Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CISSP Certification Fast Track
Training Overview
Description of Training
Introduction, Concentrations and Exam Highlights
Introduction (4:49)
Corporate and College (2:32)
CISSP Concentrations (5:02)
Consortium Associate (4:12)
Exam Highlights (4:51)
Domain 1. 1 Understand, adhere to and promote professional ethics
Domain 1 Overview (3:49)
ISC2 Code of Ethics (3:33)
Organizational Code of Ethics (5:02)
Domain 1.2 Understand and apply security concepts
CIA Triad - Confidentiality #1 (3:54)
CIA Triad - Confidentiality #2 (4:16)
CIA Triad - Integrity #1 (3:05)
CIA Triad - Integrity #2 (3:41)
CIA Triad - Availability #1 (3:20)
CIA Triad - Availability #2 (1:52)
AAA Services (4:56)
Authenticity - Non Repudiation (5:13)
DAD Triad - Video #1 (4:15)
DAD Triad - Video #2 (1:26)
Domain 1.3 Evaluate and apply security governance principles
Security Governance Principles (5:11)
Security Frameworks (5:56)
Security Control Framework Mapping (3:21)
Organizational Roles and Responsibilities (6:37)
Due Care and Diligence (2:36)
Domain 1.4 Determine compliance and other requirements
Contractual Aspects (5:23)
Regulatory Aspects - Video #1 (3:35)
Regulatory Aspects - Video #2 (4:29)
Domain 1.5 Understand legal and regulatory issues that pertain to InfoSec
Cyber Crimes and Data Breaches (5:48)
Legal and Regulatory Overview (3:01)
Licensing and Intellectual Property - Video #1 (4:29)
Licensing and Intellectual Property - Video #2 (4:47)
Licensing and Intellectual Property - Video #3 (3:15)
Import, Export and Trans Border Data Flows (5:40)
Privacy - Video #1 (3:39)
Privacy - Video #2 (4:56)
Privacy - Video #3 (4:26)
Domain 1.6 Understand requirement for investigation types
Civil Investigations (2:16)
Overview and Administrative Investigations (4:56)
Regulatory Investigations and Electronic Discovery (4:28)
Evidence - Video #1 (3:51)
Evidence - Video #2 (3:52)
Domain 1.7 Develop, Document and implement security policy, standards, etc
Security Policies, Standards, and Procedures Overview (6:22)
Types of Security Policies (2:26)
Hierarchical Breakdown (4:21)
Areas to Avoid (4:53)
Domain 1.8 Identify, analyze and prioritize business continuity (BC) req
Business Continuity Overview (5:22)
Business Continuity - Developing a Plan (8:14)
BIA, RTO, and RPO (7:57)
Domain 1.9 Contribute to and enforce personnel security policies and procedures
Hiring and Background Checks (5:53)
Candidate Screening and Hiring (13:56)
Employment Agreements (2:44)
Vendor, consultant, and contractor agreements and controls (9:20)
Onboarding, Transfers, Terminations, and Associated Processes - Video #1 (4:42)
Onboarding, Transfers, Terminations, and Associated Processes - Video #2 (3:28)
Compliance and Privacy (3:41)
Domain 1.10 Understand and apply risk management concepts
Apply Risk Management Overview (5:35)
Identifying Threats and Vulnerabilities (7:25)
Risk Response (4:38)
Countermeasures and Security Control Assessments (3:53)
Monitoring and Continuous Improvement (5:53)
Domain 1.11 Understand and apply threat modeling concepts and methodologies
Proactive and Reactive (4:07)
Identifying Threats (4:08)
Threat Modeling (5:23)
Analyzing Risk (2:32)
Prioritization and Response (3:09)
Domain 1.12 Apply supply chain risk management (SCRM) concepts
Applying Supply Chain Key Concepts (6:56)
Supply Chain Attacks (4:43)
Domain 1.13 Establish and maintain a security awareness, education, etc
Security Awareness, Education, and Training (4:32)
Domain 2.1 Identify and classify information and assets
Domain 2 Overview (3:49)
Identify and Classify Information and Assets (5:35)
Data Classification - Video #1 (2:38)
Data Classification - Video #2 (3:50)
Domain 2.2 Establish information and asset handling requirements
Establish Information and Asset Handling (4:06)
Domain 2.3 Provision Resources Securely
Provision Resources Securely (2:39)
Asset Management (6:24)
Domain 2.4 Manage Data Lifecycle
Data Owners (4:32)
Data Custodian (2:43)
Data Processor (4:19)
Data User (2:41)
Data Collection and Location (2:23)
Data Maintenance and Retention (3:11)
Data Remanence (3:54)
Data Remanence and Automated Information Systems (4:07)
Domain 2.5 Ensure Appropriate Asset Retention
End of Life (2:46)
Asset Retention (4:40)
