Certified Information Systems Security Professional, Part 8 of 9: Incident Management and Physical Sec
Interactive

Certified Information Systems Security Professional, Part 8 of 9: Incident Management and Physical Sec

LearnNow Online
Updated Aug 21, 2018

Course description

This course covers incident management, types of laws and computer crimes and how to handle evidence, physical security and how to integrate with information security. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional or CISSP.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

This series assumes a good understanding of enterprise networking and networking security. This is part 8 of a 9 part series.


Meet the expert

Kevin Henry

Kevin is an international author, consultant and international
speaker. He is the official course development writer for ISC2 CISSP, ISACA CRISC and mile2’s C)ISSO. Kevin has been educating IT professionals for over 30 years. He also provides cyber security consulting and support services for organizations around the world. Assisting them with setting up Information Security programs and addressing areas ranging from in-depth risk analysis to policy creation and security awareness.

Video Runtime

105 Minutes

Time to complete

125 Minutes

Course Outline

Incident Management, Law, and Physical Security

Incident Management (10:59)

  • Introduction (00:04)
  • Seriousness of Computer Crimes (00:55)
  • Incidents (01:06)
  • Incident Management Priorities (01:18)
  • Incident Response Capability (01:22)
  • Incident Management Requires (01:27)
  • Preparing for a Crime Before It Happens (02:01)
  • Incident Response Phases (02:35)
  • Summary (00:08)

Law (13:40)

  • Introduction (00:05)
  • Types of Law (03:00)
  • Foundational Concepts of Law (01:05)
  • Common Laws: Criminal (00:57)
  • Common Laws: Civil (01:06)
  • Common Laws: Administrative (00:53)
  • Intellectual Property Laws (04:00)
  • Software Licensing (02:22)
  • Summary (00:08)

Computer Crime (17:57)

  • Introduction (00:26)
  • Historic Examples of Computer Crimes (02:12)
  • Who Perpetrates These Crimes (01:53)
  • Types of Motivation for Attacks (02:55)
  • Telephone Fraud (01:04)
  • Identification Protection and Prosecution (01:02)
  • Computer Crime and Its Barriers (01:55)
  • Countries Working Together (01:12)
  • Security Principles for International Use (01:07)
  • Determine if a Crime Has Been Committed (01:08)
  • When Should Law Enforcement Get Involved (01:05)
  • Citizen vs. Law Enforcement Investigation (00:38)
  • Investigation of Any Crime (01:04)
  • Summary (00:08)

Evidence Handling (24:04)

  • Introduction (00:06)
  • Role of Evidence in a Trial (01:38)
  • General Rules for Evidence (00:47)
  • Evidence Requirements (01:19)
  • Evidence Collection Topics (00:49)
  • Chain of Custody and Evidence Processing (02:15)
  • Evidence Types (03:47)
  • Hearsay Rule Exception (00:24)
  • Privacy of Sensitive Data (00:53)
  • Privacy Issues: US Laws as Examples (00:27)
  • European Union Principles on Privacy (01:35)
  • Employee Privacy Issues (01:35)
  • Computer Forensics (01:27)
  • Trying to Trap the Bad Guy (01:22)
  • Companies Can Be Found Liable (01:52)
  • Sets of Ethics (01:16)
  • Ethics (02:03)
  • Summary (00:13)
  • Summary (00:08)

Physical Security (38:26)

  • Introduction (00:28)
  • Physical Security (00:52)
  • Physical Security: Threats (01:08)
  • Different Types of Threats and Planning (00:22)
  • Facility Site Selection (03:30)
  • Devices Will Fail (01:36)
  • Controlling Access (01:58)
  • External Boundary Protection (01:02)
  • Lock Types (00:55)
  • Facility Access and Piggybacking (01:10)
  • Securing Mobile Devices (00:39)
  • Entrance Protection (00:58)
  • Perimeter Protection (02:31)
  • Perimeter Security (01:44)
  • Types of Physical IDS (02:00)
  • Sensors (01:00)
  • Facility Attributes (01:32)
  • Electrical Power (00:52)
  • Problems with Steady Power Current (01:12)
  • Power Interference And Preventative Measures (01:42)
  • Environmental Considerations (00:48)
  • Fire Prevention (01:36)
  • Fire Detection (02:55)
  • Fire Types (01:37)
  • Supression Methods (01:02)
  • Fire Extinguishers (02:52)
  • Summary (00:13)
;