Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Concepts Of Cissp - Domain 1

    Posted By: ELK1nG
    Concepts Of Cissp - Domain 1

    Concepts Of Cissp - Domain 1
    Published 12/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 10.97 GB | Duration: 11h 33m

    The objective of this course series "Concepts of CISSP" is to cover CISSP domains in the most effective way possible.

    What you'll learn

    Understand domain 1 "Security and Risk Management" of CISSP

    Get in depth practical insight into all topics, key definitions and concepts

    Able to memorise key points and get prepared for CISSP exam

    Able to get ready for Cybersecurity interviews

    Requirements

    Basic IT background

    Description

    Do you feel CISSP certification is difficult?This course will make CISSP certification fun and easy. This module of "Concepts of CISSP" series will cover domain1. We will be releasing separate domains as separate modules.Welcome to CISSP. CISSP is one of the most reputable courses in the world of information security. The CISSP covers the fundamental elements of the entire cybersecurity field – from security and risk management to communication and network security to security testing and operations. The CISSP is designed for security professionals who have spent a few years in the industry, are currently in an information security position, and want to study cybersecurity leadership and operations.We will cover CISSP syllabus here and will focus on topics to explore core concepts, looking at the wider landscape and see tips and tricks for exams questions.I will be presenting drawings and whiteboard sessions to better engage with you and make the entire journey fun. The main goal of my course is to make the material as vivid as possible.Please note that the CISSP exam outline documented on CISSP website may not appear exactly same in my video discussions. The reason is because some of the topics are already discussed in the videos and we have overlapping situations. Please comment on if there is something missing or need more explanations. I will be happy to improvise by adding new content to the module.I'm hoping you'll find this training useful and enjoyable. If you happen to have any questions and further suggestions, feel free to reach out.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction to this CISSP course

    Lecture 2 How to pass CISSP?

    Lecture 3 My CISSP Journey - The Exam Strategy

    Lecture 4 Introduction to Domain 1: Security and Risk Management

    Lecture 5 Introduction to Domain 1: Journey of domain 1

    Section 2: Understand, adhere to, and promote professional ethics

    Lecture 6 Organisational and (ISC)² Code of Professional Ethics

    Section 3: Understand and apply security concepts

    Lecture 7 One Key Idea about Principles, Policy and Governance

    Lecture 8 Confidentiality, integrity, and availability, authenticity and nonrepudiation

    Lecture 9 Quick Recap - CIA, DAD additional discussion

    Lecture 10 What is IAAA? Auditing and Monitoring

    Lecture 11 Defence in depth. What are different Protection Mechanism?

    Lecture 12 Physical and Logical Security Boundaries

    Lecture 13 Deep dive into Logical Boundary Concepts

    Section 4: Evaluate and apply security governance principles

    Lecture 14 Security Management Planning and Security Function

    Lecture 15 Organizational Processes, Roles and Responsibilities

    Lecture 16 Introduction to Security Models and Framework

    Lecture 17 Security Control Frameworks

    Lecture 18 RMF and CSF

    Lecture 19 Due care/due diligence Threat Management and Supply Chain Risk Management

    Lecture 20 Additional Episode: How to do Reduction Analysis

    Section 5: Determine compliance and other requirements

    Lecture 21 Contractual, legal, industry standards, and regulatory requirements

    Lecture 22 Privacy history and requirements understanding

    Section 6: Understand legal and regulatory issues that pertain to information security in a

    Lecture 23 Cybercrimes and data breaches

    Lecture 24 Licensing and IP requirements

    Lecture 25 Software licensing

    Lecture 26 Import/export controls Privacy and Transborder data flow

    Section 7: Security policy, standards, procedures, and guidelines

    Lecture 27 Develop, document, and implement security policy, standards, procedures, and gui

    Section 8: Understand requirements for investigation types

    Lecture 28 Understand requirements for investigation types (i.e., administrative, criminal,

    Lecture 29 Evidences, IOCE and Computer Crimes

    Section 9: Identify, analyze, and prioritize Business Continuity (BC) requirements

    Lecture 30 BCP - The Big Picture

    Lecture 31 BCP Steps and Business Impact Analysis (BIA)

    Lecture 32 Starting the BCP and BOA

    Lecture 33 BCP - Complete Cycle

    Lecture 34 Additional Episode - BCP Second Review

    Section 10: Contribute to and enforce personnel security policies and procedures

    Lecture 35 Contribute to and enforce personnel security policies and procedures

    Section 11: Understand and apply risk management concepts

    Lecture 36 Risk Terminologies and Concepts

    Lecture 37 NIST 800-37, 800-39, 800-30, 800-53/A and related Concepts

    Lecture 38 How to manage Risk - Risk Management

    Lecture 39 NIST 800-37 and CSF

    Lecture 40 Types and forms of security controls and RMM

    Section 12: Social Engineering and Security Awareness

    Lecture 41 Social Engineering Principles and Types and Awareness methods

    IT professionals, Security professionals, Computer science students