Video Description

Let's review what we covered in Module 07 on security operations: - Incident response and restoring applications - Forensics - Evidence collection - Admissibility issues - Types of evidence and the stages of evidence gathering and anlysis - Fault tolerance and recovery strategies - RAID and clustering We note that though business continuity is an integral part of fault tolerance and recovery, that it was covered previously in Module 01.

Course Modules

ISC2 CISSP - Archive