Domain 2.6 Determine Data Security Controls
Data States (6:40)
Scoping (2:18)
Standards Selection (1:21)
Digital Rights Management (4:38)
DLP and CASB (3:14)
Domain 3.1 Manage Engineering Processes Using Secure Design
Domain 3 Overview (3:18)
Key Concepts (2:28)
Closed and Open Systems (3:21)
Confinement (3:40)
Domain 3.2 Fundamental Concepts of Security Models
Trusted Computing Base (5:18)
Reference Models and Security Kernels (1:51)
Various Models (4:55)
Domain 3.3 Controls Based on System Security Requirements
Controls Based on System Security Requirements (6:13)
Domain 3.4 Understand Security Capabilities of Information Systems
Virtulization (3:03)
Trusted Platform Module (5:06)
Domain 3.5 Assess and Mitigate the Vulnerabilities of Security Architectures
Server Based Systems (3:57)
Database Systems (2:39)
Industrial Control Systems (1:53)
Cloud Based Systems (6:43)
Distributed, Embedded and Microservices (5:10)
Containerization (7:28)
Virtualization (6:09)
Domain 3.6 Select and Determine Cryptographic Solutions
Cyptographic Lifecycle (4:44)
Key Management Practices (6:11)
Non-repudiation, Integrity, and Hashing (6:30)
Domain 3.7 Understand Methods of Cryptanalytic Attacks
Methods of Cryptanalytic Attacks (4:25)
Methods of Cryptanalytic Attacks - Video #2 (5:43)
Methods of Cryptanalytic Attacks - Video #3 (3:18)
Cryptanalytic Attacks (3:52)
Domain 3.8 Apply Security Principles to Site and Facility Design
Site Selection (5:25)
Secure Facility Plan (5:21)
Domain 3.9 Design Site and Facility Controls
Evidence Storage (7:24)
Wireing Closets (4:02)
HVAC (3:23)
Enviornmental Issues (4:00)
Fire Prevention (3:06)
Power (3:21)
Domain 4.1 Implement Secure Design Principles in Network Architectures
Domain 4 Overview (2:12)
OSI Video #1 (3:27)
OSI Video #2 (4:04)
IP, IPSEC and VOIP (7:05)
Secure Communicaiton Protocols (3:19)
Domain 4.2 Secure Network Components
Operations of Hardware (5:45)
Transmission Media (4:57)
Network Acces Control Devices (3:11)
Warranty Support (1:49)
Domain 4.3 Implement Secure Communication Channels According to Design
Voice (3:45)
Multi-media Collaboration (4:51)
Remote Access (5:23)
Communication Protocols (3:49)
Virtualized Networks (3:40)
Third Party Connectivity (4:18)
Domain 5.1 Control Physical and Logical Access to Assets
Domain 5 Overview (2:29)
Access Control Types (5:19)
Authentication Factors (5:06)
Systems and Devices (5:04)
Domain 5.2 Manage Identification and Authentication , Devices, & Services
Single and Multi-Factor Authentication (5:28)
Identity Management Implementation (2:39)
Accountability (4:18)
Federated Identity Management (2:39)
Common Language (6:01)
Just In Time (1:37)
Registration, Proofing, and Establishment of Identity (4:51)
Domain 5.3 Federated Identity With a Third-Party Service
Identity Governance #1 (3:40)
Identity Governance #2 (3:45)
On Premise (2:13)
Cloud (2:17)
Domain 5.4 Implement and Manage Authorization Mechanism
Key Concepts (6:25)
Role Based Access (3:14)
Mandatory Access Controls (2:29)
Discretionary Access Controls (1:37)
Risk Based Access Controls (2:48)
Domain 5.5 Manage the Identity and Access Provisioning Life-cycle
Account Access Review (4:30)
Provisioning and Deprovisioning (5:36)
Account Revocation (4:36)
Privilege Escalation (5:31)
Domain 5.6 Implement Authentication Systems
Open ID and OAuth #1 (4:07)
Open ID and OAuth #2 (2:22)
SAML (2:23)
Kerberos (3:19)
Domain 6.1 Design and Validate Assessment, Test, and Audit Strategies
Domain 6 Overview (1:39)
Internal Assessment #1 (3:55)
Internal Assessment #2 (3:10)
Security Audits - Video #1 (3:35)
Security Audits - Video #2 (4:33)
Security Audits - Video #3 (8:08)
Domain 6.2 Conduct Security Control Testing
Penetration Testing (3:44)
Vulnerability Assessment (5:32)
Log Reviews (2:24)
Code Reviews (5:14)
Breach Attack Simulations (3:04)
Misuse Case Testing (3:04)
Domain 6.3 Collect Security Process Data (e.g. Technical and Administrative)
Management Review (2:25)
Account Management (3:04)
Performance and Backup Training (3:33)
Domain 6.4 Analyze Test Output and Generate Report
Security Scan Reporting #1 (3:21)
Security Scan Reporting #2 (2:50)
Security Scan Reporting #3 (2:20)
Exception Handling (4:20)
Ethical Disclosure (4:21)
Domain 6.5 Conduct or Facilitate Security Audits
