Free Download OReilly - Certified Information Systems Security Professional - CISSP
MP4 | Video: H264 1280x720 | Audio: AAC 44100Hz 2 Ch
Language: English | Duration: 39h 52m 24s | Size: 17.37 GB
The Certified Information Systems Security Professional (CISSP) certification is recognized globally as a hallmark of excellence in the IT security domain.
In this course, you will embark on a detailed exploration of various critical security domains. Starting with Security and Risk Management, you'll grasp essential concepts like the ISC2 Code of Ethics, the importance of Confidentiality, Integrity, and Availability (CIA), and the intricacies of security governance and compliance. Asset Security is another key focus, where you'll learn about information classification, asset handling, and data security controls. The course also dives deep into Security Architecture and Engineering, offering insights into secure design principles and cryptographic solutions. As the course progresses, you'll explore Communication and Network Security, understanding the nuances of network protocols and secure communications. Identity and Access Management (IAM) will teach you how to effectively control access to information systems, while Security Assessment and Testing will equip you with skills in security auditing and testing methodologies.
By the end of this course, you will be well-prepared to tackle the CISSP exam, setting you on a path to become a recognized expert in the field of IT security.
Content
Chapter 1 : Security and Risk Management
Overview
Understand adhere, promote professional ethics
Understand and apply security concepts (CIA)
Evaluate and apply security governance principles
Determine compliance and other requirements
Legal, regulatory issues for information security
Spotlight on the GDPR
Understand requirements for investigation types
Security policy, standards, procedures, guidelines
Identify, analyze, prioritize BC requirements
Personnel security policies and procedures
Understand, apply risk management concepts
Spotlight on the Risk Management Framework
Threat modeling concepts and methodologies
Apply Supply Chain Risk Management (SCRM) concepts
Security awareness, education, and training program
Security and Risk Management Key Points
Chapter 2 : Asset Security
Identify and classify information, assets
Establish information, asset handling requirements
Provision resources securely
Manage data lifecycle
Ensure appropriate asset retention
Data security controls and compliance requirements
Assets Security - Key Points
Chapter 3 : Security Architecture and Engineering
Engineering process using secure design principles
Fundamental concepts of security models
Controls based upon system security requirements
Security capabilities of Information Systems - vocab
Security capabilities of Information Systems - CPU
Security capabilities of Info Systems - Memory
Assess and mitigate vulnerabilities - the basics
Assess and mitigate vulnerabilities - the rest
Spotlight on cryptographic solutions - Symmetric
Spotlight on cryptographic solutions - Asymmetric
Spotlight on cryptographic solutions - PKI certs
Spotlight on cryptographic solutions - hashing
Cryptographic solutions - digital signing
Understand methods of cryptanalytic attacks
Security principles for site and facility design
Design site and facility security controls
Spotlight on fire control
Security Architecture Engineering - Key Points
Chapter 4 : Communication and Network Security
Spotlight on the OSI Model
Spotlight on Internet Protocol (IP) networking
Spotlight on IPsec
Spotlight on Secure Protocols
Implications of converged multilayer protocols
Spotlight on Micro-segmentation
Wireless, Cellular Content Distribution Networks
Secure Network Components
Implement Secure Communication Channels
Communications Network Security - Key Points
Chapter 5 : Identity and Access Management (IAM)
Control physical and logical access to assets
Manage identification and authentication
Federated identity with a third-party service
Implement, manage auth mechanisms - Vocab
Implement, manage auth mechanisms - Models
Manage the identity, access provisioning lifecycle
Implement authentication systems
Spotlight on Kerberos
Spotlight on Federated Identity Management (FIM)
Identity Access Management (IAM) - Key Points
Chapter 6 : Security Assessment and Testing
Assessment, test, security audit strategies
Spotlight on System and Org Controls Reports (SOC)
Conduct security control testing - the basics
Conduct security control testing - the rest
Collect security process data
Analyze test output and generate reports
Security Assessment and Testing - Key Points
Chapter 7 : Security Operations
Understand and comply with investigations
Conduct logging monitoring activities
Conduct logging monitoring activities - threat
Perform Configuration Management (CM)
Apply foundational security operations concepts
Apply resource protection
Conduct incident management
Detective preventative measures
Patch vulnerability management
Understand participate in change management
Implement recovery strategies
Implement Disaster Recovery (DR) processes
Test Disaster Recovery Plans (DRP)
Business Continuity (BC) planning exercises
Implement and manage physical security
Address personnel safety and security concerns
Security Operations - Key points
Chapter 8 : Software Development Security
Spotlight on the Software Development Life Cycle
Certs Accreditation Verification Validation
Security in the SDLC - Methodologies
Security in the SDLC - Maturity Models
Security in the SDLC - odds ends
Apply controls in development ecosystems - basics
Apply controls in development ecosystems - rest
Spotlight on the OWASP TOP 10
Assess the effectiveness of software security
Assess security impact of acquired software
Define, apply secure coding guidelines, standards
Spotlight on Databases
Software Development Security - Key Points
Chapter 9 : The CISSP Toolbox
What is the CISSP Toolbox?
Who are you?
What does your study plan look like?
What is your timeline?
Homepage
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!
Do not forget to check it every day!
If You should find any files not found, please PM me
If You Love My Courses So You Buy Premium Account From My Link To Support Me !!!???
Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!