Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Comprehensive Cybersecurity Course and CISSP Exam Preparation
Training Overview
Description of Training
Video Overview (2:40)
Section : Security and Risk Management
Security Governance (12:50)
Security Concepts (11:03)
Threat Modeling (10:11)
Supply Chain Risk (16:23)
Compliance, Legal, and Regulations (10:20)
Policy, Standards, Procedures and Guidelines (2:45)
Business Continuity (7:09)
Personnel Security Policies and Procedures (7:47)
Risk Management (24:04)
Security Training (2:36)
Quiz 1: Security and Risk Management Quiz
Section : Asset Security
Asset Handling (9:22)
Information Assets (11:06)
Secure Provisioning (1:11)
Data Lifecycle (5:44)
Asset Retention (0:49)
Security Controls and Compliance Requirements (5:14)
Quiz 2: Asset Security Quiz
Section : Architecture and Engineering
Security Models (6:54)
Engineering Processes and Secure Design (5:44)
Security Controls from Requirements (3:07)
Security Capabilities (4:58)
Architecture and Design (5:31)
Security in Systems (18:07)
Security in Systems Part 2 (6:54)
Cryptographic Solutions (22:15)
Cryptanalytic Attacks (5:59)
Security in Facility Design (11:25)
Quiz 3: Architecture and Engineering Quiz
Section : Communication and Network Security
Secure Design in Networks (32:06)
Secure Network Components (23:17)
Secure Communication (16:09)
Quiz 4: Communication and Network Security Quiz
Section : Identity and Access Management
Control Physical and Logical Access (6:36)
Managed Identification (9:23)
Federated Identities (5:50)
Implement and Manage Authorization (1:47)
Identity Lifecycle (3:07)
Authentication System (8:51)
Quiz 5: Identity and Access Management
Section : Security Assessment and Testing
Design and Validate Assessment, Test, and Audit (3:09)
Security Controls Testing (23:43)
Collect Security Process Data (2:38)
Analyze Test Output and Reporting (5:10)
Quiz 6: Security Assessment and Testing
Section : Security Operations
Understand and Comply with Investigations (5:21)
Conducting Logging and Monitoring Activities (17:55)
Configuration Management (0:54)
Security Operations Concepts (2:41)
Resource Protection (5:49)
Operate Detective and Preventative Controls (7:50)
Patch and Vulnerability Management (3:54)
Recovery and Response Strategies (5:21)
Physical Security and Safety (3:07)
Quiz 7: Security Operations
Section : Software Development Security
Security in the SDLC (9:19)
Security Controls in the SDLC (18:14)
Assess Software Security (3:16)
Secure Coding Guidelines (7:49)
Quiz 8: Software Development Security
Audio Version of the Training
Audio Download
Quiz 5: Identity and Access Management
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock