Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CISSP – Become A Certified Information Systems Security Professional
1.INTRODUCTTION
001 Introduction (1:55)
002 Introduction to this course (1:14)
003 Why should you want to get the CISSP certification (5:35)
004 The 8 CISSP domains or CBKs _Common Bodies of Knowledge_ (9:39)
005 Lecture speed (0:37)
006 Links important topics and where to focus on my slides (1:20)
2. CISSP DOMAIN 1 SECURITY AND RISK MANAGEMENT
008 Domain 1 - What we will be covering (2:41)
009 The CIA Triad (11:55)
010 IAAA (5:27)
011 Governance Management standards and frameworks (7:00)
012 Laws and regulations (10:42)
013 Intellectual property (4:48)
014 US laws European laws and international treaties (9:08)
015 GDPR _General Data Protection Regulation_ (3:59)
016 Ethics (3:04)
017 Policies procedures guidelines and frameworks (5:55)
018 Access control (2:43)
019 Risk analysis attackers and attacks (17:40)
020 What we covered in Domain 1 (2:31)
03 CISSP DOMAIN 2 ASSET SECURITY
022 Domain 2 - What we will be covering (1:10)
023 Data classification and clearance (3:04)
024 Sensitive information and media security (8:26)
025 Mission data and system owners and data custodians (2:26)
026 Memory and data remanence- (4:48)
027 Data remanence and destruction (4:11)
028 Data security frameworks (3:07)
029 What we covered in Domain 2 (0:46)
04 BONUS LECTURES
031 Bonus Lecture (2:51)
5. INTRODUCTION
1. Introduction. (1:55)
2. Introduction to this course_ (1:14)
3. Why should you want to get the CISSP certification (5:35)
4. The 8 CISSP domains or CBKs _Common Bodies of Knowledge_. (9:39)
5. Lecture speed. (0:37)
6. Links_ important topics and where to focus on my slides. (1:20)
6. CISSP DOMAIN 3 SECURITY ARCHITECTURE AND ENGINEERING
1. Domain 3 - What we will be covering (1:59)
1. The fire triangle and fire suppression. (11:43)
2. Security models and concepts. (15:11)
3. Security evaluation models. (2:43)
4. Secure system design concepts. (3:29)
5. Hardware architecture. (9:10)
6. Secure operating systems and software architecture (2:05)
7. Virtualization. (14:02)
8. IOT _Internet Of Things_ (1:47)
9. System vulnerabilities_ threats_ and countermeasures. (9:21)
10. Web architecture and attacks. (6:12)
11. Database security (3:21)
12. Mobile device security. (4:54)
13. Industrial Control Systems. (3:07)
14. Introduction to Cryptography. (7:05)
15. The history of cryptography (8:02)
16. Symmetric encryption. (13:54)
17. Asymmetric encryption. (7:09)
18. Hashing. (6:33)
19. Attacks on our cryptography (8:33)
20. Digital signatures. (4:25)
21. IPSec and PGP. (4:19)
22. MAC_ HMAC_ SSL_ and TLS. (2:48)
23. Physical security part 1 (9:01)
24. Physical security part 2. (9:25)
25. Physical security part 3 (10:13)
26. Site selection. (11:08)
27. Media storage (6:44)
28. Electricity. (5:35)
29. Fire suppression and hot and cold aisles. (9:54)
30. Personnel safety. (3:05)
32. Domain 3 - What we covered (1:17)
7. CISSP DOMAIN 4 COMMUNICATIONS AND NETWORK SECURITY
1. Domain 4 - What we will be covering (1:24)
2. Networking basics and definitions. (8:16)
3. The OSI model. (14:43)
4. The TCP-IP model (6:01)
5. IP addresses and port numbers part 1. (11:07)
6. IP addresses and port numbers part 2. (13:53)
7. IP support protocols (16:02)
8. Cable types. (10:01)
9. LAN topologies. (9:12)
10. WAN protocols. (6:26)
11. SAN and VoIP protocols (5:40)
12. WIFI (13:01)
13. Bluetooth. (3:14)
14. Layer 1 to 3 networking devices. (7:54)
15. Layer 3 routing protocols. (7:54)
16. Firewalls. (10:13)
17. Modems. (3:47)
18. Network authentication protocols. (8:47)
19. Secure communications. (14:45)
20. What we covered in Domain 4. (1:24)
8. BONUS LECTURES
