8 Domains All In One - The Complete Cissp Guide

Posted By: ELK1nG

8 Domains All In One - The Complete Cissp Guide
Published 11/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.60 GB | Duration: 2h 16m

This practical course will help you pass the Certified Information Systems Security Professional exam.

What you'll learn
Learn How to Become a CISSP
Domain 1. Security and Risk Management
Domain 2. Asset Security
Domain 3. Security Architecture and Engineering
Domain 4. Communication and Network Security
Domain 5. Identity and Access Management (IAM)
Domain 6. Security Assessment and Testing
Domain 7. Security Operations
Domain 8. Software Development Security
Requirements
You have an attitude to learn CISSP while having fun
Description
Welcome to this course. Certified Information Systems Security Professional (CISSP) is an internationally recognized and coveted qualification. The CISSP exam is for security professionals who understand that poor security can put a company out of business. Success in this respected exam opens the door to your dream job as a security expert with an eye-catching salary. The exam covers eight important security domains - risk management, security architecture, data security, network security, identity management, auditing, security operations, and software development security. But passing the final exam is challenging. Every year a lot of candidates do not prepare sufficiently for the examination, and fail at the final stage. This happens when they cover everything but do not revise properly and hence lack confidence. Designed to cover all the concepts tested in the CISSP exam, CISSP (ISC)2 Certification Practice Exams and Tests will assess your knowledge of information security and introduce you to the tools you need to master to pass the CISSP exam. This course will test your understanding and fill the gaps in your knowledge with the help of descriptive answers and detailed explanations. The broad spectrum of topics included in the CISSP Common Body of Knowledge (CBK) ensure its relevancy across all disciplines in the field of information security. Successful candidates are competent in the following eight domains:Security and Risk ManagementAsset SecuritySecurity Architecture and EngineeringCommunication and Network SecurityIdentity and Access Management (IAM)Security Assessment and TestingSecurity OperationsSoftware Development SecurityThis course provides concise explanations of important concepts in all 8 domains of the CISSP Common Body of Knowledge (CBK). Starting with Confidentiality, Integrity, and Availability, you will focus on classifying information and supporting assets. You will understand data handling requirements for sensitive information before gradually moving on to using secure design principles while implementing and managing engineering processes. You will understand the application of cryptography in communication security and prevent or mitigate strategies for network attacks. You will also learn security control requirements and how to assess their effectiveness. Finally, you will explore advanced topics such as automated and manual test result analysis and reporting methods.

Overview

Section 1: Welcome

Lecture 1 Introduction

Section 2: Domain 1. Security and Risk Management

Lecture 2 Learn and Understand Types of Risk Assessments & Calculations to Memorize

Lecture 3 Understanding the Process

Lecture 4 Learn and Understand Business Impact Analysis (BIA) - 1

Lecture 5 Learn and Understand Business Impact Analysis (BIA) - 2

Section 3: Domain 2. Asset Security

Lecture 6 Understanding Defining Privacy and Personal Information

Lecture 7 Understanding Privacy Laws and Privacy Compliance

Lecture 8 Learn and Understand Information Lifecycle Management - 1

Lecture 9 Learn and Understand Information Lifecycle Management - 2

Section 4: Domain 3. Security Architecture and Engineering

Lecture 10 Understanding Defining Star and Simple Properties, Bell-LaPadula, Biba

Lecture 11 Understanding Cipher Defined, Cipher Characteristics and Algorithm

Lecture 12 Understanding Block Ciphers

Section 5: Domain 4. Communication and Network Security

Lecture 13 Understanding Network Models

Lecture 14 Understanding Pattern Matching, Behavior Decisions and Decison States

Lecture 15 Understanding Non-IP Networking Protocols

Section 6: Domain 5. Identity and Access Management (IAM)

Lecture 16 Understanding CHAP Process and Mutual Authentication

Lecture 17 Learn and Understand Kerberos Process and SESAME

Lecture 18 Learn and Understand Federated Identity Management

Lecture 19 Learn and Understand Access Control Model and Options

Section 7: Domain 6. Security Assessment and Testing

Lecture 20 Understanding Rules of Engagement (ROE)

Lecture 21 Understanding Organizational Knowledge & Testing Team Knowledge

Lecture 22 Understanding Audit Examination, Audit Standards, SSAE16 and SOC Types

Section 8: Domain 7. Security Operations

Lecture 23 Understanding Configuration Management Process

Lecture 24 Understanding Vulnerability Management Process

Lecture 25 Learn and Understand Resiliency and Fault Tolerance

Lecture 26 Learn and Understand Backup Strategies and Automated Backup Strategies

Section 9: Domain 8. Software Development Security

Lecture 27 Learn and Understand OWASP and Injection Illustrated

Lecture 28 Understanding Persistent XSS Illustrated and Reflected XSS Illustrated

Lecture 29 Understanding Project Development Models and Software Development

Chief Information Security Officer,Chief Information Officer,Director of Security,IT Director/Manager,Security Systems Engineer,Security Analyst,Security Manager