CISSP – Security Operations – Domain 7

Free Flash Cards & Practice Exam Included. To Master IT, Learn IT from the Masters! Over 90% pass rate.

Certcop (A division of Secbay Inc.)

What you’ll learn

  • Managing physical security.
  • Requirements for investigation types.
  • Logging and monitoring activities.
  • Disaster recovery.
  • Free Flash Cards.
  • Free Practice Exam.

Course Content

  • Company Introduction –> 1 lecture • 26min.
  • Introduction to CISSP –> 1 lecture • 8min.
  • Security Operations –> 2 lectures • 48min.
  • Flash Cards and Exam Certtips –> 1 lecture • 4min.

Auto Draft


Certcop (A division of Secbay Inc.)

Secbay and its partners have provided successful training to many top-edge companies worldwide. They have successfully delivered instructor-led classroom as well as virtual-live training and certification for many industry leaders such as DoD, DHS, US Army, US Navy, US Airforce, Unisys, ICE, BAH, Booz Allen Hamilton, Freddie Mac, Guidewell Source, Disney, Navarro, Apple, Amazon, Deloitte, Seagate and many more.



Earning the CISSP validates your ability to plan, execute, and manage a best-in-class cybersecurity program. With a CISSP, you certify your knowledge and become an (ISC)2 member, gaining access to a wealth of special resources, instructional tools, and peer-to-peer networking possibilities.

The CISSP curriculum divides the subject into domains, which are different types of information security subjects. [11] The CISSP test is based on the Common Body of Knowledge, as defined by (ISC)2 (or CBK). (ISC)2 states that “The CISSP CBK is a taxonomy — a list of subjects that information security professionals all around the globe should be aware of. The CISSP CBK creates a standard framework of information security words and principles, allowing information security experts throughout the world to discuss, debate, and resolve issues in the field with a shared understanding.”


Program Objectives:

  1. Certcop Introduction
  2. Introduction to CISSP
  3. Understand and comply with investigations
  4. Conduct logging and monitoring activities
  5. Perform Configuration Management (CM) (e.g., provisioning, baselining, automation)
  6. Apply foundational security operations concepts
  7. Apply resource protection
  8. Conduct incident management
  9. Operate and maintain detective and preventative measures
  10. Implement and support patch and vulnerability management
  11. Understand and participate in change management processes
  12. Implement recovery strategies
  13. Implement Disaster Recovery (DR) processes
  14. Test Disaster Recovery Plans (DRP)
  15. Participate in Business Continuity (BC) planning and exercises
  16. Implement and manage physical security
  17. Address personnel safety and security concerns
  18. Downloadable Free Flash Cards
  19. Free Practice Questions (Coming Soon for the same price)
Get Tutorial