Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CISSPĀ® Exam Preparation Training Course
Introduction
1. Introduction
2. What is CISSP Certificate
3. Course Outline
4. Latest CISSP Curriculum
5. Course Materials and Resources 2
6. Course flow and follow up
7. Important communication channel
Security and Risk Management
8. Introduction to Security and Risk Management
9. Important Definitions
10. Important Definitions 2
11. Governance Requirements
12. Due Care and Due Diligence
13. Question
14. Compliance
15. Important Document
16. Ethics
17. Question
18. Security Document 2
19.Security Document Types
20. Policy Sample
21. The Relationship Between Security Document Types
22. Risk Management
23. Risk Management Part 2
24. Asset Evaluation
25. Exam Question
26. Rsa Archer
27. ARIS GRC
28. Business Continuity Plans
34. Exam Quiz
31. MTD - RTO- RPO
32. Disaster Recovery Plan -DRP
33. Alternatives Sites
37. Employment Policies -Part 2
36. Employment Policies
35. The Need of Personnel Security
38. Termination
29. Business Continuity Plans - BCP
30. Business Impact Analysis- BIA
39. Security Awareness
Domain Evaluation
Asset Security
40. Introduction to Asset Security
41. Asset Management
42. Information Asset List
43. Classification
44. Labeling
45. DLP
46. DLP - Data Classification
47. Klassify - Data Labeling 2
48. Privacy
49. Retention
50. Data Security Control
Domain Evaluation
Security Architecture and Engineering
51. Introduction to Security Architecture and Engineering
52. Security Engineering Lifecycle
53. NISP SP 14-27
54. Trusted Computing Base
54.1 TCB Vulnerability
55. Security Models
56. TCSEC
57. ITSEC
58. Security Architecture Questions
59. Enterprise Security Architecture
60. Virtualization
61. Fault Tolerance
62. Server Fault Tolerance Techniques
63. New Technology
64. Spoofing Number
65. Spoofing Email
66. Cryptography
67. Alternative Ciphers
68. Symmetric Encryption
69. Asymmetric Encryption
70. Hash
71. Physical Security
72. Physical Access barriers
73. Power Issue
74. Fire
Domain Evaluation
Communications and Network Security
75. The OSI Model
76. TCP-IP Model
77. Network Architecture Components
78. Firewall
79. Network Types and Topolgies
80. Remote Access Technology
81. Wireless Network
82. Network Attacks
83. Remote Access Security Mechanisms
84. RAID
85. Backup
86. Network Questions
Domain Evaluation
Identity and Access Management
87. Access Control
88. Authorization
89. Authentication
90. Single Sign on SSO
91. Central Administration (RADUIS)
92. Access Control Attack
93. Instrusion Detection System (IDS)
94. Access Control Inportant exam area
95. Access Control Questions
Domain Evaluation
Cloud Security
96. Introduction to Cloud Security
97. NIST 800-145
98. IaaS vs PaaS vs SaaS
99. SaaS
100. PaaS
101. IaaS
102. Storage Architecture
103. Data Life Cycle Security
104. Hypervisor
105. Virtualization Security
106. Perimeter Security
Security Assessment and Testing
107. Introduction Security Assessment and Testing
108. Test Output
109. Vulnerability asessment - Part 1
110. Vulnerability asessment -Part 2
112. Nessus VA
113. Nessus VA- Part 2
114. Nessus VA Report
115. OWASP ZAP - VA
116. Nexpose VA
117. Penetration testing
118. Reconnaissance Demo -Maltego 2
119. Scanning Demo -Zenmap
120. Exploitation Demo -MetaSploit 2
121. Event Log Review 2
122. NIST 800-92
123. SIEM Solution
124. SIEM Solution Demo - Qradar
125. Code Review
126. Security KPI's
Domain Evaluation
Security Operations
127. Introduction to Security Operation 2
128. Security Operation 2
Domain Evaluation
Software Development Security
129. The System Life Cycle
130. Software development Methods
132. Change Control Process
133. Security Consideration
134. Software Control
135. Introduction to SQL Injection 2
136. What is SQL Injection
Domain Evaluation
104. Hypervisor
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock