Security+ Certification - Operational Security Domain
4.3 (5 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
79 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Security+ Certification - Operational Security Domain to your Wishlist.

Add to Wishlist

Security+ Certification - Operational Security Domain

Pass the 'Compliance and Operational Security' section of the Security+ exam.
4.3 (5 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
79 students enrolled
Created by Chad Russell
Last updated 7/2017
English
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 3 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Pass the 'Compliance and Operational' Security Domain section of the Security+ exam and become a part of the growing Cyber Security industry.
  • Speak intelligently about 'Compliance and Operational Security' concepts and practices.
View Curriculum
Requirements
  • Internet connection
  • Active Udemy account
  • No special software is needed.
Description

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! 

The Security+ exam covers six domains and this course focuses on the second domain which is 'Compliance and Operational Security' domain.

  • Principles of security
  • HR and Personnel security
  • Data privacy
  • Risk management
  • Physical security
  • Environmental security
  • Data classification
  • Operational security
  • Incident response
  • Change management
  • Disaster recovery
  • Forensics

We will cover the foundational principles of information security which include confidentiality, integrity and availability.  We will also identify common security services and the mechanisms used to implement those services. 

People are arguably the most important link in the chain when it comes to security.   Making sure employees, contractors and business partners protect corporate data and that their privacy is protected as well is the responsibility of all involved.  This course will help you understand how to strengthen the people component of information security programs. 

Data Privacy is a key consideration for business as they leverage personal information for business purposes. I will show you data privacy regulations, threats and protection mechanisms. 

Risk Management is what fundamentally drives information security programs.  Learn how to measure, manage and validate information security risks.  Physical security measures may not be the most glamorous part of information security but they are an important component of the bigger picture.   Because if intruders have access to your HW it’s only a matter of time before they get access to the data that’s on it.   

A subcomponent of physical security involves the management of environmental controls.   In this section we will go over some of the best practices associated with some of these types of controls and how implementing them can enhance security by preserving CIA (Confidentiality, Integrity and Availability).  

Data classification is the process of organizing data into categories for its most effective and efficient use.   Learn how to effectively classify data and identify classification driven best practices controls.

Once we have a Risk Management program in place we need to implement operational security to manage the day to day aspects of security.  You will  learn about Operational Security Controls, what they consist of and how they help us to incrementally manage risk on a daily basis.You will learn how to formulate and execute an incident response plan which defines policies, in specific terms, which identify an incident and provide  step-by-step processes that should be followed when an incident occurs.

All IT environments require changes to be made on a fairly constant basis for the purpose of upkeep and enhancements.   After completing this lesson you will understand best practices for minimizing risk via configuration and change management.   

While at first glance DR might not seem like a natural fit with cybersecurity after further analysis we realize that disasters are threats that can inflict much more damage than any hacker.   Upon completing this lesson you will understand how to perform disaster recovery planning and design strategies for dealing with disasters. 

You will also learn how to conduct forensics investigations using digital forensics technologies and techniques in this lesson.


Who is the target audience?
  • This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!
Students Who Viewed This Course Also Viewed
Curriculum For This Course
18 Lectures
02:50:18
+
Security Principles and Risk Management
5 Lectures 37:49


Risk Management
17:37

Change Management
04:39

Hands-On Vulnerability Scanning with GFI Languard
01:51
+
Data Security
3 Lectures 42:48
Data Classification
14:20

Data Privacy
25:43

Hands-On Privacy with Tor
02:45
+
Physical and Personnel Security
4 Lectures 36:56
Physical Security
08:05

Environmental Security
04:58

HR and Personnel Security
10:50

Hands-On Windows Desktop Security
13:03
+
Security Operations
6 Lectures 52:45
Operational Security
07:56

Incident Response
09:18

Forensics
14:00

Disaster Recovery
09:40

Hands-On Disaster Recovery Planning
09:54

About the Instructor
Chad Russell
3.7 Average rating
998 Reviews
16,753 Students
24 Courses
Join the Cyber Security Industry in 2016!

Instructor Bio – Chad Russell

Join the Cyber Security Industry in 2017!

If you are interested in starting a career in the Cyber Security Industry 2016 is the time! 

Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills.  Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.   

Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.  

Get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself.  This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT. 

About me:

Hello, I’m Chad Russell.  I’ve been in the CyberSecurity industry for over 15 years.  I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.   

I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.  

Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College  I can help you get certified and get ahead!