1. Bonus Lecture. (2:51)
9. INTRODUCTION
1. Introduction. (1:55)
2. Introduction to this course_ (1:14)
3. Why should you want to get the CISSP certification (5:35)
4. The 8 CISSP domains or CBKs _Common Bodies of Knowledge_ (9:39)
5. Lecture speed (0:37)
6. Links_ important topics and where to focus on my slides (1:20)
10. CISSP DOMAIN 5 IDENTITY AND ACCESS MANAGEMENT (IAM)
1. Domain 5 - What we will be covering (1:08)
2. Introduction to Access Contro (3:37)
3. Type 1 authentication - Something you know or Knowledge factors--- _ FreeCourseWeb.com _ --- (8:32)
4. Type 2 authentication - Something you have or Possession factors--- _ FreeCourseWeb.com _ --- (6:06)
5. Type 3 authentication - Something you are or Biometrics--- _ FreeCourseWeb.com _ --- (7:14)
6. Authorization. (7:47)
7. Accountability (1:37)
8. Access control systems (4:47)
9. Identity and access provisioning (6:47)
10. Authentication protocols (11:14)
11. What we covered in Domain 5. (1:11)
11. CISSP DOMAIN 6 SECURITY ASSESSMENT AND TESTING
1. Domain 6 - What we will be covering (1:54)
2. Domain 6 key concepts. (1:12)
3. Security Assessments (3:10)
4. Security Audits. (3:18)
5. Security Audit Logs. (4:58)
6. Vulnerability scanners (2:04)
7. Penetration testing (6:19)
8. Social Engineering attacks. (4:55)
9. Penetration testing tools (4:13)
10. Software testing. (11:50)
11. What we covered in Domain 6 (1:32)
12. BONUS LECTURES
1. Bonus Lecture (2:51)
13. INTRODUCTION
1. Introduction (1:55)
2. Introduction to this course_ (1:13)
3. Why should you want to get the CISSP certification (5:35)
4. The 8 CISSP domains or CBKs _Common Bodies of Knowledge_. (9:39)
5. Lecture speed (0:37)
6. Links_ important topics and where to focus on my slides. (1:20)
14. CISSP DOMAIN 7 SECURITY OPERATIONS
1. Domain 7 - What we will be covering. (1:41)
2. Domain 7 key concepts. (3:52)
3. Administrative personnel controls. (6:50)
4. Digital forensics. (6:28)
5. Spinning disk forensics. (2:33)
6. Network and Software forensics (5:46)
7. Incident Management definitions. (6:16)
8. Incident Management (14:16)
9. Intrusion detection and prevention systems (8:55)
10. SIEM _Security Information and Event Management. (2:22)
11. Application white-listing. (2:19)
12. Honeynets and Honeypot (2:33)
13. Configuration Management. (3:06)
14. Patch Management. (5:18)
15. Change management. (4:39)
16. 0-day attacks. (4:16)
17. Backups. (8:57)
18. RAID _Redundant Array of Independent Disks_ (4:34)
19. Redundancy. (7:31)
20. BCP and DRP (12:53)
21. Warfare_ terrorism_ sabotage_ and ransomware (4:28)
22. Personnel. (3:03)
23. DRP basics (5:13)
24. Developing our BCP and DRP (8:49)
25. BIA _Business Impact Analysis_ (6:06)
26. Supply and infrastructure redundancy (2:27)
27. Disaster Recovery sites. (6:44)
28. Other BCP sub plans. (9:05)
29. Employee redundancy (7:55)
30. Testing the plans (12:01)
31. After a disruption (7:24)
32. What we covered in Domain 7 (3:21)
15. CISSP DOMAIN 8 SOFTWARE DEVELOPMENT SECURITY
1. Domain 8 - What we will be covering (2:54)
2. Designing security into our software (3:08)
3. Programming concepts. (12:00)
4. Software development methodologies part 1 (15:35)
5. Software development methodologies part 2 (13:26)
6. Databases part 1 (14:37)
7. Databases part 2. (12:26)
8. OWASP part 1. (9:05)
9. OWASP part 2 (12:07)
10. Software vulnerabilities and Attacks (5:17)
11. Capability Maturity Model _CMM_. (7:04)
12. Buying software from other companies. (8:15)
13. Artificial intelligence _AI_ (4:49)
14. What we covered in Domain 8. (1:07)
16. BONUS LECTURES
1. Bonus Lecture. (2:51)
Teach online with
8. Social Engineering attacks.
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock