Introduction
Security operations and administration
()
What you need to know
()
1. The Security Triad
The goals of information security
()
Confidentiality
()
Integrity
()
Availability
()
2. Security Principles
Privacy compliance
()
Need to know and least privilege
()
Separation of duties and responsibilities
()
Accountability
()
Employee privacy
()
3. Resource Security
Physical asset management
()
Change and configuration management
()
Software licensing
()
4. Data Security
Understanding data security
()
Data security policies
()
Data security roles
()
Data privacy
()
Limiting data collection
()
5. Data Security Controls
File permissions
()
Developing security baselines
()
Leveraging industry standards
()
Customizing security standards
()
Data encryption
()
Cloud storage security
()
Information classification
()
6. Security Controls
Security control selection and implementation
()
Control frameworks
()
7. Assessing Security Controls
Collect security process data
()
Management review
()
Security metrics
()
Audits and assessments
()
Control management
()
8. Security Policy
Security policy framework
()
Security policies
()
9. Awareness and Training
Security policy training and procedures
()
Compliance training
()
User habits
()
User-based threats
()
Measuring compliance and security posture
()
Awareness program reviews
()
10. Physical Security
Site and facility design
()
Data center environmental controls
()
Data center environmental protection
()
Physical security control types
()
Physical access control
()
Visitor management
()