Video description
Security Operations and Administration
Shon Harris
The fast, powerful way to prepare for your SSCP exam!
Get all the hands-on training you need to pass (ISC)²’s tough
SSCP exam, get certified, and move forward in your IT security
career! In this online video, the world’s #1 information security
trainer walks you through every skill and concept you’ll need to
master. This online video contains over four and a half hours of
training adapted from Shon Harris’s legendary five-day SSCP boot
camps–including realistic labs, scenarios, case studies, and
animations designed to build and test your knowledge in real-world
settings!
Comprehensive coverage of SSCP domains of knowledge:
. Security
Definitions
. Common Open
Standards
. Backups
. Remote
Access
. Support
Systems
. Common
Criteria
About the Shon Harris Security Series
This online video is part of a complete library of books,
online services, and videos designed to help security professionals
enhance their skills and prepare for their certification exams.
Every product in this series reflects Shon Harris’s unsurpassed
experience in teaching IT security professionals.
Category: Security
System Requirements
OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4
(Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card
with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more
Table of Contents
Course Introduction
00:17:17
Domain 2 - Security Operations and Administration
00:01:41
Mainframe Days
00:00:50
In the Good Old Days - Who Knew?
00:02:27
Today’s Environment
00:01:36
Security Definitions
00:01:15
Vulnerabilities
00:00:46
Examples of Some Vulnerabilities that Are Not Always Obvious
00:02:10
Risk - What Does It Really Mean?
00:02:10
Relationships
00:02:02
Who Deals with Risk?
00:01:18
Overall Business Risk
00:01:30
Who?
00:00:44
AIC Triad
00:00:48
Availability
00:00:51
Integrity
00:01:06
Confidentiality
00:00:48
Who Is Watching?
00:02:05
Social Engineering
00:04:06
What Security People Are Really Thinking
00:01:14
Security Concepts
00:01:00
Security?
00:04:57
The Bad Guys Are Motivated
00:02:38
Open Standards
00:00:14
Common Open Standards
00:01:42
Without Standards
00:01:04
Soft Controls
00:04:42
Holistic Security
00:00:41
Not Always So Easy
00:00:40
What Is First?
00:02:17
Different Types of Law
00:03:22
How Is Liability Determined?
00:01:22
Examples of Due Diligence
00:02:01
Prudent Person Rule
00:02:31
Prudent Person
00:00:19
Components of Security Program
00:00:49
A Layered Approach
00:01:22
In Security, You Never Want Any Surprises
00:00:52
Building Foundation (1)
00:00:46
Security Roadmap
00:03:30
Functional and Assurance Requirements
00:00:56
Building Foundation (2)
00:01:27
Most Organizations
00:02:47
Silo Security Structure
00:01:22
Islands of Security Needs and Tools
00:00:33
Get Out of a Silo Approach
00:01:38
Approach to Security Management
00:01:05
Result of Battling Management
00:00:27
Industry Best Practices Standards
00:01:12
ISO/IEC 17799
00:01:12
Numbering
00:01:11
New ISO Standards
00:01:27
COBIT
00:01:14
COBIT - Control Objectives
00:01:38
Information Technology Infrastructure Library
00:01:54
Security Governance
00:05:00
Security Program Components
00:00:28
Policy Framework
00:01:04
Organizational Policy
00:00:54
Policy Approved - Now What?
00:00:52
Issue-Specific Policies
00:00:45
System-Specific Policies
00:01:38
Standards
00:02:14
Baseline (1)
00:01:18
Data Collection for Metrics (1)
00:01:16
Guidelines
00:00:34
Procedures
00:00:36
Tying Them Together
00:01:17
Program Support
00:00:42
Senior Management’s Role
00:01:05
Security Roles
00:04:07
Information Classification
00:00:55
Data Leakage
00:00:45
Do You Want to End Up in the News?
