Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Cissp - Certified Information System Security Professional

    Posted By: ELK1nG
    Cissp - Certified Information System Security Professional

    Cissp - Certified Information System Security Professional
    Published 7/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 6.96 GB | Duration: 22h 10m

    Full CISSP Training - 2023

    What you'll learn

    Understand the eight domains of the CISSP Common Body of Knowledge (CBK) and their relationship to information security.

    Gain a comprehensive understanding of information security principles, concepts, and practices, including access control, cryptography, network security.

    Learn how to apply security and risk management principles to protect an organization's assets and resources.

    Understand the different types of threats and vulnerabilities that can impact an organization's information security.

    Learn how to design and implement secure network architectures and communication channels.

    Understand the principles of identity and access management and how to implement them in an organization.

    Learn how to assess and test security controls and processes to ensure their effectiveness.

    Understand the principles of security operations, including incident management and disaster recovery planning.

    Learn how to design and implement secure software development processes and controls.

    Prepare for the CISSP certification exam and become a certified information security professional.

    Requirements

    To enroll in this course, you should have a basic understanding of information security concepts and practices. There are no other prerequisites for this course.

    Description

    Welcome to the Certified Information Systems Security Professional (CISSP) course on Udemy! In this landing page, we will provide you with all the details you need to know about the course.Course Overview:The CISSP course is designed to provide you with a comprehensive understanding of the eight domains of information security, as defined by the International Information System Security Certification Consortium (ISC)². These domains include Security and Risk Management, Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security.In this course, you'll learn about the principles, concepts, and practices of information security, including access control, cryptography, network security, and more. You will also be prepared to take the CISSP certification exam, which will test your knowledge of the eight domains.Course Details:Course Name: Certified Information Systems Security Professional (CISSP)Course Curriculum:The course is divided into the following eight domains:Security and Risk ManagementSecurity Governance PrinciplesComplianceLegal and Regulatory IssuesProfessional EthicsAsset SecurityInformation and Asset ClassificationOwnershipProtect PrivacyRetentionSecurity EngineeringEngineering Processes using Secure Design PrinciplesSecurity Models and ArchitectureSecurity Evaluation ModelsCommunication and Network SecuritySecure Network Architecture DesignSecure Network ComponentsSecure Communication ChannelsIdentity and Access ManagementPhysical and Logical Access to AssetsIdentity Management ImplementationAuthenticationSecurity Assessment and TestingAssessment and Test StrategiesSecurity Process DataSecurity Control TestingSecurity OperationsUnderstand and Support InvestigationsIncident ManagementDisaster Recovery PlanningSoftware Development SecurityDevelopment Environment Security ControlsSoftware Security EffectivenessAcquired Software Security ImpactBenefits of Taking This Course:Comprehensive coverage of the eight domains of information securityPreparation for the CISSP certification examIn-depth understanding of information security principles, concepts, and practicesReal-world examples and case studiesInteractive quizzes and assessmentsLifetime access to course materialsInstructor Bio:Nour is CISSP Trainer for more than 10 years, he work as Information Security SME at one of the biggest organisations.Enrollment and Requirements:To enroll in this course, you should have a basic understanding of information security concepts and practices. There are no other prerequisites for this course. To enroll, simply visit the course landing page on Udemy and click on the "Enroll Now" button.The CISSP course on Udemy is an excellent choice for anyone who wants to learn about information security principles, concepts, and practices. With comprehensive coverage of the eight domains of information security, interactive quizzes and assessments, and preparation for the CISSP certification exam, this course will help you become a skilled information security professional. Enroll now and start your journey towards a successful career in information security!

