2 hours 38 minutes

Video Description

Let's review what we covered in Module 07 on security operations: - Incident response and restoring applications - Forensics - Evidence collection - Admissibility issues - Types of evidence and the stages of evidence gathering and anlysis - Fault tolerance and recovery strategies - RAID and clustering We note that though business continuity is an integral part of fault tolerance and recovery, that it was covered previously in Module 01.

Up Next

Security Operations

They are responsible for knowing where a network's possible vulnerabilities are and providing mitigation strategies to combat them. An effective Cyber Security Operations Manager will have experience in a technical security role including ...

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor