Learn your way! Get started

Certified Information Systems Security Professional, Part 8 of 9: Incident Management

with expert Kevin Henry


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 3/22/2018
Level Advanced
Runtime 1h 45m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

This course covers incident management, types of laws and computer crimes and how to handle evidence, physical security and how to integrate with information security. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional or CISSP.

Prerequisites

This series assumes a good understanding of enterprise networking and networking security. This is part 8 of a 9 part series.

Learning Paths

This course will help you prepare for the following certification and exam:
Certified Information Systems Security Professional

Meet the expert

Kevin is an international author, consultant and international
speaker. He is the official course development writer for ISC2 CISSP, ISACA CRISC and mile2’s C)ISSO. Kevin has been educating IT professionals for over 30 years. He also provides cyber security consulting and support services for organizations around the world. Assisting them with setting up Information Security programs and addressing areas ranging from in-depth risk analysis to policy creation and security awareness.

Course outline



Incident Management, Law, and Physical Security

Incident Management (10:59)
  • Introduction (00:04)
  • Seriousness of Computer Crimes (00:55)
  • Incidents (01:06)
  • Incident Management Priorities (01:18)
  • Incident Response Capability (01:22)
  • Incident Management Requires (01:27)
  • Preparing for a Crime Before It Happens (02:01)
  • Incident Response Phases (02:35)
  • Summary (00:08)
Law (13:40)
  • Introduction (00:05)
  • Types of Law (03:00)
  • Foundational Concepts of Law (01:05)
  • Common Laws: Criminal (00:57)
  • Common Laws: Civil (01:06)
  • Common Laws: Administrative (00:53)
  • Intellectual Property Laws (04:00)
  • Software Licensing (02:22)
  • Summary (00:08)
Computer Crime (17:57)
  • Introduction (00:26)
  • Historic Examples of Computer Crimes (02:12)
  • Who Perpetrates These Crimes (01:53)
  • Types of Motivation for Attacks (02:55)
  • Telephone Fraud (01:04)
  • Identification Protection and Prosecution (01:02)
  • Computer Crime and Its Barriers (01:55)
  • Countries Working Together (01:12)
  • Security Principles for International Use (01:07)
  • Determine if a Crime Has Been Committed (01:08)
  • When Should Law Enforcement Get Involved (01:05)
  • Citizen vs. Law Enforcement Investigation (00:38)
  • Investigation of Any Crime (01:04)
  • Summary (00:08)
Evidence Handling (24:04)
  • Introduction (00:06)
  • Role of Evidence in a Trial (01:38)
  • General Rules for Evidence (00:47)
  • Evidence Requirements (01:19)
  • Evidence Collection Topics (00:49)
  • Chain of Custody and Evidence Processing (02:15)
  • Evidence Types (03:47)
  • Hearsay Rule Exception (00:24)
  • Privacy of Sensitive Data (00:53)
  • Privacy Issues: US Laws as Examples (00:27)
  • European Union Principles on Privacy (01:35)
  • Employee Privacy Issues (01:35)
  • Computer Forensics (01:27)
  • Trying to Trap the Bad Guy (01:22)
  • Companies Can Be Found Liable (01:52)
  • Sets of Ethics (01:16)
  • Ethics (02:03)
  • Summary (00:13)
  • Summary (00:08)
Physical Security (38:26)
  • Introduction (00:28)
  • Physical Security (00:52)
  • Physical Security: Threats (01:08)
  • Different Types of Threats and Planning (00:22)
  • Facility Site Selection (03:30)
  • Devices Will Fail (01:36)
  • Controlling Access (01:58)
  • External Boundary Protection (01:02)
  • Lock Types (00:55)
  • Facility Access and Piggybacking (01:10)
  • Securing Mobile Devices (00:39)
  • Entrance Protection (00:58)
  • Perimeter Protection (02:31)
  • Perimeter Security (01:44)
  • Types of Physical IDS (02:00)
  • Sensors (01:00)
  • Facility Attributes (01:32)
  • Electrical Power (00:52)
  • Problems with Steady Power Current (01:12)
  • Power Interference And Preventative Measures (01:42)
  • Environmental Considerations (00:48)
  • Fire Prevention (01:36)
  • Fire Detection (02:55)
  • Fire Types (01:37)
  • Supression Methods (01:02)
  • Fire Extinguishers (02:52)
  • Summary (00:13)