Conducting Security Audits (3:59)
Internal Audits (3:59)
3rd Party Audits (2:04)
Domain 7.1 Understand and Comply with Investigations
Domain 7 Overview (3:31)
Evidence Collection #1 (3:09)
Evidence Collection #2 (4:42)
Evidence Collection #3 (2:26)
Reporting and Documentation (2:35)
Investigative Techniques (1:32)
Digital Forensics Tools (4:30)
Domain 7.2 Conduct Logging and Monitoring Activities
Logging and Monitoring (5:13)
SIEM (3:16)
Continuous Monitoring (2:30)
Egress Monitoring (4:03)
Threat Intelligence (8:54)
UEBA (1:35)
Domain 7.3 Perform Configuration Management (CM)
Perform Configuration Management (5:36)
Domain 7.4 Apply Foundational Security Operations Concepts
Need to Know (3:28)
Seperation of Duties (5:43)
Privileged Account Management (2:42)
Job Rotation (2:34)
Service Level Agreements (1:52)
Domain 7.5 Apply Resource Protection
Media Management (2:25)
Media Protection Techniques #1 (4:04)
Media Protection Techniques #2 (4:32)
Domain 7.6 Conduct Incident Management
Incident Response (2:36)
Detection (3:37)
Response (3:56)
Mitigation (2:15)
Reporting (3:48)
Recovery (2:19)
Remediation and Lessons Learned (3:51)
Domain 7.7 Operate and Maintain Detective and Preventative Measures
Firewalls #1 (3:36)
Firewalls #2 (3:28)
Firewalls #3 (2:18)
Firewalls #4 (2:50)
IDS and IPS (6:01)
Whitelisting and Blacklinsting (1:41)
Third Party Security Services (1:42)
Sandboxing (2:10)
Honeypots and Honeynets (3:02)
Anti-malware (2:07)
Machine Learning and Artificial Intelligence (2:10)
Domain 7.8 Implement and Support Patch and Vulnerability Management
Patch Management #1 (2:57)
Patch Management Scope (2:08)
Patch Management #2 (1:56)
Domain 7.9 Understand and Participate in Change Management Process
Change Management (3:30)
Security Impact Analysis (3:52)
Domain 7.10 Implement Recovery Strategies
Backup Storage Strategies (3:22)
Recovery Site Strategies #1 (4:49)
Recovery Site Strategies #2 (2:25)
Multiple Processing Sites (6:12)
System Resilience, Quality of Service, and High Availability #1 (2:22)
System Resilience, Quality of Service, and High Availability #2 (2:23)
System Resilience, Quality of Service, and High Availability #3 (2:01)
Domain 7.11 Implement Disaster Recovery (DR) Processes
Response (1:57)
Personnel (1:17)
Communications (2:59)
Assessment_Restoration (3:18)
Training, Awareness and Lessons Learned (4:05)
Domain 7.12 Test Disaster Recovery Plans (DRP)
Overview (2:11)
Read Through Checklist (1:53)
Walk Through-Tabletop (1:41)
Various Tests (3:12)
Domain 7.13 Participate in Business Continuity (BC) Planning and Exercises
Tabletop Steps #1 (5:02)
Tabletop Exercise Outline (4:42)
Tabletop Steps #2 (4:16)
Tabletop Steps #3 (5:47)
Domain 7.14 Implement and Manage Physical Security
Perimeter Security Controls #1 (3:52)
Perimeter Security Controls #2 (3:10)
Internal Security Controls (4:45)
Domain 7.15 Address Personnel Safety and Security Concerns
Travel (6:20)
Overview (0:56)
Security Awareness Training (4:41)
Domain 8.1 Understand and integrate security - Software Development Life Cycle
Domain 8 Overview (2:54)
Development Methodologies #1 (4:17)
Development Methodologies #2 (4:16)
Waterfall (2:42)
Agile_Software Capabilitiy Maturity Model (4:08)
Software Assurance Maturity Model (4:48)
Domain 8.2 Identify and Apply Security Controls in Development Ecosystems
Programming Languages (3:57)
Libraries (3:36)
Continuous Integration and Delivery (2:50)
Software Configuration Management and Code Repositories (4:15)
Security of Software Enviornments (4:15)
Secure Coding and Configuration Management (2:37)
Domain 8.3 Assess the Effectiveness of Software Security
Risk Analysis and Mitigation #1 (3:14)
Auditing and Logging Changes (3:11)
Risk Analysis and Mitigation #2 (2:22)
Domain 8.4 Assess Security Impact of Acquired Software
Open Source (1:14)
Commercial Off The Shelf (COTS) (1:24)
Software Evaluations #1 (2:12)
Software Evaluations #2 (2:04)
Domain 8.5 Define and Apply Secure Coding Guidelines and Standards
Security Weaknesses at Source Code #1 (3:45)
Security Weaknesses at Source Code #2 (4:38)
Security of APIs (4:14)
Software Defined Security (2:24)
Audio Version of the Training
Audio Download
Recovery Site Strategies #2
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock