Home »Tutorials »Networks & Security »CISSP Complete Video Course

CISSP Complete Video Course

0
20 Views
SHARE
CISSP Complete Video Course
CISSP Complete Video Course
Video: AVC, 1280×720, 16: 9, 30fps, 965kbps | Audio: AAC, 44.1kHz, 72kbps, mono / stereo
  • CISSP Complete Video Course contains 24 hours of training with content divided into 9 lessons with 94 video sub-lessons. The videos consist of live trainer discussions, screencasts, animations, and live demos. The video lessons in this course review each exam objective so you can use this course as a complete study tool for taking the CISSP exam. Instruction throughout offers detailed explanations, demos, tips, and more. Also includes end-of-lesson quizzes and a full practice exam.

Content:

  • Lesson 1: Security and Risk Management
    • Learning Objectives, Part 1
      • 1.1: Examining Information Security Fundamentals
      • 1.2: Applying Security Governance Concepts–Part 1
      • 1.3: Applying Security Governance Concepts–Part 2
      • 1.4: Designing and Implementing Governance Documents
      • 1.5: Understanding Legal Systems and Related Laws–Part 1
      • 1.6: Understanding Legal Systems and Related Laws–Part 2
      • 1.7: Understanding Regulatory and Contractual Requirements–Part 1
      • 1.8: Understanding Regulatory and Contractual Requirements–Part 2
      • 1.9: Implementing Personnel Security
      • 1.10: Implementing Third-Party Security
    • Learning Objectives, Part 2
      • 1.11: Understanding and Applying Threat Modeling
      • 1.12: Understanding & Implementing Risk Management Concepts
      • 1.13: Exploring Risk Assessment Methodologies
      • 1.14: Conducting a Quantitative Risk Assessment
      • 1.15: Conducting a Qualitative Risk Assessment
      • 1.16: Selecting Controls and Countermeasures
      • 1.17: Managing Supply Chain Risk
      • 1.18: Implementing Business Continuity Risk Management
    • End of Lesson Review
  • Lesson 2: Asset Security
    • Learning Objectives
      • 2.1: Classifying Assets
      • 2.2: Managing Assets
      • 2.3: Protecting Data Privacy
      • 2.4: Ensuring Appropriate Retention and Destruction
      • 2.5: Determining Data Security Controls
    • End of Lesson Review
  • Lesson 3: Security Engineering
    • Learning Objectives, Part 1
      • 3.1: Implementing Secure Design Principles
      • 3.2: Understanding Security Models
      • 3.3: Selecting Controls Based on Systems Security Evaluation Models
      • 3.4: Recognizing Information Systems Security Capabilities
      • 3.5: Assessing and Mitigating Security Architecture Vulnerabilities
      • 3.6: Assessing and Mitigating Cloud Vulnerabilities
      • 3.7: Assessing and Mitigating Web Vulnerabilities
      • 3.8: Assessing and Mitigating Mobile and Remote Computing Vulnerabilities
    • Mid-Lesson Exam Review
    • Learning Objectives, Part 2
      • 3.9: Introducing Cryptography
      • 3.10: Applying Cryptography–Encryption Part 1
      • 3.11: Applying Cryptography–Encryption Part 2
      • 3.12: Applying Cryptography–Public Key Infrastructure
      • 3.13: Applying Cryptography–Hashing and Digital Signature
      • 3.14: Applying Cryptography–Cryptographic Protocols
      • 3.15: Applying Cryptography–Crypto Attacks
      • 3.16: Applying Secure Principles to Site and Facility Design
      • 3.17: Securing Information Processing Facilities and Equipment
    • End of Lesson Review
  • Lesson 4: Communications and Network Security
    • Learning Objectives
      • 4.1: Reviewing OSI and TCP/IP Models
      • 4.2: Understanding IP Convergence and Extensibility
      • 4.3: Securing Wireless Networks
      • 4.4: Using Cryptography to Maintain Communication Security
      • 4.5: Securing Network Access
      • 4.6: Securing Data Transmissions
      • 4.7: Securing Multimedia Collaboration
      • 4.8: Securing Virtual Private Networks
      • 4.9: Securing Endpoints
      • 4.10: Preventing and Mitigating Network Attacks
    • End of Lesson Review
  • Lesson 5: Identity and Access Management
    • Learning Objectives
      • 5.1: Understanding Access Control Fundamentals
      • 5.2: Examining Identification Schemas
      • 5.3: Understanding Authentication Options
      • 5.4: Understanding Authentication Systems
      • 5.5: Implementing Access and Authorization Criteria
      • 5.6: Implementing Access Control Models
      • 5.7: Implementing Access Control Techniques and Technologies
      • 5.8: Identity and Access Provisioning
    • End of Lesson Review
  • Lesson 6: Security Assessment and Testing
    • Learning Objectives
      • 6.1: Testing and Examination (T&E) Overview
      • 6.2: Security Assessment Planning
      • 6.3: Conducting Security Examinations
      • 6.4: Security Assessment Testing–Target Identification
      • 6.5: Security Assessment Testing–Password Cracking
      • 6.6: Conducting Security Assessments–Penetration Testing
      • 6.7: Understanding Log Analysis
      • 6.8: Implementing Information Security Continuous Monitoring (ISCM)
      • 6.9: Understanding Third-Party Audits and Examinations
    • End of Lesson Review
  • Lesson 7: Security Operations
    • Learning Objectives, Part 1
      • 7.1: Managing Privileged Accounts
      • 7.2: Operating and Maintaining Firewalls and IDS/IPS
      • 7.3: Conducting Logging and Monitoring Activities
      • 7.4: Implementing and Supporting Vulnerability and Patch Management
      • 7.5: Implementing and Supporting Malware Management
      • 7.6: Implementing and Supporting Media Management
      • 7.7: Participating in the Configuration Management Process
    • Mid-Lesson Exam Review
    • Learning Objectives, Part 2
      • 7.8: Managing System Resilience and Fault Tolerance
      • 7.9: Implementing Disaster Recovery Processes
      • 7.10: Managing DR Plan Maintenance
      • 7.11: Understanding and Supporting Investigations
      • 7.12: Understanding Digital Forensics
      • 7.13: Supporting Incident Management
      • 7.14: Securing People and Places
    • End of Lesson Review
  • Lesson 8: Software Development Security
    • Learning Objectives
      • 8.1: Managing the Software Development Cycle
      • 8.2: Understanding Software Development Approaches, Models, and Tools
      • 8.3: Understanding Source Code Security Issues
      • 8.4: Managing Database Security
      • 8.5 Assessing the Security Impact of Acquired Software
    • End of Lesson Review
  • Lesson 9: Preparing for the Exam
    • Learning Objectives
      • 9.1: Security and Risk Management Domain: Review and Study Roadmap
      • 9.2: Asset Security Domain: Review and Study Roadmap
      • 9.3: Security Engineering Domain: Review and Study Roadmap
      • 9.4: Communications and Network Domain: Review and Study Roadmap
      • 9.5: Identity and Access Domain: Review and Study Roadmap
      • 9.6: Security Assessment and Testing Domain: Review and Study Roadmap
      • 9.7: Security Operations Domain: Review and Study Roadmap
      • 9.8: Software Development Security Domain: Review and Study Roadmap
      • 9.9: Taking the CISSP Examination
SHARE
Previous article
Next article

Stay Connected

320FansLike
250FollowersFollow
- Advertisement -

Follow us at gplus