Cissp - Certified Information System Security Professional

Posted By: ELK1nG

Cissp - Certified Information System Security Professional
Published 7/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 6.96 GB | Duration: 22h 10m

Full CISSP Training - 2023

What you'll learn

Understand the eight domains of the CISSP Common Body of Knowledge (CBK) and their relationship to information security.

Gain a comprehensive understanding of information security principles, concepts, and practices, including access control, cryptography, network security.

Learn how to apply security and risk management principles to protect an organization's assets and resources.

Understand the different types of threats and vulnerabilities that can impact an organization's information security.

Learn how to design and implement secure network architectures and communication channels.

Understand the principles of identity and access management and how to implement them in an organization.

Learn how to assess and test security controls and processes to ensure their effectiveness.

Understand the principles of security operations, including incident management and disaster recovery planning.

Learn how to design and implement secure software development processes and controls.

Prepare for the CISSP certification exam and become a certified information security professional.

Requirements

To enroll in this course, you should have a basic understanding of information security concepts and practices. There are no other prerequisites for this course.

Description

Welcome to the Certified Information Systems Security Professional (CISSP) course on Udemy! In this landing page, we will provide you with all the details you need to know about the course.Course Overview:The CISSP course is designed to provide you with a comprehensive understanding of the eight domains of information security, as defined by the International Information System Security Certification Consortium (ISC)². These domains include Security and Risk Management, Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security.In this course, you'll learn about the principles, concepts, and practices of information security, including access control, cryptography, network security, and more. You will also be prepared to take the CISSP certification exam, which will test your knowledge of the eight domains.Course Details:Course Name: Certified Information Systems Security Professional (CISSP)Course Curriculum:The course is divided into the following eight domains:Security and Risk ManagementSecurity Governance PrinciplesComplianceLegal and Regulatory IssuesProfessional EthicsAsset SecurityInformation and Asset ClassificationOwnershipProtect PrivacyRetentionSecurity EngineeringEngineering Processes using Secure Design PrinciplesSecurity Models and ArchitectureSecurity Evaluation ModelsCommunication and Network SecuritySecure Network Architecture DesignSecure Network ComponentsSecure Communication ChannelsIdentity and Access ManagementPhysical and Logical Access to AssetsIdentity Management ImplementationAuthenticationSecurity Assessment and TestingAssessment and Test StrategiesSecurity Process DataSecurity Control TestingSecurity OperationsUnderstand and Support InvestigationsIncident ManagementDisaster Recovery PlanningSoftware Development SecurityDevelopment Environment Security ControlsSoftware Security EffectivenessAcquired Software Security ImpactBenefits of Taking This Course:Comprehensive coverage of the eight domains of information securityPreparation for the CISSP certification examIn-depth understanding of information security principles, concepts, and practicesReal-world examples and case studiesInteractive quizzes and assessmentsLifetime access to course materialsInstructor Bio:Nour is CISSP Trainer for more than 10 years, he work as Information Security SME at one of the biggest organisations.Enrollment and Requirements:To enroll in this course, you should have a basic understanding of information security concepts and practices. There are no other prerequisites for this course. To enroll, simply visit the course landing page on Udemy and click on the "Enroll Now" button.The CISSP course on Udemy is an excellent choice for anyone who wants to learn about information security principles, concepts, and practices. With comprehensive coverage of the eight domains of information security, interactive quizzes and assessments, and preparation for the CISSP certification exam, this course will help you become a skilled information security professional. Enroll now and start your journey towards a successful career in information security!

