Video Description

We begin this next Operations Security lesson with a discussion on Trusted Recover. You'll learn the difference between a system reboot, system emergency restart, & a system cold start and what happens within each of these events & why. You'll also learn what configurations must be in order to prepare the system for a system failure and recovery event, and why the failure of a system cannot be used to breach security. We discuss Media Management with examples of security breaches and what preventive security measures should employed. We also introduce the basics of Identity and Access Management, how it is not a single, point to point action but a board, ongoing cross set of rights, privileges and authentication processes. We also look at how business must now reaching beyond its own boundaries to partner with outside entities for security access controls and authentication.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring