8 Domains All In One - The Complete Cissp Guide
Last updated 1/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.95 GB | Duration: 6h 11m
Last updated 1/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.95 GB | Duration: 6h 11m
This practical course will help you pass the Certified Information Systems Security Professional exam.
What you'll learn
Learn How to Become a CISSP
Domain 1. Security and Risk Management
Domain 2. Asset Security
Domain 3. Security Architecture and Engineering
Domain 4. Communication and Network Security
Domain 5. Identity and Access Management (IAM)
Domain 6. Security Assessment and Testing
Domain 7. Security Operations
Domain 8. Software Development Security
Requirements
You have an attitude to learn CISSP while having fun
Description
Welcome to this course. Certified Information Systems Security Professional (CISSP) is an internationally recognized and coveted qualification. The CISSP exam is for security professionals who understand that poor security can put a company out of business. Success in this respected exam opens the door to your dream job as a security expert with an eye-catching salary. The exam covers eight important security domains - risk management, security architecture, data security, network security, identity management, auditing, security operations, and software development security. But passing the final exam is challenging. Every year a lot of candidates do not prepare sufficiently for the examination, and fail at the final stage. This happens when they cover everything but do not revise properly and hence lack confidence. Designed to cover all the concepts tested in the CISSP exam, CISSP (ISC)2 Certification Practice Exams and Tests will assess your knowledge of information security and introduce you to the tools you need to master to pass the CISSP exam. This course will test your understanding and fill the gaps in your knowledge with the help of descriptive answers and detailed explanations. The broad spectrum of topics included in the CISSP Common Body of Knowledge (CBK) ensure its relevancy across all disciplines in the field of information security. Successful candidates are competent in the following eight domains:Security and Risk ManagementAsset SecuritySecurity Architecture and EngineeringCommunication and Network SecurityIdentity and Access Management (IAM)Security Assessment and TestingSecurity OperationsSoftware Development SecurityThis course provides concise explanations of important concepts in all 8 domains of the CISSP Common Body of Knowledge (CBK). Starting with Confidentiality, Integrity, and Availability, you will focus on classifying information and supporting assets. You will understand data handling requirements for sensitive information before gradually moving on to using secure design principles while implementing and managing engineering processes. You will understand the application of cryptography in communication security and prevent or mitigate strategies for network attacks. You will also learn security control requirements and how to assess their effectiveness. Finally, you will explore advanced topics such as automated and manual test result analysis and reporting methods.
Overview
Section 1: Welcome
Lecture 1 Introduction
Section 2: Getting started
Lecture 2 Benefits of CISSP Certification
Lecture 3 Introduction to CISSP - Learn and Understand All 8 Domains
Lecture 4 CISSP Certification - Learn and Understand the CISSP Questions - 1
Lecture 5 CISSP Certification - Learn and Understand the CISSP Questions - 2
Lecture 6 CISSP Tips - Learn How to Pass the Exam
Lecture 7 Outro
Section 3: Domain 1. Security and Risk Management
Lecture 8 Domain 1 Introduction
Lecture 9 Learn and Understand Types of Risk Assessments & Calculations to Memorize
Lecture 10 Understanding the Process
Lecture 11 Learn and Understand Business Impact Analysis (BIA) - 1
Lecture 12 Learn and Understand Business Impact Analysis (BIA) - 2
Lecture 13 Domain 1 Questions: Security and Risk Management Questions - 1
Lecture 14 Domain 1 Questions: Security and Risk Management Questions - 2
Section 4: Domain 2. Asset Security
Lecture 15 Domain 2 Introduction
Lecture 16 Understanding Defining Privacy and Personal Information
Lecture 17 Understanding Privacy Laws and Privacy Compliance
Lecture 18 Learn and Understand Information Lifecycle Management - 1
Lecture 19 Learn and Understand Information Lifecycle Management - 2
Lecture 20 Domain 2 Questions: Asset Security Questions - 1
Lecture 21 Domain 2 Questions: Asset Security Questions - 2
Section 5: Domain 3. Security Architecture and Engineering
