Certified Information Systems Security Professional, Part 8 of 9: Incident Management
with expert Kevin Henry
Course description
This course covers incident management, types of laws and computer crimes and how to handle evidence, physical security and how to integrate with information security. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional or CISSP.
Prerequisites
This series assumes a good understanding of enterprise networking and networking security. This is part 8 of a 9 part series.
Learning Paths
This course will help you prepare for the following certification and exam:
Certified Information Systems Security Professional
Meet the expert
Kevin is an international author, consultant and international
speaker. He is the official course development writer for ISC2 CISSP, ISACA CRISC and mile2’s C)ISSO. Kevin has been educating IT professionals for over 30 years. He also provides cyber security consulting and support services for organizations around the world. Assisting them with setting up Information Security programs and addressing areas ranging from in-depth risk analysis to policy creation and security awareness.
speaker. He is the official course development writer for ISC2 CISSP, ISACA CRISC and mile2’s C)ISSO. Kevin has been educating IT professionals for over 30 years. He also provides cyber security consulting and support services for organizations around the world. Assisting them with setting up Information Security programs and addressing areas ranging from in-depth risk analysis to policy creation and security awareness.
Course outline
Incident Management, Law, and Physical Security
Incident Management (10:59)
- Introduction (00:04)
- Seriousness of Computer Crimes (00:55)
- Incidents (01:06)
- Incident Management Priorities (01:18)
- Incident Response Capability (01:22)
- Incident Management Requires (01:27)
- Preparing for a Crime Before It Happens (02:01)
- Incident Response Phases (02:35)
- Summary (00:08)
Law (13:40)
- Introduction (00:05)
- Types of Law (03:00)
- Foundational Concepts of Law (01:05)
- Common Laws: Criminal (00:57)
- Common Laws: Civil (01:06)
- Common Laws: Administrative (00:53)
- Intellectual Property Laws (04:00)
- Software Licensing (02:22)
- Summary (00:08)
Computer Crime (17:57)
- Introduction (00:26)
- Historic Examples of Computer Crimes (02:12)
- Who Perpetrates These Crimes (01:53)
- Types of Motivation for Attacks (02:55)
- Telephone Fraud (01:04)
- Identification Protection and Prosecution (01:02)
- Computer Crime and Its Barriers (01:55)
- Countries Working Together (01:12)
- Security Principles for International Use (01:07)
- Determine if a Crime Has Been Committed (01:08)
- When Should Law Enforcement Get Involved (01:05)
- Citizen vs. Law Enforcement Investigation (00:38)
- Investigation of Any Crime (01:04)
- Summary (00:08)
Evidence Handling (24:04)
- Introduction (00:06)
- Role of Evidence in a Trial (01:38)
- General Rules for Evidence (00:47)
- Evidence Requirements (01:19)
- Evidence Collection Topics (00:49)
- Chain of Custody and Evidence Processing (02:15)
- Evidence Types (03:47)
- Hearsay Rule Exception (00:24)
- Privacy of Sensitive Data (00:53)
- Privacy Issues: US Laws as Examples (00:27)
- European Union Principles on Privacy (01:35)
- Employee Privacy Issues (01:35)
- Computer Forensics (01:27)
- Trying to Trap the Bad Guy (01:22)
- Companies Can Be Found Liable (01:52)
- Sets of Ethics (01:16)
- Ethics (02:03)
- Summary (00:13)
- Summary (00:08)
Physical Security (38:26)
- Introduction (00:28)
- Physical Security (00:52)
- Physical Security: Threats (01:08)
- Different Types of Threats and Planning (00:22)
- Facility Site Selection (03:30)
- Devices Will Fail (01:36)
- Controlling Access (01:58)
- External Boundary Protection (01:02)
- Lock Types (00:55)
- Facility Access and Piggybacking (01:10)
- Securing Mobile Devices (00:39)
- Entrance Protection (00:58)
- Perimeter Protection (02:31)
- Perimeter Security (01:44)
- Types of Physical IDS (02:00)
- Sensors (01:00)
- Facility Attributes (01:32)
- Electrical Power (00:52)
- Problems with Steady Power Current (01:12)
- Power Interference And Preventative Measures (01:42)
- Environmental Considerations (00:48)
- Fire Prevention (01:36)
- Fire Detection (02:55)
- Fire Types (01:37)
- Supression Methods (01:02)
- Fire Extinguishers (02:52)
- Summary (00:13)