No one (or two) texts can cover this course, which should be subtitled ("Things about infrastructure tools processes in use in industry you should know before getting your first job."
- ITIL
- Intro to ITIL
- ITIL Service Strategy
- ITIL Service Strategy (Intro and Strategy Management)
- ITIL Service Strategy Processes: Financial Management)
- ITIL Service Strategy Processes: Demand Management)
- ITIL Service Strategy Processes: Service Portfolio Management)
- ITIL Service Strategy Processes: Business relationship management for IT services
- Selected ITIL Service Design Modules
- Service catalog management
- Service level management
- Supplier management
- Identity and Access Management might require supplemental materials, for instance
The AD part
- ACTIVE DIRECTORY FUNDAMENTALS
- Chapter 01, Fundamentals - Ringel
- Chapter 02, Domain Services - Richael
- Chapter 03, AD Infrastructure - Pansera
- Chapter 04, Domain Name SystemD - Richael
- ACTIVE DIRECTORY MANAGING OBJECTS AND POLICIES
- Chapter 07, Managing Objects - Ringel
- Chapter 08, Managing Users, Groups and Devices - Mantas
- Chapter 09, Designing the OU - Pansera
- hapter 10, Group Policies - Mantas
- ACTIVE DIRECTORY FEDERATION AND SECURITY
- Chapter 12, AD Certificates and Federation - Walder
- Chapter 13, AD Federation Services - Walder
- Chapter 14, AD Rights Management - Alex Boyle
- Chapter 15, AD Security - Alex Boyle
- https://www.owasp.org/images/9/9b/IdM-OWASP.v.0.2.14.pdf
- https://books.google.com/books?hl=en&lr=&id=eIPA4v0u05EC&oi=fnd&pg=PP1&dq=identity+management+fundamentals&ots=gwVYzg0Pha&sig=-GCFMOLmtJQQypOUnhtoY612aTs#v=onepage&q=identity%20management%20fundamentals&f=false
- Risk Management and Security Risk Analysis
- RISK MANAGEMENT MODELS AND METHODOLOGIES
- 3. Risk Management Models (chapter 2, 11-FAIR, 6)
- https://www.pmi.org/learning/library/overall-project-risk-assessment-models-1386
- 1. Risk Assessment/Analysis Methodologies (chapters 5-7)
- 2. Risk Measurement and Evaluation Methodologies (chapter 8)
- RISK MANAGEMENT PRACTICES
- 4. Risk Management Processes (chapter 4, 12)
- 5. Risk Mitigation Economics (E2506 document) chapter 2 section
- 6. Risk Transference/Acceptance/Mitigation (chapter 3)
- 7. Communication of Risk (chapter 9)
- Identify and categorize risks in a cyber system.
Describe and evaluate risk mitigation strategies for specific risks.
Risk Avoidance.
Risk Reduction.
Risk Transfer.
Risk Acceptance.
Prepare a risk mitigation plan based on proposed strategies, budget, risk appetite, and other considerations.
- Risk Management
- Chapter 17 of IT Systems Management?
- Risk is covered in our BS SW Engineering Text, chapter 22.1 Perhaps I can get a scan of that for you.
- Storage Management (EMC text)
- Data Center Environment (ch 2) Pasamba
- RAID (ch 3) Pasamba
- Intelligent Storage Systems (ch 4) Cao
- Fibre Channel SAN (ch 5) La Sala
- IP SAN and FCoE (ch 6) La Sala
- NW Attached Storage (ch 7) Fritz
- Object-Based Storage & Unified Storage (ch 8) Fritz
- Backup & Archive< (ch 10) Yeager
- Replication (ch 11+12) Yeager
- Cloud Computing (ch 13) Cao
- Cybersecurity Planning and Management
- Lecture 5-1 Cybersecurity Common Body of Knowledge part 1
- Lecture 5-2 Cybersecurity Common Body of Knowledge part 2
- Lecture 5-3: Information Security Management
-
- Lecture 5-4 Cybersecurity as a Strategic Part of an Organizational Strategy
- Lecture 5-5: Business Continutity and Disaster Recovery
- Lecture 5-6: Event Management, Incident Management and Problem Management
- Lecture 5-7: Intellectural Property
- Lecture 5-8: Change Management
- ✔ 1. Broad coverage of the cybersecurity Common Body of Knowledge (CBK) and how it affects planning and management.
8 domains. Official (ISC)2 Guide to the CISSP CBK, Fourth Edition ((ISC)2 Press) 4th Edition, Kindle Edition
- ✔ 2. Differentiate and provided examples of Operational, Tactical, and Strategic Planning and Management
Lynda plus article perhaps
ITIL Book 10.6 (Information Security Management)
- ✔ 3. Examine C-Level Functions which impact cybersecurity. (CIO COO, CEO, CISO -
https://www.zdnet.com/article/who-is-really-responsible-for-cybersecuritythe-ciso-the-cio-the-ceo-or-you-who-is-really-responsible/
https://www.csoonline.com/article/3228886/leadership-management/should-cisos-join-ceos-in-the-c-suite.html
https://securityintelligence.com/where-the-ciso-should-sit-on-the-security-org-chart-and-why-it-matters/
https://hmgstrategy.com/resource-center/articles/2014/12/15/who-should-own-security-the-cio-the-coo-or-a-ciso
http://businesscentrictechnoloy.com/cto-vs-cio-vs-ciso/
Plus consider these roles to fulfill objective: Outline and explain the roles of personnel in planning and managing security, including:
- The Board of Directors
- The Board of Directors
- Senior Management
- The Chief Information Security Officer (CISO)
- IT Management (CIO, IT Director, etc)
- Functional Area Management
- Information Security personnel
- End users
- ✔ 4. Making cybersecurity a strategic essential (part of core organizational strategy)
- ✔ 5. Identify requirements and create plans for Business Continuity / Disaster Recovery
ITIL Book, Chapter 10.5 (IT Service Continuity Management)
- 6. Develop processes and procedures for incident response
ITIL chapter 12.1 (Event Management), 12.2 (Incident Management), 12.4 (Problem Management)
- ✔ (elsewhere in course) 7. Planning for protection of intellectual property
- ✔ (elsewhere in course) 8. Managing the implementation of access controls
- ✔ 9. Managing patch and change control
ITIL Book 11.1 (Transition Planning and Support)? probably!; ITIL Book 11.2 (Change Management), ITIL (Change Evaluation),
ITIL (Release and Deployment Management)
- Infrastructure Capabilities and Operations
- Data Center and Facilities Management
- Maintaining Servers for System Availability and Uptime
- Systems Monitoring and Performance Tuning
- Chapter 6: IT Operations Control (ITIL function)
IT Facilities Management (ITIL function)
- DESIGNING AND BUILDING A SECURITY OPERATIONS CENTER - Chapter 6, Daily Operations
- Chapter 7 ITIL CSI
- ITIL book 10.3 and 10.4 (Capacity Management; Availability Management)
- ITIL Chapter 11.3 (Asset Management)