Overview

Section 1: CISSP Course Introduction

Lecture 1 CISSP Course Introduction

Section 2: Domain 1 - Security and Risk Management

Lecture 2 Domain 1 Key Concepts

Lecture 3 Security Threats

Lecture 4 Vulnerabilities and Cyber Attacks

Lecture 5 Man in the middle attack

Lecture 6 Cyber Kill Chain, the Process of Hacking into systems

Lecture 7 The Security Objective and CIA Triad

Lecture 8 Privacy Requirements and regulations

Lecture 9 Security Controls

Lecture 10 Example for Security Controls

Lecture 11 Selection of controls and best practices in implementing

Lecture 12 Security Control Assessment and Defense in depth

Lecture 13 AAA

Lecture 14 Security Strategy - Abstraction

Lecture 15 Protection Mechanisms - Data Hiding and Security through obscurity

Lecture 16 Security Manager Roles

Lecture 17 Organizational Structure

Lecture 18 Security Program and Strategy

Lecture 19 Security Governance

Lecture 20 Security Policies

Lecture 21 Security Standards

Lecture 22 Procedures and Guidelines

Lecture 23 Review of Policies and Standards

Lecture 24 Risk Management Overview

Lecture 25 Types of Risk and RA and Risk Response

Lecture 26 Risk Reporting and Monitoring

Lecture 27 Metrics and Key Performance Indicators

Lecture 28 Key Risk Indicators - KRI

Lecture 29 Risk Management Frameworks

Lecture 30 Maturity Assessment Process

Lecture 31 Law and Legal Regulations

Lecture 32 ISC2 Code of Ethics

Section 3: Domain 2 - Asset Security

Lecture 33 Domain 2 Key Concepts

Lecture 34 Data Lifecycle

Lecture 35 Sensitive Data

Lecture 36 Data Classification Levels

Lecture 37 Data Security Measures 1

Lecture 38 Data Security Measures 2

Lecture 39 Asset life cycle

Lecture 40 Roles in Data and Assets Protection

Lecture 41 Data Destruction

Lecture 42 RACI Matrix

Lecture 43 Privacy Regulation Rules

Lecture 44 Social Engineering

Lecture 45 Security Awareness Program

Lecture 46 Personnel Security Measures

Lecture 47 Due Care vs Due Dillegence

Lecture 48 Third Party and Vendor Risk

Lecture 49 Securing Supply chain Risk Management

Section 4: Domain 3 - Security Architecture and Engineering

Lecture 50 Domain 3 Key Concepts

Lecture 51 Cryptography overview

Lecture 52 Cryptography Design Concepts

Lecture 53 Symmetric Encryption Overview

Lecture 54 Asymmetric Encryption

Lecture 55 Benefits of Asymmetric Encryption

Lecture 56 Integrity and Hashing and Salting

Lecture 57 Encryption and Hashing and Encoding

Lecture 58 Digital Signature

Lecture 59 PKI

Lecture 60 Digital Certificate

Lecture 61 Applications of Encryption

Lecture 62 Emerging Cryptographic technologies

Lecture 63 Secure Design Principals

Lecture 64 Security Models, Take Grant, BLP, Biba, Clark Wilson

Lecture 65 Brewer Nash and HRU Security Models

Lecture 66 TCSEC, ITSEC and Common Criteria

Lecture 67 Security Facility Design

Lecture 68 Physical Access Control

Lecture 69 Badges and Smart Cards and PACs

Lecture 70 Motion Detectors

Lecture 71 Security Cameras

Lecture 72 Data and Perimeter Security

Lecture 73 Securing Power Sources

Lecture 74 Fire Suppression System

Section 5: Domain 4 - Communication and Network Security

Lecture 75 Domain 4 Key Concepts

Lecture 76 Network Introduction

Lecture 77 OSI and TCPIP

Lecture 78 OSI Model Explaining

Lecture 79 Explaining Layers 1,2,3

Lecture 80 Explaining Layers 4,5,6,7

Lecture 81 Routing and Routed Protocols

Lecture 82 Domain Name System Overview

Lecture 83 Address Resolution Protocol

Lecture 84 VoIP and QoS

Lecture 85 Layer 2 Attacks

Lecture 86 Network Segmentation

Lecture 87 NAC and dot1x and Port Security

Lecture 88 Wireless Security

Lecture 89 DMZ and Screened Subnet

Lecture 90 Firewalls

Lecture 91 Proxy, Load Balance devices, Email Security

Lecture 92 VPN Service

Lecture 93 IP Security Protocol (IPSEC)

Section 6: Domain 5 - Identity and Access Management (IAM)

Lecture 94 Domain 5 Key Concepts

Lecture 95 AAA Overview

Lecture 96 Authentication

Lecture 97 MFA and Bio-metric Authentication

Lecture 98 Passwordless Authentication Methods

Lecture 99 SSO and RSO

Lecture 100 Authorization and Access control Models

Lecture 101 Accounting and Auditing

Lecture 102 Identity Access Management Solutions

Lecture 103 Password Attacks

Lecture 104 LDAP Server - Active Directory

Lecture 105 Manage Privileged Account

Lecture 106 Least Privilege and Two Person Control

Lecture 107 SoD and Need to Know

Lecture 108 Job Rotation and Mandatory Vacation

Section 7: Domain 6 - Security Assessment and Testing

Lecture 109 Domain 6 Key Concepts

Lecture 110 Security Testing and assessment and Auditing

Lecture 111 System Auditing

Lecture 112 Security Testing - PT, SAST, SCA

Lecture 113 Vulnerability Assessment

Lecture 114 VA Scanning Tool

Lecture 115 Penetration Testing

Lecture 116 Software Use Case Test and Abuse Case

Lecture 117 Threat Modelling overview

Lecture 118 Threat Model STRIDE & DREAD

Lecture 119 Threat Model - PASTA

Lecture 120 Service Organization Controls - SOC Audit

Section 8: Domain 7 - Security Operations

Lecture 121 Domain 7 Key Concepts

Lecture 122 Change Management Process

Lecture 123 Types of Changes

Lecture 124 Configuration Management

Lecture 125 Patch Management

Lecture 126 Release Management

Lecture 127 Incident Management

Lecture 128 Collecting digital Evidences and Forensic

Lecture 129 Incident Response Training

Lecture 130 Incident Response Plan Testing

Lecture 131 SOC Team

Lecture 132 SIEM

Lecture 133 EDR, NDR

Lecture 134 XDR,SOAR

Lecture 135 Threat Intel and MITRE Framework

Lecture 136 What is Disaster and BIA

Lecture 137 What is the DRP

Lecture 138 What is the BCP

Lecture 139 BCP Considerations

Lecture 140 RPO & RTO

Lecture 141 AIW,SDO,MTO and Relation

Lecture 142 Linking RPO, RTO, AIW, SDO, MTO

Lecture 143 Recovery Strategies

Lecture 144 Reciprocal Agreement

Lecture 145 BCP Testing and Evaluation

Lecture 146 Data Backup

Lecture 147 Storage Redundancy using RAID

Section 9: Domain 8 - Software Development Security

Lecture 148 Domain 8 Key Concepts

Lecture 149 What is Programming

Lecture 150 Software development methodologies

Lecture 151 DevOps

Lecture 152 DevSecOps

Lecture 153 Software Testing

Lecture 154 Software UAT Testing

Lecture 155 Version Control System and Code Repository

Lecture 156 Secure Code Practices

Lecture 157 Certification vs Accreditation and Authorize to Operate

Lecture 158 Software Project Acquisition Steps

Lecture 159 Project Management Tools - GANTT, PERT, CPM, TIMEBOX

Lecture 160 Database Overview

Lecture 161 Database Security

Lecture 162 Database Resiliency

Lecture 163 Architectual Concepts, SOA, VDI, SDP

Lecture 164 Virtualization and SDDC

Lecture 165 SDN and SDWAN

Lecture 166 Containers and Functions

Lecture 167 CDN - Content Delivery Network

Lecture 168 Cloud Computing

Information security professionals who want to enhance their knowledge and skills,IT professionals who want to transition to a career in information security,Security consultants who want to expand their expertise,Project managers who want to understand the security aspects of project management,Anyone who wants to prepare for the CISSP certification exam and become a certified information security professional