    Overview

    Section 1: CISSP Course Introduction

    Lecture 1 CISSP Course Introduction

    Section 2: Domain 1 - Security and Risk Management

    Lecture 2 Domain 1 Key Concepts

    Lecture 3 Security Threats

    Lecture 4 Vulnerabilities and Cyber Attacks

    Lecture 5 Man in the middle attack

    Lecture 6 Cyber Kill Chain, the Process of Hacking into systems

    Lecture 7 The Security Objective and CIA Triad

    Lecture 8 Privacy Requirements and regulations

    Lecture 9 Security Controls

    Lecture 10 Example for Security Controls

    Lecture 11 Selection of controls and best practices in implementing

    Lecture 12 Security Control Assessment and Defense in depth

    Lecture 13 AAA

    Lecture 14 Security Strategy - Abstraction

    Lecture 15 Protection Mechanisms - Data Hiding and Security through obscurity

    Lecture 16 Security Manager Roles

    Lecture 17 Organizational Structure

    Lecture 18 Security Program and Strategy

    Lecture 19 Security Governance

    Lecture 20 Security Policies

    Lecture 21 Security Standards

    Lecture 22 Procedures and Guidelines

    Lecture 23 Review of Policies and Standards

    Lecture 24 Risk Management Overview

    Lecture 25 Types of Risk and RA and Risk Response

    Lecture 26 Risk Reporting and Monitoring

    Lecture 27 Metrics and Key Performance Indicators

    Lecture 28 Key Risk Indicators - KRI

    Lecture 29 Risk Management Frameworks

    Lecture 30 Maturity Assessment Process

    Lecture 31 Law and Legal Regulations

    Lecture 32 ISC2 Code of Ethics

    Section 3: Domain 2 - Asset Security

    Lecture 33 Domain 2 Key Concepts

    Lecture 34 Data Lifecycle

    Lecture 35 Sensitive Data

    Lecture 36 Data Classification Levels

    Lecture 37 Data Security Measures 1

    Lecture 38 Data Security Measures 2

    Lecture 39 Asset life cycle

    Lecture 40 Roles in Data and Assets Protection

    Lecture 41 Data Destruction

    Lecture 42 RACI Matrix

    Lecture 43 Privacy Regulation Rules

    Lecture 44 Social Engineering

    Lecture 45 Security Awareness Program

    Lecture 46 Personnel Security Measures

    Lecture 47 Due Care vs Due Dillegence

    Lecture 48 Third Party and Vendor Risk

    Lecture 49 Securing Supply chain Risk Management

    Section 4: Domain 3 - Security Architecture and Engineering

    Lecture 50 Domain 3 Key Concepts

    Lecture 51 Cryptography overview

    Lecture 52 Cryptography Design Concepts

    Lecture 53 Symmetric Encryption Overview

    Lecture 54 Asymmetric Encryption

    Lecture 55 Benefits of Asymmetric Encryption

    Lecture 56 Integrity and Hashing and Salting

    Lecture 57 Encryption and Hashing and Encoding

    Lecture 58 Digital Signature

    Lecture 59 PKI

    Lecture 60 Digital Certificate

    Lecture 61 Applications of Encryption

    Lecture 62 Emerging Cryptographic technologies

    Lecture 63 Secure Design Principals

    Lecture 64 Security Models, Take Grant, BLP, Biba, Clark Wilson

    Lecture 65 Brewer Nash and HRU Security Models

    Lecture 66 TCSEC, ITSEC and Common Criteria

    Lecture 67 Security Facility Design

    Lecture 68 Physical Access Control

    Lecture 69 Badges and Smart Cards and PACs

    Lecture 70 Motion Detectors

    Lecture 71 Security Cameras

    Lecture 72 Data and Perimeter Security

    Lecture 73 Securing Power Sources

    Lecture 74 Fire Suppression System

    Section 5: Domain 4 - Communication and Network Security

    Lecture 75 Domain 4 Key Concepts

    Lecture 76 Network Introduction

    Lecture 77 OSI and TCPIP

    Lecture 78 OSI Model Explaining

    Lecture 79 Explaining Layers 1,2,3

    Lecture 80 Explaining Layers 4,5,6,7

    Lecture 81 Routing and Routed Protocols

    Lecture 82 Domain Name System Overview

    Lecture 83 Address Resolution Protocol

    Lecture 84 VoIP and QoS

    Lecture 85 Layer 2 Attacks

    Lecture 86 Network Segmentation

    Lecture 87 NAC and dot1x and Port Security

    Lecture 88 Wireless Security

    Lecture 89 DMZ and Screened Subnet

    Lecture 90 Firewalls

    Lecture 91 Proxy, Load Balance devices, Email Security

    Lecture 92 VPN Service

    Lecture 93 IP Security Protocol (IPSEC)