00:00:53
Types of Classification Levels
00:00:47
Data Protection Levels
00:00:53
Classification Program Steps
00:02:02
Information Classification Components
00:01:03
Classification Levels
00:00:40
Information Classification Criteria
00:01:14
Criteria Example
00:00:34
Or Not
00:00:45
Information Owner Requirements
00:00:50
Clearly Labeled
00:01:01
Testing Classification Program
00:00:59
Employee Management
00:01:13
Employee Position and Management
00:00:47
Hiring and Firing Issues
00:04:49
Security Awareness and Training
00:01:52
Training Characteristics
00:00:34
Awareness
00:00:39
Security Enforcement Issues
00:00:53
Computer Operations
00:00:57
What Do We Have?
00:00:46
Hardware Protection
00:01:01
ITIL - Problem Management
00:01:35
Problem Management Procedures for Processing Problems
00:01:26
Data Output Controls
00:00:21
Administrative Controls Personnel Controls
00:03:02
Security Operations Personnel
00:01:09
Change Control
00:00:55
Another Example
00:00:45
Agenda 1
00:00:58
Library Maintenance
00:01:06
Media Labels
00:00:30
Media Controls
00:00:50
Software Escrow
00:01:22
Media Reuse
00:02:47
Zeroization
00:02:01
Physical Destruction
00:00:45
Why Not Just Delete the Files?
00:01:46
Mainframes
00:00:59
Agenda 2
00:00:38
HSM
00:01:08
Off-Line
00:00:08
Backup Types
00:01:08
Incremental Backup
00:01:15
Incremental
00:02:35
Differential Backup
00:02:02
Backup Protection
00:01:16
Agenda 3
00:01:17
Mean Time Between Failure
00:00:59
Single Point of Failure
00:03:22
Mirroring Data
00:00:43
Disk Duplexing
00:00:43
Redundant Array of Independent Disks
00:05:37
Massive Array of Inactive Disks (MAID)
00:00:50
Redundant Array of Independent Tapes (RAIT)
00:00:34
Serial Advanced Technology Architecture
00:00:50
SAN
00:01:13
Fault Tolerance
00:02:05
Redundancy Mechanism
00:01:13
Backup Configuration Files
00:01:18
Trusted Recovery of Software
00:01:10
After System Crash
00:00:51
Security Concerns
00:01:32
Agenda 4
00:00:04
Contingency Planning
00:01:19
Agenda 5
00:03:20
Remote Access
00:01:31
Administering Systems Remotely
00:01:36
Facsimile Security
00:01:32
Support Systems
00:01:24
Configuration Management (2)
00:02:24
Change Control Roles in CM
00:03:02
Configuration Management Plan
00:01:19
Change Control-Security Environment
00:01:21
Process of Change Management
00:01:34
Baseline (2)
00:01:25
Risk-based Cost Effective Controls
00:02:44
Software Programming
00:00:31
Security Considered at Each Phase
00:04:24
Waterfall Model
00:01:41
WaterFall Stages
00:01:20
Requirement Analysis
00:01:16
Design
00:01:02
Development
00:02:07
Verification
00:01:45
Operation and Maintenance
00:02:28
Iterative Development Model
00:02:33
Exploratory Model
00:02:29
Rapid Application Development (RAD) Model
00:01:39
Spiral Model
00:04:33
Reuse Model
00:01:35
Computer Aided Software Engineering Model (CASE)
00:05:08
Extreme Programming
00:01:54
Trusted Computer System Evaluation Criteria (TCSEC)
00:01:10
TCSEC
00:00:40
TCSEC Rating Breakdown
00:01:58
Evaluation Criteria - ITSEC
00:01:21
ITSEC Ratings
00:01:12
Common Criteria
00:00:27
Security Functional Requirements
00:00:46
Common Criteria Components
00:02:03
Common Criteria Requirements
00:00:40
Common Criteria Outline
00:01:09
Certification versus Accreditation
00:00:38
Security Levels
00:01:01
Modes of Operation
00:03:13
MAC Modes (Cont.)
00:00:40
Sets of Ethics
00:03:26
Computer Ethics Institute
00:00:36
Internet Architecture Board
00:02:04
Domain 2 Review
00:01:43