8 Domains All In One - The Complete Cissp Guide (updated 1/2023)

Posted By: ELK1nG

8 Domains All In One - The Complete Cissp Guide
Last updated 1/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.95 GB | Duration: 6h 11m

This practical course will help you pass the Certified Information Systems Security Professional exam.

What you'll learn

Learn How to Become a CISSP

Domain 1. Security and Risk Management

Domain 2. Asset Security

Domain 3. Security Architecture and Engineering

Domain 4. Communication and Network Security

Domain 5. Identity and Access Management (IAM)

Domain 6. Security Assessment and Testing

Domain 7. Security Operations

Domain 8. Software Development Security

Requirements

You have an attitude to learn CISSP while having fun

Description

Welcome to this course. Certified Information Systems Security Professional (CISSP) is an internationally recognized and coveted qualification. The CISSP exam is for security professionals who understand that poor security can put a company out of business. Success in this respected exam opens the door to your dream job as a security expert with an eye-catching salary. The exam covers eight important security domains - risk management, security architecture, data security, network security, identity management, auditing, security operations, and software development security. But passing the final exam is challenging. Every year a lot of candidates do not prepare sufficiently for the examination, and fail at the final stage. This happens when they cover everything but do not revise properly and hence lack confidence. Designed to cover all the concepts tested in the CISSP exam, CISSP (ISC)2 Certification Practice Exams and Tests will assess your knowledge of information security and introduce you to the tools you need to master to pass the CISSP exam. This course will test your understanding and fill the gaps in your knowledge with the help of descriptive answers and detailed explanations. The broad spectrum of topics included in the CISSP Common Body of Knowledge (CBK) ensure its relevancy across all disciplines in the field of information security. Successful candidates are competent in the following eight domains:Security and Risk ManagementAsset SecuritySecurity Architecture and EngineeringCommunication and Network SecurityIdentity and Access Management (IAM)Security Assessment and TestingSecurity OperationsSoftware Development SecurityThis course provides concise explanations of important concepts in all 8 domains of the CISSP Common Body of Knowledge (CBK). Starting with Confidentiality, Integrity, and Availability, you will focus on classifying information and supporting assets. You will understand data handling requirements for sensitive information before gradually moving on to using secure design principles while implementing and managing engineering processes. You will understand the application of cryptography in communication security and prevent or mitigate strategies for network attacks. You will also learn security control requirements and how to assess their effectiveness. Finally, you will explore advanced topics such as automated and manual test result analysis and reporting methods.

Overview

Section 1: Welcome

Lecture 1 Introduction

Section 2: Getting started

Lecture 2 Benefits of CISSP Certification

Lecture 3 Introduction to CISSP - Learn and Understand All 8 Domains

Lecture 4 CISSP Certification - Learn and Understand the CISSP Questions - 1

Lecture 5 CISSP Certification - Learn and Understand the CISSP Questions - 2

Lecture 6 CISSP Tips - Learn How to Pass the Exam

Lecture 7 Outro

Section 3: Domain 1. Security and Risk Management

Lecture 8 Domain 1 Introduction

Lecture 9 Learn and Understand Types of Risk Assessments & Calculations to Memorize

Lecture 10 Understanding the Process

Lecture 11 Learn and Understand Business Impact Analysis (BIA) - 1

Lecture 12 Learn and Understand Business Impact Analysis (BIA) - 2

Lecture 13 Domain 1 Questions: Security and Risk Management Questions - 1

Lecture 14 Domain 1 Questions: Security and Risk Management Questions - 2

Section 4: Domain 2. Asset Security

Lecture 15 Domain 2 Introduction

Lecture 16 Understanding Defining Privacy and Personal Information

Lecture 17 Understanding Privacy Laws and Privacy Compliance

Lecture 18 Learn and Understand Information Lifecycle Management - 1

Lecture 19 Learn and Understand Information Lifecycle Management - 2

Lecture 20 Domain 2 Questions: Asset Security Questions - 1

Lecture 21 Domain 2 Questions: Asset Security Questions - 2

Section 5: Domain 3. Security Architecture and Engineering

Lecture 22 Domain 3 Introduction

Lecture 23 Understanding Defining Star and Simple Properties, Bell-LaPadula, Biba

