Ć
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Lifetime - CISSPĀ® Exam Preparation Training Course - 2018
Introduction
Introduction (1:51)
1. What is CISSP Certificate (5:47)
2. Course Outline (5:18)
3. Latest CISSP Curriculum (4:33)
4. Course Materials and Resources 2 (5:19)
5. Course flow and follow up (7:22)
6. Important communication channel (2:49)
Security and Risk Management
7. Introduction to Security and Risk Management (4:11)
8. Important Definitions (12:28)
9. Important Definitions 2 (4:42)
10. Governance Requirements (5:22)
11. Due Care and Due Diligence (8:42)
12. Question (3:09)
13. Compliance (8:50)
14. Important Document (6:47)
15. Ethics (9:12)
16. Question (3:00)
17. Security Document 2 (15:35)
18. Security Document Types (5:18)
19. Policy Sample (3:14)
20. The Relationship Between Security Document Types (3:09)
21. Risk Management (7:51)
22. Risk Management Part 2 (11:09)
23. Asset Evaluation (18:33)
24. Exam Question (4:03)
25. Rsa Archer (4:41)
26. ARIS GRC (1:41)
27. Business Continuity Plans (1:16)
28. Business Continuity Plans - BCP (14:21)
29. Business Impact Analysis- BIA (10:15)
30. MTD - RTO- RPO (11:44)
31. Disaster Recovery Plan -DRP (3:34)
32. Alternatives Sites (8:10)
33. Exam Quiz (8:12)
34. The Need of Personnel Security (8:39)
35. Employment Policies (2:20)
36. Employment Policies -Part 2 (10:29)
37. Termination (1:40)
Domain Evaluation 2 (5:34)
37.1 Security Awareness (7:02)
Asset Security
38. Introduction to Asset Security (5:35)
39. Asset Management (10:38)
40. Information Asset List (12:40)
41. Classification (8:10)
42. Labeling (4:44)
43. DLP (2:55)
44. DLP - Data Classification (3:37)
45. Klassify - Data Labeling 2 (2:50)
46. Privacy (13:02)
47. Retention (12:12)
48. Data Security Control (8:01)
Domain Evaluation 2 (5:34)
Security Architecture and Engineering
49. Introduction to Security Architecture and Engineering (3:52)
50. Security Engineering Lifecycle (4:14)
51. NISP SP 14-27 (11:36)
52. Trusted Computing Base (9:22)
52.1 TCB Vulnerability (9:48)
53. Security Models (17:08)
54. TCSEC (5:51)
55. ITSEC (6:14)
56. Security Architecture Questions (3:18)
59. Enterprise Security Architecture (5:06)
60. Virtualization (9:51)
61. Fault Tolerance (6:32)
62. Server Fault Tolerance Techniques (2:06)
63. New Technology (6:28)
64. Spoofing Number (5:52)
65. Spoofing Email (7:04)
66. Cryptography (16:31)
67. Alternative Ciphers (7:56)
68. Symmetric Encryption (12:43)
69. Asymmetric Encryption (13:52)
70. Hash (6:10)
71. Physical Security (7:44)
72. Physical Access barriers (9:49)
73. Power Issue (3:15)
74. Fire (5:33)
Domain Evaluation (5:34)
Communications and Network Security
75. The OSI Model (17:27)
76. TCP-IP Model (2:50)
77. Network Architecture Components (17:09)
78. Firewall (10:43)
79. Network Types and Topolgies (8:42)
80. Remote Access Technology (18:34)
81. Wireless Network (7:20)
82. Network Attacks (9:03)
83. Remote Access Security Mechanisms (2:17)
84. RAID (7:00)
85. Backup (6:00)
86. Network Questions (1:21)
Domain Evaluation (5:34)
Identity and Access Management
87. Access Control (6:50)
88. Authorization (19:23)
89. Authentication (18:50)
90. Single Sign on SSO (13:10)
91. Central Administration (RADUIS) (4:16)
92. Access Control Attack (17:15)
93. Instrusion Detection System (IDS) (6:58)
94. Access Control Inportant exam area (4:15)
95. Access Control Questions (8:02)
Domain Evaluation (5:34)
Cloud Security
96. Introduction to Cloud Security (2:50)
97. NIST 800-145 (1:55)
98. IaaS vs PaaS vs SaaS (2:25)
99. SaaS (4:25)
100. PaaS (2:04)
101. IaaS (1:59)
102. Storage Architecture (1:25)
103. Data Life Cycle Security (4:27)
104. Hypervisor (4:49)
105. Virtualization Security (5:26)
106. Perimeter Security (6:05)
Security Assessment and Testing
107. Introduction Security Assessment and Testing (11:20)
108. Test Output (4:33)
109. Vulnerability asessment - Part 1 (2:16)
110. Vulnerability asessment -Part 2 (3:16)
112. Nessus VA (13:25)
113. Nessus VA- Part 2 (14:05)
114. Nessus VA Report (5:20)
115. OWASP ZAP - VA (5:06)
116. Nexpose VA (5:05)
117. Penetration testing (8:33)
118. Reconnaissance Demo -Maltego 2 (7:59)
119. Scanning Demo -Zenmap (5:06)
120. Exploitation Demo -MetaSploit 2 (14:33)
121. Event Log Review 2 (7:19)
122. NIST 800-92 (2:56)
123. SIEM Solution (6:16)
124. SIEM Solution Demo - Qradar (3:09)
125. Code Review (5:20)
126. Security KPI's (6:57)
Domain Evaluation (5:34)
Security Operations
127. Introduction to Security Operation 2 (1:40)
128. Security Operation 2 (9:53)
Domain Evaluation (5:34)
Software Development Security
129. The System Life Cycle (6:45)
130. Software development Methods (6:42)
132. Change Control Process (3:07)
133. Security Consideration (1:54)
135. Introduction to SQL Injection 2 (11:26)
134. Software Control (2:50)
136. What is SQL Injection (11:26)
Domain Evaluation (5:34)
Resources
CISSP Resources
70. Hash
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock