ITIL V4 Study Guide – Introduction
ITIL Study Guide – Introduction Welcome to our library of ITIL study guides to help you pass the ITIL V4 Exam. The IT Infrastructure Library (ITIL) is sometimes referred to…
ITIL Study Guide – Introduction Welcome to our library of ITIL study guides to help you pass the ITIL V4 Exam. The IT Infrastructure Library (ITIL) is sometimes referred to…
The most recent version of ITIL, ITIL 4 introduced a lot of new concepts. One of these new concepts is the Service Value System, Service Value Chain and Value Stream. The Service Value Chain (SVC) is the…
CISSP Domain 3 Practice Questions Carl has noticed a high level of TCP traffic in and out of the network. After running a packet sniffer, he discovered malformed TCP ACK…
CISSP Domain 2 Practice Questions What is the BEST way for an organization to protect corporate mobile devices such as smartphones, tablets, and laptop computers? Which of the following is…
Software Development Methodologies In software development, there are several methodologies developers can use for devising, planning, producing and testing software. Agile Software Development The Agile Software development method is often…
Security Incident Management Security incident management focuses heavily on resolving incidents quickly to ensure that employees and users alike aren’t hit with too much downtime. By identifying, managing, recording and…
Configuration Management System Configuration Management a set of technical and administrative tasks that are carried out to ensure that all software and hardware which a company owns are all maintained…
Disaster recovery is touched on in a couple of the CISSP domains Domain 7 focuses on the recovery planning and strategies. Recovery Strategies A recovery operation takes place after availability…
CISSP Domain 7 – Investigation types There are four different investigation types: Administrative : Criminal : Civil : Regulatory : CISSP Domain 7 – Evidence The 5 Rules of Evidence…
The CISSP Domain 6 covers topics that focus on evaluating an organization’s security posture and testing of the organisations security controls and systems. This domain covers vulnerability assessment, penetration testing,…