properly use training and awareness
  • identify how auditing and continuous monitoring can be used when securing a network environment.
  • identify how data retention, legal holds, and data recovery are used when securing a network environment
  • identify how asset control and data ownership and handling affect network security
  • identify detection and collection methods used when creating network security
  • identify mitigation techniques used when securing a network environment
  • identify data recovery and reconstitution techniques used when securing a network environment
  • identify response and disclosure procedures used when securing a network environment
  • define how internal and external violations affect network security
  • define how system, audit, and review logs can be used to aid in securing a network environment
  • define how and why a chain of custody procedure is critical when dealing with network security breaches
  • define how forens
Updated on 08 November, 2015

About New Horizons Lebanon

As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. With over 300 centers in 60 countries, New Horizons is the world’s largest independent IT and Business training company. Over the past 35 years, New Horizons has delivered a full range of IT and business skills/Management training through innovative learning methods that have transformed businesses and helped over 35 million students reach their goals. New Horizons Lebanon branch was established in 1996.

See all New Horizons Lebanon courses
Courses you can instantly connect with... Do an online course on CompTIA starting now. See all courses

Is this the right course for you?

Didn't find what you were looking for ?

or