    Section 6: Domain 5 - Identity and Access Management (IAM)

    Lecture 94 Domain 5 Key Concepts

    Lecture 95 AAA Overview

    Lecture 96 Authentication

    Lecture 97 MFA and Bio-metric Authentication

    Lecture 98 Passwordless Authentication Methods

    Lecture 99 SSO and RSO

    Lecture 100 Authorization and Access control Models

    Lecture 101 Accounting and Auditing

    Lecture 102 Identity Access Management Solutions

    Lecture 103 Password Attacks

    Lecture 104 LDAP Server - Active Directory

    Lecture 105 Manage Privileged Account

    Lecture 106 Least Privilege and Two Person Control

    Lecture 107 SoD and Need to Know

    Lecture 108 Job Rotation and Mandatory Vacation

    Section 7: Domain 6 - Security Assessment and Testing

    Lecture 109 Domain 6 Key Concepts

    Lecture 110 Security Testing and assessment and Auditing

    Lecture 111 System Auditing

    Lecture 112 Security Testing - PT, SAST, SCA

    Lecture 113 Vulnerability Assessment

    Lecture 114 VA Scanning Tool

    Lecture 115 Penetration Testing

    Lecture 116 Software Use Case Test and Abuse Case

    Lecture 117 Threat Modelling overview

    Lecture 118 Threat Model STRIDE & DREAD

    Lecture 119 Threat Model - PASTA

    Lecture 120 Service Organization Controls - SOC Audit

    Section 8: Domain 7 - Security Operations

    Lecture 121 Domain 7 Key Concepts

    Lecture 122 Change Management Process

    Lecture 123 Types of Changes

    Lecture 124 Configuration Management

    Lecture 125 Patch Management

    Lecture 126 Release Management

    Lecture 127 Incident Management

    Lecture 128 Collecting digital Evidences and Forensic

    Lecture 129 Incident Response Training

    Lecture 130 Incident Response Plan Testing

    Lecture 131 SOC Team

    Lecture 132 SIEM

    Lecture 133 EDR, NDR

    Lecture 134 XDR,SOAR

    Lecture 135 Threat Intel and MITRE Framework

    Lecture 136 What is Disaster and BIA

    Lecture 137 What is the DRP

    Lecture 138 What is the BCP

    Lecture 139 BCP Considerations

    Lecture 140 RPO & RTO

    Lecture 141 AIW,SDO,MTO and Relation

    Lecture 142 Linking RPO, RTO, AIW, SDO, MTO

    Lecture 143 Recovery Strategies

    Lecture 144 Reciprocal Agreement

    Lecture 145 BCP Testing and Evaluation

    Lecture 146 Data Backup

    Lecture 147 Storage Redundancy using RAID

    Section 9: Domain 8 - Software Development Security

    Lecture 148 Domain 8 Key Concepts

    Lecture 149 What is Programming

    Lecture 150 Software development methodologies

    Lecture 151 DevOps

    Lecture 152 DevSecOps

    Lecture 153 Software Testing

    Lecture 154 Software UAT Testing

    Lecture 155 Version Control System and Code Repository

    Lecture 156 Secure Code Practices

    Lecture 157 Certification vs Accreditation and Authorize to Operate

    Lecture 158 Software Project Acquisition Steps

    Lecture 159 Project Management Tools - GANTT, PERT, CPM, TIMEBOX

    Lecture 160 Database Overview

    Lecture 161 Database Security

    Lecture 162 Database Resiliency

    Lecture 163 Architectual Concepts, SOA, VDI, SDP

    Lecture 164 Virtualization and SDDC

    Lecture 165 SDN and SDWAN

    Lecture 166 Containers and Functions

    Lecture 167 CDN - Content Delivery Network

    Lecture 168 Cloud Computing

    Information security professionals who want to enhance their knowledge and skills,IT professionals who want to transition to a career in information security,Security consultants who want to expand their expertise,Project managers who want to understand the security aspects of project management,Anyone who wants to prepare for the CISSP certification exam and become a certified information security professional