Tags
Language
Tags
September 2025
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Cissp - Certified Information Systems Security Professional

    Posted By: ELK1nG
    Cissp - Certified Information Systems Security Professional

    Cissp - Certified Information Systems Security Professional
    Published 2/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 9.98 GB | Duration: 17h 14m

    Guaranteed the most comprehensive coverage of the CISSP CBK you will find, ANYWHERE.

    What you'll learn

    In‐depth coverage of the eight domains required to pass the CISSP exam

    Security and Risk Management

    Asset Security

    Security Engineering

    Communications and Network Security

    Identity and Access Management

    Security Assessment and Testing

    Security Operations

    Software Development Security

    Requirements

    Professionals with at least five years of experience and who demonstrate a globally recognized level of competence, as defined in the CISSP Common Body of Knowledge (CBK) in two or more of the eight security domains.

    This course is EXTREMELY DETAILED - so what you don't know, you will pick up in each lesson.

    Description

    The CISSP certification is an elite way to demonstrate your knowledge, advance your career and become a member of a community of cybersecurity leaders. It shows you have all it takes to design, engineer, implement and run an information security program.This course is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the official CISSP CBK (Common Body of Knowledge). You will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity. You will learn how to determine who or what may have altered data or system information, potentially affecting the integrity of those asset and match an entity, such as a person or a computer system, with the actions that entity takes against valuable assets, allowing organizations to have a better understanding of the state of their security posture. Policies, concepts, principles, structures, and standards used to establish criteria for the protection of information assets are also covered in this course.In‐depth coverage of the eight domains required to pass the CISSP exam:Security and Risk ManagementAsset SecuritySecurity EngineeringCommunications and Network SecurityIdentity and Access ManagementSecurity Assessment and TestingSecurity OperationsSoftware Development Security

    Overview

    Section 1: Domain 1 - Security and Risk Management

    Lecture 1 Introduction to the Domain

    Lecture 2 Confidentiality, Integrity and Availability

    Lecture 3 Security Governance

    Lecture 4 Complete and Effective Security Program

    Lecture 5 Compliance

    Lecture 6 Global, Legal and Regulatory Issues

    Lecture 7 Professional Ethics

    Lecture 8 Develop and Implement Security Policy

    Lecture 9 Business Continuity (BC) and Disaster Recovery (DR) Requirements

    Lecture 10 Manage Personnel Security

    Lecture 11 Risk Management Concepts

    Lecture 12 Threat Modeling

    Lecture 13 Acquisitions Strategy and Practices

    Section 2: Domain 2 - Asset Security

    Lecture 14 Introduction to the Domain

    Lecture 15 Data Management - Determine and Maintain Ownership

    Lecture 16 Data Standards

    Lecture 17 Classify Information and Supporting Assets

    Lecture 18 Asset Management

    Lecture 19 Ensure Appropriate Retention

    Lecture 20 Determine Data Security Controls

    Section 3: Domain 3 - Security Engineering

    Lecture 21 Introduction to the Domain

    Lecture 22 Engineering Lifecycle Using Security Design Principles

    Lecture 23 Information Systems Security Models

    Lecture 24 Application and Use of Cryptography

    Lecture 25 Vulnerabilities in Mobile Systems

    Lecture 26 Site and Facility Design Considerations

    Lecture 27 Site Planning

    Lecture 28 Implementation and Operations of Facilities Security

    Section 4: Domain 4 - Communications and Network Security

    Lecture 29 Introduction to the Domain

    Lecture 30 Secure Network Architecture and Design

    Lecture 31 Converged Protocols

    Lecture 32 Securing Network Components

    Lecture 33 Secure Communications Channels

    Lecture 34 Network Attacks

    Section 5: Domain 5 - Identity and Access Management

    Lecture 35 Introduction to the Domain

    Lecture 36 Physical and Logical Access to Assets

    Lecture 37 Identity Management Implementation

    Lecture 38 Implement and Manage Authorization Mechanisms

    Lecture 39 Prevent and Mitigate Access Control Attacks

    Lecture 40 Identity and Access Provisioning Lifecycle

    Section 6: Domain 6 - Security Assessment and Testing

    Lecture 41 Introduction to the Domain

    Lecture 42 Assessment and Test Strategies

    Lecture 43 Collect Security Process Data

    Lecture 44 Internal and Third-Party Audits

    Section 7: Domain 7 - Security Operations

    Lecture 45 Introduction to the Domain

    Lecture 46 Investigations

    Lecture 47 Provisioning of Resources through Configuration Management

    Lecture 48 Foundational Security Operations Concepts

    Lecture 49 Resource Protection

    Lecture 50 Incident Response

    Lecture 51 Preventative Measures Against Attacks

    Lecture 52 Patch and Vulnerability Management

    Lecture 53 Change and Configuration Management

    Lecture 54 Disaster Recovery Process

    Lecture 55 Business Continuity and Other Risk Areas

    Lecture 56 Access Control

    Lecture 57 Personnel Safety

    Lecture 58 Building and Inside Security

    Section 8: Domain 8 - Software Development Security

    Lecture 59 Introduction to the Domain

    Lecture 60 Software Development Security Online

    Individuals who want to advance within their current computer security careers or migrate to a related career,Anyone whose position requires CISSP Certification