RedVector
RVLS-2803
CISSP: 21 - Security Operations
Course Objectives
Upon successful completion of this course, you will be able to:
- explain the secure operations found in the CISSP objectives 7.5 and 7.8 through 7.10
- monitor security operations as well as implement firewalls, anti-malware, intrusion detection and intrusion prevention operations along with whitelisting, blacklisting, and sandboxing
- describe honeypots and honeynets, patch management, vulnerability management, and change management