Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    8 Domains All In One - The Complete Cissp Guide (updated 1/2023)

    Posted By: ELK1nG
    8 Domains All In One - The Complete Cissp Guide (updated 1/2023)

    8 Domains All In One - The Complete Cissp Guide
    Last updated 1/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 3.95 GB | Duration: 6h 11m

    This practical course will help you pass the Certified Information Systems Security Professional exam.

    What you'll learn

    Learn How to Become a CISSP

    Domain 1. Security and Risk Management

    Domain 2. Asset Security

    Domain 3. Security Architecture and Engineering

    Domain 4. Communication and Network Security

    Domain 5. Identity and Access Management (IAM)

    Domain 6. Security Assessment and Testing

    Domain 7. Security Operations

    Domain 8. Software Development Security

    Requirements

    You have an attitude to learn CISSP while having fun

    Description

    Welcome to this course. Certified Information Systems Security Professional (CISSP) is an internationally recognized and coveted qualification. The CISSP exam is for security professionals who understand that poor security can put a company out of business. Success in this respected exam opens the door to your dream job as a security expert with an eye-catching salary. The exam covers eight important security domains - risk management, security architecture, data security, network security, identity management, auditing, security operations, and software development security. But passing the final exam is challenging. Every year a lot of candidates do not prepare sufficiently for the examination, and fail at the final stage. This happens when they cover everything but do not revise properly and hence lack confidence. Designed to cover all the concepts tested in the CISSP exam, CISSP (ISC)2 Certification Practice Exams and Tests will assess your knowledge of information security and introduce you to the tools you need to master to pass the CISSP exam. This course will test your understanding and fill the gaps in your knowledge with the help of descriptive answers and detailed explanations. The broad spectrum of topics included in the CISSP Common Body of Knowledge (CBK) ensure its relevancy across all disciplines in the field of information security. Successful candidates are competent in the following eight domains:Security and Risk ManagementAsset SecuritySecurity Architecture and EngineeringCommunication and Network SecurityIdentity and Access Management (IAM)Security Assessment and TestingSecurity OperationsSoftware Development SecurityThis course provides concise explanations of important concepts in all 8 domains of the CISSP Common Body of Knowledge (CBK). Starting with Confidentiality, Integrity, and Availability, you will focus on classifying information and supporting assets. You will understand data handling requirements for sensitive information before gradually moving on to using secure design principles while implementing and managing engineering processes. You will understand the application of cryptography in communication security and prevent or mitigate strategies for network attacks. You will also learn security control requirements and how to assess their effectiveness. Finally, you will explore advanced topics such as automated and manual test result analysis and reporting methods.

    Overview

    Section 1: Welcome

    Lecture 1 Introduction

    Section 2: Getting started

    Lecture 2 Benefits of CISSP Certification

    Lecture 3 Introduction to CISSP - Learn and Understand All 8 Domains

    Lecture 4 CISSP Certification - Learn and Understand the CISSP Questions - 1

    Lecture 5 CISSP Certification - Learn and Understand the CISSP Questions - 2

    Lecture 6 CISSP Tips - Learn How to Pass the Exam

    Lecture 7 Outro

    Section 3: Domain 1. Security and Risk Management

    Lecture 8 Domain 1 Introduction

    Lecture 9 Learn and Understand Types of Risk Assessments & Calculations to Memorize

    Lecture 10 Understanding the Process

    Lecture 11 Learn and Understand Business Impact Analysis (BIA) - 1

    Lecture 12 Learn and Understand Business Impact Analysis (BIA) - 2

    Lecture 13 Domain 1 Questions: Security and Risk Management Questions - 1

    Lecture 14 Domain 1 Questions: Security and Risk Management Questions - 2

    Section 4: Domain 2. Asset Security

    Lecture 15 Domain 2 Introduction

    Lecture 16 Understanding Defining Privacy and Personal Information

    Lecture 17 Understanding Privacy Laws and Privacy Compliance

    Lecture 18 Learn and Understand Information Lifecycle Management - 1

    Lecture 19 Learn and Understand Information Lifecycle Management - 2

    Lecture 20 Domain 2 Questions: Asset Security Questions - 1

    Lecture 21 Domain 2 Questions: Asset Security Questions - 2

    Section 5: Domain 3. Security Architecture and Engineering

    Lecture 22 Domain 3 Introduction

    Lecture 23 Understanding Defining Star and Simple Properties, Bell-LaPadula, Biba

