Your browser does not support this video.
Certified Information Systems Security Professional, Part 3 of 9: Cryptography and Operations
with Kevin Henry
Operations security is where all the theory and policies are put into action. Topics in this course will include administration responsibilities, redundancy and fault tolerance, and threats to operations. Also, an overview of cryptography and how it can be used in something like access will be discussed. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional (CISSP).Course Outline