Lecture 24 Understanding Cipher Defined, Cipher Characteristics and Algorithm

Lecture 25 Understanding Block Ciphers

Lecture 26 Understanding Symmetric Encryption and Asymmetric Encryption

Lecture 27 Understanding Key Pair and Message Flow

Lecture 28 Understanding Encrypting Messages

Lecture 29 Understanding Collision and Hash Algorithm

Lecture 30 Learn and Understand Hashed MAC and HMAC Process

Lecture 31 Learn and Understand Digitally Signed Message and Digital Signature Algorithm

Lecture 32 Certification Authorities and Obtaining a Digital Certificate

Lecture 33 Understanding Cryptographic Communications Protocols and Transmission Modes

Lecture 34 Learn and Understand IPsec Components

Lecture 35 Learn and Understand Cryptanalysis and Key Attacks

Lecture 36 Learn and Understand Crypto Attack Defense

Lecture 37 Learn and Understand Database Security Objectives and Privacy Concerns

Lecture 38 Learn and Understand Injection Attack and SQL Injection illustrated

Lecture 39 Domain 3 Questions: Security Architecture and Engineering Questions - 1

Lecture 40 Domain 3 Questions: Security Architecture and Engineering Questions - 2

Section 6: Domain 4. Communication and Network Security

Lecture 41 Domain 4 Introduction

Lecture 42 Understanding Network Models

Lecture 43 Understanding Pattern Matching, Behavior Decisions and Decison States

Lecture 44 Understanding Non-IP Networking Protocols

Lecture 45 Understanding Voice over IP (VoIP)

Lecture 46 Understanding Wireless Modes and Network Configurations

Lecture 47 Understanding 802.11 Security and Wireless Vector Attacks

Lecture 48 Understanding Network Attack Impact and Attack Techniques

Lecture 49 Domain 4 Questions: Communication and Network Security Questions - 1

Lecture 50 Domain 4 Questions: Communication and Network Security Questions - 2

Section 7: Domain 5. Identity and Access Management (IAM)

Lecture 51 Domain 5 Introduction

Lecture 52 Understanding CHAP Process and Mutual Authentication

Lecture 53 Learn and Understand Kerberos Process and SESAME

Lecture 54 Learn and Understand Federated Identity Management

Lecture 55 Learn and Understand Access Control Model and Options

Lecture 56 Domain 5 Questions: Identity and Access Management (IAM) Questions - 1

Lecture 57 Domain 5 Questions: Identity and Access Management (IAM) Questions - 2

Section 8: Domain 6. Security Assessment and Testing

Lecture 58 Domain 6 Introduction

Lecture 59 Understanding Rules of Engagement (ROE)

Lecture 60 Understanding Organizational Knowledge & Testing Team Knowledge

Lecture 61 Understanding Audit Examination, Audit Standards, SSAE16 and SOC Types

Lecture 62 Understanding ISCM Process and Security Automation Domains

Lecture 63 Domain 6 Questions: Security Assessment and Testing Questions - 1

Lecture 64 Domain 6 Questions: Security Assessment and Testing Questions - 2

Section 9: Domain 7. Security Operations

Lecture 65 Domain 7 Introduction

Lecture 66 Understanding Configuration Management Process

Lecture 67 Understanding Vulnerability Management Process

Lecture 68 Learn and Understand Resiliency and Fault Tolerance

Lecture 69 Learn and Understand Backup Strategies and Automated Backup Strategies

Lecture 70 Learn and Understand Evidence Handling and Types of Investigations

Lecture 71 Learn and Understand File Recovery, Metadata, Steganography and Steganalysis

Lecture 72 Learn and Understand CPTED, Identifying Locks and Sensors

Lecture 73 Learn and Understand Social Engineering

Lecture 74 Domain 7 Questions: Security Operations Questions - 1

Lecture 75 Domain 7 Questions: Security Operations Questions - 2

Section 10: Domain 8. Software Development Security

Lecture 76 Domain 8 Introduction

Lecture 77 Learn and Understand OWASP and Injection Illustrated

Lecture 78 Understanding Persistent XSS Illustrated and Reflected XSS Illustrated

Lecture 79 Understanding Project Development Models and Software Development

Lecture 80 Understanding Software Testing Strategies and Negative Testing Scenarios

Lecture 81 Understanding Software Development and Security Development Lifecycle

Lecture 82 Domain 8 Questions: Software Development Security Questions - 1

Lecture 83 Domain 8 Questions: Software Development Security Questions - 2

Section 11: Course Summary

Lecture 84 Tips - Taking the CISSP Exam

Lecture 85 Course Summary

Chief Information Security Officer,Chief Information Officer,Director of Security,IT Director/Manager,Security Systems Engineer,Security Analyst,Security Manager