Ć
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CISSPĀ® Exam Preparation Training Course
Introduction
1. Introduction (1:51)
2. What is CISSP Certificate (5:47)
3. Course Outline (5:18)
4. Latest CISSP Curriculum (4:33)
6. Course flow and follow up (7:22)
7. Important communication channel (2:49)
Security and Risk Management
8. Introduction to Security and Risk Management (4:11)
9. Important Definitions (12:28)
10. Important Definitions 2 (4:42)
11. Governance Requirements (5:22)
12. Due Care and Due Diligence (8:42)
13. Question (3:09)
14. Compliance (8:50)
15. Important Document (6:47)
16. Ethics (9:12)
17. Question (3:00)
18. Security Document 2 (15:35)
19.Security Document Types (5:18)
20. Policy Sample (3:14)
21. The Relationship Between Security Document Types (3:09)
22. Risk Management (7:51)
23. Risk Management Part 2 (11:09)
24. Asset Evaluation (18:33)
25. Exam Question (4:03)
26. Rsa Archer (4:41)
27. ARIS GRC (1:41)
28. Business Continuity Plans (1:16)
29. Business Continuity Plans - BCP (14:21)
30. Business Impact Analysis- BIA (10:15)
31. MTD - RTO- RPO (11:44)
32. Disaster Recovery Plan -DRP (3:34)
33. Alternatives Sites (8:10)
34. Exam Quiz (8:12)
35. The Need of Personnel Security (8:39)
36. Employment Policies (2:20)
37. Employment Policies -Part 2 (10:29)
38. Termination (1:40)
39. Security Awareness (7:02)
Asset Security
40. Introduction to Asset Security (5:35)
41. Asset Management (10:38)
42. Information Asset List (12:40)
43. Classification (8:10)
44. Labeling (4:44)
45. DLP (2:55)
46. DLP - Data Classification (3:37)
47. Klassify - Data Labeling 2 (2:50)
48. Privacy (13:02)
49. Retention (12:12)
50. Data Security Control (8:01)
Security Architecture and Engineering
51. Introduction to Security Architecture and Engineering (3:52)
52. Security Engineering Lifecycle (4:14)
53. NISP SP 14-27 (11:36)
54. Trusted Computing Base (9:22)
54.1 TCB Vulnerability (9:48)
55. Security Models (17:08)
56. TCSEC (5:51)
57. ITSEC (6:14)
58. Security Architecture Questions (3:18)
59. Enterprise Security Architecture (5:06)
60. Virtualization (9:51)
61. Fault Tolerance (6:32)
62. Server Fault Tolerance Techniques (2:06)
63. New Technology (6:28)
64. Spoofing Number (5:52)
65. Spoofing Email (7:04)
66. Cryptography (16:31)
67. Alternative Ciphers (7:56)
68. Symmetric Encryption (12:43)
69. Asymmetric Encryption (13:52)
70. Hash (6:10)
71. Physical Security (7:44)
72. Physical Access barriers (9:49)
73. Power Issue (3:15)
74. Fire (5:33)
Communications and Network Security
75. The OSI Model (17:27)
76. TCP-IP Model (2:50)
77. Network Architecture Components (17:09)
78. Firewall (10:43)
79. Network Types and Topolgies (8:42)
80. Remote Access Technology (18:34)
81. Wireless Network (7:20)
82. Network Attacks (9:03)
83. Remote Access Security Mechanisms (2:17)
84. RAID (7:00)
85. Backup (6:00)
86. Network Questions (1:21)
Identity and Access Management
87. Access Control (6:50)
88. Authorization (19:23)
89. Authentication (18:50)
90. Single Sign on SSO (13:10)
91. Central Administration (RADUIS) (4:16)
92. Access Control Attack (17:15)
93. Instrusion Detection System (IDS) (6:58)
94. Access Control Inportant exam area (4:15)
95. Access Control Questions (8:02)
Cloud Security
96. Introduction to Cloud Security (2:50)
97. NIST 800-145 (1:55)
98. IaaS vs PaaS vs SaaS (2:25)
99. SaaS (4:25)
100. PaaS (2:04)
101. IaaS (1:59)
102. Storage Architecture (1:25)
103. Data Life Cycle Security (4:27)
104. Hypervisor (4:49)
105. Virtualization Security (5:26)
106. Perimeter Security (6:05)
Security Assessment and Testing
107. Introduction Security Assessment and Testing (11:20)
108. Test Output (4:33)
109. Vulnerability asessment - Part 1 (2:16)
110. Vulnerability asessment -Part 2 (3:16)
112. Nessus VA (13:25)
113. Nessus VA- Part 2 (14:05)
114. Nessus VA Report (5:20)
115. OWASP ZAP - VA (5:06)
116. Nexpose VA (5:05)
117. Penetration testing (8:33)
118. Reconnaissance Demo -Maltego 2 (7:59)
119. Scanning Demo -Zenmap (5:06)
120. Exploitation Demo -MetaSploit 2 (14:33)
121. Event Log Review 2 (7:19)
122. NIST 800-92 (2:56)
123. SIEM Solution (6:16)
124. SIEM Solution Demo - Qradar (3:09)
125. Code Review (5:20)
126. Security KPI's (6:57)
Security Operations
127. Introduction to Security Operation 2 (1:40)
128. Security Operation 2 (9:53)
Software Development Security
129. The System Life Cycle (6:45)
130. Software development Methods (6:42)
132. Change Control Process (3:07)
133. Security Consideration (1:54)
135. Introduction to SQL Injection 2 (11:26)
134. Software Control (2:50)
136. What is SQL Injection (11:26)
Resources
CISSP Resources
82. Network Attacks
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock