- Level Foundation
- Duration 16 hours
- Course by ISC2
-
Offered by
About
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information. The Security operations and Administration course addresses basic security concepts and the application of those concepts in the day to day operation and administration of enterprise computer systems and the information that they host.Ethical considerations in general, and the (ISC)2 Code of Ethics in particular, provide the backdrop for any discussion of information security and SSCP candidates will be tested on both. Information security professionals often find themselves in positions of trust and must be beyond reproach in every way.Several core principles of information security stand above all others and this domain covers these principles in some depth. It can be said that the CIA triad of confidentiality, integrity and availability forms the basis for almost everything that we do in information security and the SSCP candidate must not only fully understand these principles but be able to apply them in all situations. additional security concepts covered in this domain include privacy, least privilege, non-repudiation and the separation of duties. Course Objectives 1. Define Code of Ethics 2. Describe the security concepts 3. Document and operate security controls 4. Describe the asset management process 5. Implement compliance controls 6. Assess compliance controls 7. Describe the change management process 8. Contribute to the security awareness training program 9. Contribute to physical security operationsModules
Discussion
1
Discussions
- Discussion: The Meaning of Information Security
Understand and Comply with Code of Ethics
1
Videos
- Security Operations and Administration Course Introduction
1
Readings
- Understand and Comply with Code of Ethics
Understand Security Concepts
7
Videos
- Security Concepts: Confidentiality
- Security Concepts: Ensuring Confidentiality
- Security Concepts: Consequences of Integrity Failures
- Security Concepts: Core Guidelines
- Security Concepts: Least Privilege
- Security Concepts: Additional Controls
- Security Concepts: Risk Assessment Data
7
Readings
- Security Concepts: Confidentiality
- Security Concepts: Ensuring Confidentiality
- Security Concepts: Consequences of Integrity Failures
- Security Concepts: Core Guidelines
- Security Concepts: Least Privilege
- Security Concepts: Additional Controls
- Security Concepts: Risk Assessment Data
Document and Operate Security Controls
2
Videos
- Security Controls: Deterrent, Preventive, Detective, and Corrective Controls
- Security Controls: Timeline of a Security Incident
2
Readings
- Security Controls: Deterrent, Preventive, Detective, and Corrective Controls
- Security Controls: Timeline of a Security Incident
Week 1 Quiz
1
Assignment
- Quiz 1
Participate in Asset Management
14
Videos
- Asset Management: Life Cycle
- Asset Management: The Waterfall Model
- Asset Management: Benefits and Drawbacks
- Asset Management: Deployment of System
- Asset Management: OWASP Top Ten
- Asset Management: Guidelines for Developers
- Asset Management: IT Asset Management (ITAM)
- Asset Management: Impact and Result
- Asset Management: Encryption Vulnerabilities
- Asset Management: Data Scrubbing
- Asset Management: Considerations
- Asset Management: Secure Output
- Asset Management: Destruction of Magnetic Media
- Asset Management: Disclosure Controls
14
Readings
- Asset Management: Life Cycle
- Asset Management: The Waterfall Model
- Asset Management: Benefits and Drawbacks
- Asset Management: Deployment of System
- Asset Management: OWASP Top Ten
- Asset Management: Guidelines for Developers
- Asset Management: IT Asset Management (ITAM)
- Asset Management: Impact and Result
- Asset Management: Encryption Vulnerabilities
- Asset Management: Data Scrubbing
- Asset Management: Considerations
- Asset Management: Secure Output
- Asset Management: Destruction of Magnetic Media
- Asset Management: Disclosure Controls
Week 2 Quiz
1
Assignment
- Quiz 2
Implement and Assess Compliance with Controls
3
Videos
- Compliance with Controls: Technical Controls
- Compliance with Controls: Managerial Controls
- Compliance with Controls: Policy Life Cycle
3
Readings
- Compliance with Controls: Technical Controls
- Compliance with Controls: Managerial Controls
- Compliance with Controls: Policy Life Cycle
Discussion
2
Discussions
- Discussion: Characteristics of Policies
- Discussion: Examples of Controls
Participate in Change Management Duties
6
Videos
- Change Management Duties: Implementation and Configuration Management Plan
- Change Management Duties: Systems Assurance and Controls Validation
- Change Management Duties: CM Process
- Change Management Duties: Configuration Management for Operating Systems
- Change Management Duties: Control
- Change Management Duties: Testing Patches, Fixes, and Updates
6
Readings
- Change Management Duties: Implementation and Configuration Management Plan
- Change Management Duties: Systems Assurance and Controls
- Change Management Duties: CM Process
- Change Management Duties: Configuration Management for Operating Systems
- Change Management Duties: Control
- Change Management Duties: Testing Patches, Fixes, and Updates
Quiz
1
Assignment
- Week 3 Quiz
Participate in Physical Security Operations
9
Videos
- Physical Security Operations: Physical Security
- Physical Security Operations: Doors
- Physical Security Operations: Door Locks
- Physical Security Operations: Turnstiles
- Physical Security Operations: Securing the Area
- Physical Security Operations: Rack Security
- Physical Security Operations: HVAC
- Security Operations: Sprinkler Systems
- Security Operations: Gas Suppression Systems
9
Readings
- Physical Security Operations: Physical Security
- Physical Security Operations: Doors
- Physical Security Operations: Door Locks
- Physical Security Operations: Turnstiles
- Physical Security Operations: Securing the Area
- Physical Security Operations: Rack Security
- Physical Security Operations: HVAC
- Security Operations: Sprinkler Systems
- Security Operations: Gas Suppression Systems
Participate in Security Awareness Training
2
Videos
- Security Awareness Training: Critical Success Factors
- Security Awareness Training: Training
2
Readings
- Security Awareness Training: Critical Success Factors
- Security Awareness Training: Training
Quiz
1
Assignment
- Week 4 Quiz
Case Study: Security Operations and Administration
1
Peer Review
- Security Operations and Administration Case Study
End of the Course Assessment
1
Assignment
- End of the Course Assessment
1
Readings
- SSCP Exam Information
Auto Summary
The Security Operations and Administration course, offered by Coursera, delves into essential security concepts and their application in managing enterprise computer systems and information. Led by expert instructors, this foundational course covers the CIA triad (confidentiality, integrity, availability), ethical considerations, and key principles like privacy and least privilege. With a duration of 960 minutes, it targets IT and Computer Science professionals and offers a starter subscription option. Ideal for those looking to enhance their understanding of security operations, policy implementation, and compliance controls.

ISC2 Education & Training