Lecture 22 Domain 3 Introduction
Lecture 23 Understanding Defining Star and Simple Properties, Bell-LaPadula, Biba
Lecture 24 Understanding Cipher Defined, Cipher Characteristics and Algorithm
Lecture 25 Understanding Block Ciphers
Lecture 26 Understanding Symmetric Encryption and Asymmetric Encryption
Lecture 27 Understanding Key Pair and Message Flow
Lecture 28 Understanding Encrypting Messages
Lecture 29 Understanding Collision and Hash Algorithm
Lecture 30 Learn and Understand Hashed MAC and HMAC Process
Lecture 31 Learn and Understand Digitally Signed Message and Digital Signature Algorithm
Lecture 32 Certification Authorities and Obtaining a Digital Certificate
Lecture 33 Understanding Cryptographic Communications Protocols and Transmission Modes
Lecture 34 Learn and Understand IPsec Components
Lecture 35 Learn and Understand Cryptanalysis and Key Attacks
Lecture 36 Learn and Understand Crypto Attack Defense
Lecture 37 Learn and Understand Database Security Objectives and Privacy Concerns
Lecture 38 Learn and Understand Injection Attack and SQL Injection illustrated
Lecture 39 Domain 3 Questions: Security Architecture and Engineering Questions - 1
Lecture 40 Domain 3 Questions: Security Architecture and Engineering Questions - 2
Section 6: Domain 4. Communication and Network Security
Lecture 41 Domain 4 Introduction
Lecture 42 Understanding Network Models
Lecture 43 Understanding Pattern Matching, Behavior Decisions and Decison States
Lecture 44 Understanding Non-IP Networking Protocols
Lecture 45 Understanding Voice over IP (VoIP)
Lecture 46 Understanding Wireless Modes and Network Configurations
Lecture 47 Understanding 802.11 Security and Wireless Vector Attacks
Lecture 48 Understanding Network Attack Impact and Attack Techniques
Lecture 49 Domain 4 Questions: Communication and Network Security Questions - 1
Lecture 50 Domain 4 Questions: Communication and Network Security Questions - 2
Section 7: Domain 5. Identity and Access Management (IAM)
Lecture 51 Domain 5 Introduction
Lecture 52 Understanding CHAP Process and Mutual Authentication
Lecture 53 Learn and Understand Kerberos Process and SESAME
Lecture 54 Learn and Understand Federated Identity Management
Lecture 55 Learn and Understand Access Control Model and Options
Lecture 56 Domain 5 Questions: Identity and Access Management (IAM) Questions - 1
Lecture 57 Domain 5 Questions: Identity and Access Management (IAM) Questions - 2
Section 8: Domain 6. Security Assessment and Testing
Lecture 58 Domain 6 Introduction
Lecture 59 Understanding Rules of Engagement (ROE)
Lecture 60 Understanding Organizational Knowledge & Testing Team Knowledge
Lecture 61 Understanding Audit Examination, Audit Standards, SSAE16 and SOC Types
Lecture 62 Understanding ISCM Process and Security Automation Domains
Lecture 63 Domain 6 Questions: Security Assessment and Testing Questions - 1
Lecture 64 Domain 6 Questions: Security Assessment and Testing Questions - 2
Section 9: Domain 7. Security Operations
Lecture 65 Domain 7 Introduction
Lecture 66 Understanding Configuration Management Process
Lecture 67 Understanding Vulnerability Management Process
Lecture 68 Learn and Understand Resiliency and Fault Tolerance
Lecture 69 Learn and Understand Backup Strategies and Automated Backup Strategies
Lecture 70 Learn and Understand Evidence Handling and Types of Investigations
Lecture 71 Learn and Understand File Recovery, Metadata, Steganography and Steganalysis
Lecture 72 Learn and Understand CPTED, Identifying Locks and Sensors
Lecture 73 Learn and Understand Social Engineering
Lecture 74 Domain 7 Questions: Security Operations Questions - 1
Lecture 75 Domain 7 Questions: Security Operations Questions - 2
Section 10: Domain 8. Software Development Security
Lecture 76 Domain 8 Introduction
Lecture 77 Learn and Understand OWASP and Injection Illustrated
Lecture 78 Understanding Persistent XSS Illustrated and Reflected XSS Illustrated
Lecture 79 Understanding Project Development Models and Software Development
Lecture 80 Understanding Software Testing Strategies and Negative Testing Scenarios
Lecture 81 Understanding Software Development and Security Development Lifecycle
Lecture 82 Domain 8 Questions: Software Development Security Questions - 1
Lecture 83 Domain 8 Questions: Software Development Security Questions - 2
Section 11: Course Summary
Lecture 84 Tips - Taking the CISSP Exam
Lecture 85 Course Summary
Chief Information Security Officer,Chief Information Officer,Director of Security,IT Director/Manager,Security Systems Engineer,Security Analyst,Security Manager