Overview/Description
Security professionals are required to anticipate, plan for, respond to, and recover from security incidents quickly and appropriately as part of security operations for the overall organization. In this course, you'll learn how to develop and implement recovery strategies, including specific strategies for backup storage, recovery sites, multiple processing sites, and system resilience and fault tolerance requirements. This course also covers best practices for disaster recovery activities, including response, personnel, communications, assessment, restoration, and training and awareness considerations. Finally, you'll learn about organizational safety measures such as business continuity planning, managing physical security of the premises, and addressing personnel safety concerns like employee monitoring and privacy policies. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Target Audience
Individuals interested in information systems security concepts, methodologies and best practices; candidates for the Certified Information Systems Security Professional (CISSP) exam
identify best practices for developing a recovery strategy
distinguish between backup storage options
distinguish between recovery site options
identify characteristics of multiple processing sites
identify best practices for ensuring system resilience and fault tolerance
identify the role of disaster recovery in security operations
identify best practices for ensuring adequate response during disaster recovery activities
identify best practices for ensuring adequate personnel practices during disaster recovery activities
identify best practices for ensuring adequate communications during disaster recovery activities
identify best practices for ensuring appropriate event assessment during disaster recovery activities
identify best practices for ensuring restoration during disaster recovery activities
identify best practices for incorporating disaster recovery training and awareness in security operations
identify best practices when performing a recovery plan read-through
identify best practices for performing recovery plan walkthroughs
identify best practices for performing a parallel test of a recovery plan
identify best practices for performing full-interruption testing of a recovery plan
describe characteristics of contingency planning
identify the key responsibilities of the EMO management team
describe the role of physical protection programs in operational security
identify the critical building components that should be physically located away from main entrances, vehicular circulation, parking, and maintenance areas
identify appropriate perimeter security controls
identify appropriate internal security measures
identify best practices for incorporating monitoring and privacy considerations in security policies
identify travel security best practices to incorporate in security policies
describe challenges and best practices for incorporating duress considerations in security policies
identify best practices for planning and implementing organizational security policies and physical controls