Overview/Description
Creating strong privacy policies and procedures will aid in securing organizational assets. If an event does occur, it is important to have proper procedures in place to make sure that recovery occurs as quickly and as efficiently as possible. In this course, you'll learn about the policies, procedures, and business documents that are used when creating a secure network environment. You will also examine the incident response and recovery procedures that are used when security breaches occur. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
Target Audience
Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments
CompTIA CASP CAS-002: Privacy Policies & Procedures and Incident Recovery
start the course
identify policies, processes, and procedures for change used to secure a network environment
identify legal compliance and advocacy issues associated with securing a network environment
identify RA, SOA, and BIA when creating a secure network environment
identify IA, ISA, MOU, and SLA when creating a secure network environment
identify OLA, NDA, and BPA when creating a secure network environment
identify privacy principles and PII when creating a secure network environment
identify how to use user policies when creating a secure network environment
identify incident response and forensic tasks when creating a secure network environment
identify how to properly use training and awareness
identify how auditing and continuous monitoring can be used when securing a network environment.
identify how data retention, legal holds, and data recovery are used when securing a network environment
identify how asset control and data ownership and handling affect network security
identify detection and collection methods used when creating network security
identify mitigation techniques used when securing a network environment
identify data recovery and reconstitution techniques used when securing a network environment
identify response and disclosure procedures used when securing a network environment
define how internal and external violations affect network security
define how system, audit, and review logs can be used to aid in securing a network environment
define how and why a chain of custody procedure is critical when dealing with network security breaches
define how forensic analysis is used on compromised systems in order to deal with security breaches
define the importance of having a continuity of operations plan in place in the event that security incidents occur
define how the order of volatility will allow you to recover from security incidents
to compare and contrast security, privacy policies, and procedures based on organizational requirements and conduct incident response and recovery procedures