From the course: ISACA Certified Information System Manager (CISM) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Operational controls, part 1
From the course: ISACA Certified Information System Manager (CISM) Cert Prep
Operational controls, part 1
- [Kelly] All right, now after we look at our management controls, let's move on to talking about our operational controls. And like we said, with our operational controls, these are the types of controls that are implemented by people. Usually, there's a department responsible, or a dedicated set, a dedicated team, perhaps, responsible for carrying out these different types of activities. So we've got all sorts of operational controls. Identity and access management, where we determine how users get accounts on the network and how we control making sure that we have only authorized access. Security event monitoring and analysis, should go without speaking, right? We have to monitor the events that happen on our network, which will then lead us to a quick and, hopefully, effective and efficient incident response capability. Configuration management and change control. We've talked about that multiple times, and how we have to regulate changes in our environment. Under that category…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
Information security program concepts7m 38s
-
(Locked)
Elements of an information security program9m 59s
-
(Locked)
Business case and budget12m 18s
-
(Locked)
Asset identification and classification12m 39s
-
(Locked)
Management controls19m 11s
-
(Locked)
Operational controls, part 115m 28s
-
(Locked)
Operational controls, part 219m 11s
-
(Locked)
Technical controls1m 42s
-
(Locked)
Symmetric cryptography6m 29s
-
(Locked)
Asymmetric cryptography7m 33s
-
(Locked)
Integrity and non-repudiation13m 15s
-
(Locked)
Data security and endpoint protection6m 50s
-
(Locked)
Network protection: segmentation12m 46s
-
(Locked)
Network address translation5m 30s
-
(Locked)
Wireless networks7m 13s
-
(Locked)
Network services10m 37s
-
(Locked)
Cloud integration13m 44s
-
-
-