CISSP Bootcamp course - Domain 3 & 4
Duration: 03:14:20 | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 2.95 GB
Genre: eLearning | Language: English
Duration: 03:14:20 | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 2.95 GB
Genre: eLearning | Language: English
Take the Domain 3 and Domain 4 course for preparing for the CISSP preparation
What you'll learn
Discover where and how to begin your CISSP certification path.
Understand IT Security and Cyber Security from a management standpoint.
Domain 3 - Security Engineering
Domain 4 - Communication and Network Security
Requirements
A fundamental grasp and knowledge of computers, networks, information technology, and cyber security.
Personal knowledge and experience in cyber security are desirable but not needed. The CISSP certification is THE senior-level cyber security certification, and it will be assumed that you have a basic understanding of cyber security topics.
Description
The CISSP exam is governed by the International Information Systems Security Certification Consortium (ISC). (ISC) is a global, not-for-profit organization. It has four primary mission goals:
Maintain the Common Body of Knowledge (CBK) for the field of information systems security.
Provide certification for information systems security professionals and practitioners.
Conduct certification training and administer the certification exams.
Oversee the ongoing accreditation of qualified certification candidates through continued education.
The (ISC)2 is operated by a board of directors elected from the ranks of its certified practitioners.
Enhance your knowledge and review domain 3 and 4 of CISSP.
Domain 3 covers Security Architecture and Engineering while Domain 4 covers Communication and Network security.
Domain 3 covers the following topics:-
Engineering,Security models such as Biba, Star Model, Bell-LaPadula, Clark wilson model
State Machine model, Certification generation and destruction
TLS and its functioning
Securing communication whilst in transit using IPSec
TCSEC, ITSEC and Common Criteria
Web architecture attacks, OWASP top 10
Secure system design concept
Various states of processes
Viruses, Trojans, Backdoors
Domain 4 covers the following topics:-
Implement secure design principles in network architectures
Secure network components
How to protect wireless communications
Various layers of OSI model
Protocols used in various layers of OSI model
CDN, CSMA CA/CD, Routing protocols
MAC and IPv4 addressing
The CISSP exam is governed by the International Information Systems Security Certification Consortium (ISC). (ISC) is a global, not-for-profit organization. It has four primary mission goals:
Maintain the Common Body of Knowledge (CBK) for the field of information systems security.
Provide certification for information systems security professionals and practitioners.
Conduct certification training and administer the certification exams.
Oversee the ongoing accreditation of qualified certification candidates through continued education.
The (ISC)2 is operated by a board of directors elected from the ranks of its certified practitioners.
Enhance your knowledge and review domain 3 and 4 of CISSP.
Domain 3 covers Security Architecture and Engineering while Domain 4 covers Communication and Network security.
Domain 3 covers the following topics:-
Engineering,Security models such as Biba, Star Model, Bell-LaPadula, Clark wilson model
State Machine model, Certification generation and destruction
TLS and its functioning
Securing communication whilst in transit using IPSec
TCSEC, ITSEC and Common Criteria
Web architecture attacks, OWASP top 10
Secure system design concept
Various states of processes
Viruses, Trojans, Backdoors
Domain 4 covers the following topics:-
Implement secure design principles in network architectures
Secure network components
How to protect wireless communications
Various layers of OSI model
Protocols used in various layers of OSI model
CDN, CSMA CA/CD, Routing protocols
MAC and IPv4 addressing
Who this course is for:
Professionals who are already in Cyber security or are in the process of migration to Cyber Security
More Info