Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CISSP® Exam Preparation Training Course
Training Overview
Description of Training
Video Overview (0:35)
Introduction
Introduction (1:51)
What is CISSP Certificate (5:47)
Course Outline (5:18)
Latest CISSP Curriculum (4:33)
Course flow and follow up (7:22)
Important communication channel (2:49)
Course Materials and Resources (attached)
Security and Risk Management
Introduction to Security and Risk Management (4:11)
Important Definitions (12:28)
Important Definitions 2 (4:42)
Governance Requirements (5:22)
Due Care and Due Diligence (8:42)
Question (3:09)
Compliance (8:50)
Important Document (6:47)
Ethics (9:12)
Question (3:00)
Security Document 2 (15:35)
Security Document Types (5:18)
Policy Sample (3:14)
The Relationship Between Security Document Types (3:09)
Risk Management (7:51)
Risk Management Part 2 (11:09)
Asset Evaluation (18:33)
Exam Question (4:03)
Rsa Archer (4:41)
ARIS GRC (1:41)
Business Continuity Plans (1:16)
Business Continuity Plans - BCP (14:21)
Business Impact Analysis- BIA (10:15)
MTD - RTO- RPO (11:44)
Disaster Recovery Plan -DRP (3:34)
Alternatives Sites (8:10)
Exam Quiz (8:12)
The Need of Personnel Security (8:39)
Employment Policies (2:20)
Employment Policies -Part 2 (10:29)
Termination (1:40)
Security Awareness (7:02)
Domain Evaluation (5:34)
Asset Security
Introduction to Asset Security (5:35)
Asset Management (10:38)
Information Asset List (12:40)
Classification (8:10)
Labeling (4:44)
DLP (2:55)
DLP - Data Classification (3:37)
Klassify - Data Labeling 2 (2:50)
Privacy (13:02)
Retention (12:12)
Data Security Control (8:01)
Domain Evaluation (5:34)
Security Architecture and Engineering
Introduction to Security Architecture and Engineering (3:52)
Security Engineering Lifecycle (4:14)
NISP SP 14-27 (11:36)
Trusted Computing Base (9:22)
TCB Vulnerability (9:48)
Security Models (17:08)
TCSEC (5:51)
ITSEC (6:14)
Security Architecture Questions (3:18)
Enterprise Security Architecture (5:06)
Virtualization (9:51)
Fault Tolerance (6:32)
Server Fault Tolerance Techniques (2:06)
New Technology (6:28)
Spoofing Number (5:52)
Spoofing Email (7:04)
Cryptography (16:31)
Alternative Ciphers (7:56)
Symmetric Encryption (12:43)
Asymmetric Encryption (13:52)
Hash (6:10)
Physical Security (7:44)
Physical Access barriers (9:49)
Power Issue (3:15)
Fire (5:33)
Domain Evaluation (5:34)
Communications and Network Security
The OSI Model (17:27)
TCP-IP Model (2:50)
Network Architecture Components (17:09)
Firewall (10:43)
Network Types and Topolgies (8:42)
Remote Access Technology (18:34)
Wireless Network (7:20)
Network Attacks (9:03)
Remote Access Security Mechanisms (2:17)
RAID (7:00)
Backup (6:00)
Network Questions (1:21)
Domain Evaluation (5:34)
Identity and Access Management
Access Control (6:50)
Authorization (19:23)
Authentication (18:50)
Single Sign on SSO (13:10)
Central Administration (RADUIS) (4:16)
Access Control Attack (17:15)
Instrusion Detection System (IDS) (6:58)
Access Control Inportant exam area (4:15)
Access Control Questions (8:02)
Domain Evaluation (5:34)
Cloud Security
Introduction to Cloud Security (2:50)
NIST 800-145 (1:55)
IaaS vs PaaS vs SaaS (2:25)
SaaS (4:25)
PaaS (2:04)
IaaS (1:59)
Storage Architecture (1:25)
Data Life Cycle Security (4:27)
Hypervisor (4:49)
Virtualization Security (5:26)
Perimeter Security (6:05)
Security Assessment and Testing
Introduction Security Assessment and Testing (11:20)
Test Output (4:33)
Vulnerability asessment - Part 1 (2:16)
Vulnerability asessment -Part 2 (3:16)
Nessus VA (13:25)
Nessus VA- Part 2 (14:05)
Nessus VA Report (5:20)
OWASP ZAP - VA (5:06)
Nexpose VA (5:05)
Penetration testing (8:33)
Reconnaissance Demo -Maltego 2 (7:59)
Scanning Demo -Zenmap (5:06)
Exploitation Demo -MetaSploit 2 (14:33)
Event Log Review 2 (7:19)
NIST 800-92 (2:56)
SIEM Solution (6:16)
SIEM Solution Demo - Qradar (3:09)
Code Review (5:20)
Security KPI's (6:57)
Security Operations
Introduction to Security Operation 2 (1:40)
Security Operation 2 (9:53)
Guidelines for Applying Security Operations Concepts
Domain Evaluation (5:34)
Software Development Security
The System Life Cycle (6:45)
Software development Methods (6:42)
Change Control Process (3:07)
Security Consideration (1:54)
Software Control (2:50)
What is SQL Injection (11:26)
Introduction to SQL Injection 2 (11:26)
Domain Evaluation (5:34)
Course Outline
Download
Complete and Continue
Become a Member and Get
Unlimited Access
to 30,000+ Top Cyber Security Courses And Labs.
UPGRADE NOW