    Lecture 24 Understanding Cipher Defined, Cipher Characteristics and Algorithm

    Lecture 25 Understanding Block Ciphers

    Lecture 26 Understanding Symmetric Encryption and Asymmetric Encryption

    Lecture 27 Understanding Key Pair and Message Flow

    Lecture 28 Understanding Encrypting Messages

    Lecture 29 Understanding Collision and Hash Algorithm

    Lecture 30 Learn and Understand Hashed MAC and HMAC Process

    Lecture 31 Learn and Understand Digitally Signed Message and Digital Signature Algorithm

    Lecture 32 Certification Authorities and Obtaining a Digital Certificate

    Lecture 33 Understanding Cryptographic Communications Protocols and Transmission Modes

    Lecture 34 Learn and Understand IPsec Components

    Lecture 35 Learn and Understand Cryptanalysis and Key Attacks

    Lecture 36 Learn and Understand Crypto Attack Defense

    Lecture 37 Learn and Understand Database Security Objectives and Privacy Concerns

    Lecture 38 Learn and Understand Injection Attack and SQL Injection illustrated

    Lecture 39 Domain 3 Questions: Security Architecture and Engineering Questions - 1

    Lecture 40 Domain 3 Questions: Security Architecture and Engineering Questions - 2

    Section 6: Domain 4. Communication and Network Security

    Lecture 41 Domain 4 Introduction

    Lecture 42 Understanding Network Models

    Lecture 43 Understanding Pattern Matching, Behavior Decisions and Decison States

    Lecture 44 Understanding Non-IP Networking Protocols

    Lecture 45 Understanding Voice over IP (VoIP)

    Lecture 46 Understanding Wireless Modes and Network Configurations

    Lecture 47 Understanding 802.11 Security and Wireless Vector Attacks

    Lecture 48 Understanding Network Attack Impact and Attack Techniques

    Lecture 49 Domain 4 Questions: Communication and Network Security Questions - 1

    Lecture 50 Domain 4 Questions: Communication and Network Security Questions - 2

    Section 7: Domain 5. Identity and Access Management (IAM)

    Lecture 51 Domain 5 Introduction

    Lecture 52 Understanding CHAP Process and Mutual Authentication

    Lecture 53 Learn and Understand Kerberos Process and SESAME

    Lecture 54 Learn and Understand Federated Identity Management

    Lecture 55 Learn and Understand Access Control Model and Options

    Lecture 56 Domain 5 Questions: Identity and Access Management (IAM) Questions - 1

    Lecture 57 Domain 5 Questions: Identity and Access Management (IAM) Questions - 2

    Section 8: Domain 6. Security Assessment and Testing

    Lecture 58 Domain 6 Introduction

    Lecture 59 Understanding Rules of Engagement (ROE)

    Lecture 60 Understanding Organizational Knowledge & Testing Team Knowledge

    Lecture 61 Understanding Audit Examination, Audit Standards, SSAE16 and SOC Types

    Lecture 62 Understanding ISCM Process and Security Automation Domains

    Lecture 63 Domain 6 Questions: Security Assessment and Testing Questions - 1

    Lecture 64 Domain 6 Questions: Security Assessment and Testing Questions - 2

    Section 9: Domain 7. Security Operations

    Lecture 65 Domain 7 Introduction

    Lecture 66 Understanding Configuration Management Process

    Lecture 67 Understanding Vulnerability Management Process

    Lecture 68 Learn and Understand Resiliency and Fault Tolerance

    Lecture 69 Learn and Understand Backup Strategies and Automated Backup Strategies

    Lecture 70 Learn and Understand Evidence Handling and Types of Investigations

    Lecture 71 Learn and Understand File Recovery, Metadata, Steganography and Steganalysis

    Lecture 72 Learn and Understand CPTED, Identifying Locks and Sensors

    Lecture 73 Learn and Understand Social Engineering

    Lecture 74 Domain 7 Questions: Security Operations Questions - 1

    Lecture 75 Domain 7 Questions: Security Operations Questions - 2

    Section 10: Domain 8. Software Development Security

    Lecture 76 Domain 8 Introduction

    Lecture 77 Learn and Understand OWASP and Injection Illustrated

    Lecture 78 Understanding Persistent XSS Illustrated and Reflected XSS Illustrated

    Lecture 79 Understanding Project Development Models and Software Development

    Lecture 80 Understanding Software Testing Strategies and Negative Testing Scenarios

    Lecture 81 Understanding Software Development and Security Development Lifecycle

    Lecture 82 Domain 8 Questions: Software Development Security Questions - 1

    Lecture 83 Domain 8 Questions: Software Development Security Questions - 2

    Section 11: Course Summary

    Lecture 84 Tips - Taking the CISSP Exam

    Lecture 85 Course Summary

    Chief Information Security Officer,Chief Information Officer,Director of Security,IT Director/Manager,Security Systems Engineer,Security Analyst,Security Manager