Week 8 – 45 pages and 30 multiple choice questions
Read Chapters 19, 20 amd 21 again
Chapter 22 – Given a scenario, use data sources to support an investigation – 14 pages

Chapter 23 – Summarize elements of effective security governance – 15 pages

Chapter 24 – Explain elements of the risk management process – 16 pages

Action – Ian’s Book Key Elements
Chapter 22 – Read pages 383-390 taking notes

Complete all 10 review questions pages 391-393

Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 23 – Read pages 397-411 taking notes

Complete all 10 review questions pages 412-414

Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 24 – Read pages 415-425 taking notes

Complete all 10 review questions pages 426-428

Any review questions that are wrong or missing then go back into the chapter and read those areas

Action – Videos Professor Messer
https://www.professormesser.com/security-plus/sy0-701/sy0-701-video/sy0-701-comptia-security-plus-course/
4.9 Security data sources

  • log data

5.1 Security governance

  • Security policies
  • Security standards
  • Security procedures
  • Security considerations

5.2 Risk Management

  • Risk management
  • Risk analysis
  • Risk management strategies
  • Business impact analysis
Action – Lab Exercises (optional) 

Ian’s Website

PBQ – Wireless
Labs | Ian Neil’s Security+ Study Materials (securityplus.training)

Log data

  • Firewall logs
  • Network logs
  • IPS/IDS logs

Metadata

Data sources

  • Vulnerability scans
  • Automated scans
  • Dashboards
  • Packet captures

Guidelines

Policies

Standards

Procedures

External considerations

Monitoring and revision

Types of governance structures

Roles and responsibilities for systems and data

Risk identification

Risk analysis

Risk register

Risk tolerance

Risk appetite

Risk management strategies

Risk reporting

Business Impact Analysis

Single point of failure

  • RPO
  • RTO
  • MTTR
  • MTBF