image
The Ultimate Drawing Course Beginner to Advanced...
$179
$79
image
User Experience Design Essentials - Adobe XD UI UX...
$179
$79
Total:
$659

Description

In this CISSP Domain 1, 2, 3, and 4 video training course, I will provide you the knowledge, experience and practical skills you need to pass the CISSP certification. In addition, you will get my years of experience (Over 18 years) as I translate CISSP training requirements into real-world examples.
Included in this course:
CISSP Domain 1 Videos
13 Sections - 31 Videos
10 CISSP practice questions
CISSP Domain 2 Videos
5 Sections - 9 Videos
10 CISSP practice questions
CISSP Domain 3 Videos
11 Sections - 16 Videos
10 CISSP practice questions
CISSP Domain 4 Videos
3 Sections - 7 Videos
10 CISSP practice questions
The curriculum in this course covers the content that will be on the most current CISSP exam (April 2021). Each objective that is required for the CISSP exam will be covered in varying degrees of complexity and competency. The next upgrade to the CISSP curriculum/exam will occur in 2023.
In Domain 1 we will cover:
Introduction
Introduction
Purpose
ISC2
Understand and apply concepts of confidentiality, integrity and availability
Confidentiality
Integrity
Availability
Evaluate and apply security governance principles
Alignment of security function to business strategy, goals, mission, and objectives
Organizational processes (e.g., acquisitions, divestitures, governance committees
Organizational roles and responsibilities
Security control frameworks
Due care/due diligence
Determine compliance requirements
Contractual, legal, industry standards, and regulatory requirements
Privacy requirements
Understand legal and regulatory issues that pertain to information security in a global context
Cyber crimes and data breaches
Licensing and intellectual property requirements
Import/export controls
Trans-border data flow
Privacy
Understand, adhere to, and promote professional ethics
(ISC)² Code of Professional Ethics
Organizational code of ethics
Develop, document, and implement security policy, standards, procedures, and guidelines
Identify, analyze, and prioritize Business Continuity (BC) requirement
Develop and document scope and plan
Business Impact Analysis (BIA)
Contribute to and enforce personnel security policies and procedures
Candidate screening and hiring
Employment agreements and policies
Onboarding and termination processes
Vendor, consultant, and contractor agreements and controls
Compliance policy requirements
Privacy policy requirements
Understand and apply risk management concepts
Identify threats and vulnerabilities
Risk assessment/analysis
Risk response
Countermeasure selection and implementation
Applicable types of controls (e.g., preventive, detective, corrective)
Security Control Assessment (SCA)
Monitoring and measurement
Asset valuation
Reporting
Continuous improvement
Risk frameworks
Understand and apply threat modeling concepts and methodologies
Threat modeling methodologies
Threat modeling concepts
Apply risk-based management concepts to the supply chain
Risks associated with hardware, software, and services
Third-party assessment and monitoring
Minimum security requirements
Service-level requirements
Establish and maintain a security awareness, education, and training program
Methods and techniques to present awareness and training
Periodic content reviews
Program effectiveness evaluation
In Domain 2 we will cover:
Identify and classify information and assets
Data Classification
Asset Classification
Determine and maintain information and asset ownership
Protect privacy
Data owners
Data processors
Data remanence
Collection limitation
Ensure appropriate asset retention
Determine data security controls
Understand data states
Scoping and tailoring
Standards selection
Data protection methods
Establish information and asset handling requirements
In Domain 3 we will cover:
Implementation and management of engineering processes using secure design principles
Asset Retention
Confinement
Understanding of the fundamental concepts of security models
Selection of controls based upon systems security requirements
Security capabilities of information systems
Assessment and mitigation of vulnerabilities within a security architecture
Client-based systems
Server-based systems
Database systems
Cryptographic systems
Industrial Control Systems (ICS)
Cloud-based systems
Distributed systems
Internet of Things (IoT)
Assessment and mitigation in web-based systems
Assessment and mitigation in mobile-based systems
Assessment and mitigation in embedded devices
Apply cryptographic methods
Cryptographic life-cycle
Cryptographic methods
Public Key Infrastructure
Key management practices
Digital Signatures
Non-repudiation
Integrity (e.g. Hashing)
Cryptographic attacks
Digital Rights Management (DRM)
Application of security principles to sites and facility design
Implementation of site and facility security controls
Wiring closets/intermediate distribution facilities
Server rooms/data centers
Media storage facilities
Evidence storage
Restricted and work area security
Utilities and Heating, Ventilation, and Air Conditioning (HVAC)
Environmental issues
Fire prevention, detection, and suppression
In Domain 4 we will cover:
Implement secure design principles in network architectures
Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models
Internet Protocol (IP) networking
Implications of multil-ayer protocols
Converged protocols
Software-defined networks
Wireless networks
Secure network components
Operation of hardware
Transmission media
Network Access Control (NAC) devices
Endpoint security
Content-distribution networks
Implement secure communication channels according to design
Voice
Multimedia collaboration
Remote access
Data communications
Virtualized networks
Notes / Disclaimers:
In order for you to pass the CISSP test you need to have the substantial knowledge through experience and knowledge.
The test was originally written in English, but there are other language versions available
Answering the questions you need to consider the "perfect world" scenario and that work around options may be technically correct, but they may not meet (ISC)2 point of view
You need to be able to spot the keywords (DR, BCP, Policy, Standards, etc.) as well as the indicators (First, Best, Last, Least, Most)
Understand and answer every question from the Manager, CISO, or Risk Advisers Point of View (PoV). Answering the questions from a CIO or technical perspective will place your thinking too high or down in the weeds too far.
Understand that you are to answer the questions based on being proactive within your environment. Enable a Vulnerability Management Program before you have vulnerability issues.
The English version of the CISSP exam, utilizes the Computerized Adaptive Testing (CAT) format and is 3 hours long with 100-150 questions
Most people studying for CISSP certification will various media sources, test banks, and various books to enhance their test taking experience.
Don’t rely on one source to teach you all that you need to know for the CISSP….Invest in multiple training opportunities. The future payoff is worth the time and energy.
Who this course is for:
Individuals who are preparing for the ISC2 CISSP Certification Exam
Individuals wanting lean and gain knowledge on the CISSP certification
People wanting to grow their IT Security and Cyber Security knowledge
New and experienced IT Security professionals
Anyone wanting to break into IT Security
Students wanting to learn and grow their understanding on the CISSP Domain curriculum

What you'll learn

Prepare for the of the 2021 Certified Information Systems Security Processionals (CISSP) exam

Full understanding of the objectives that relate to Domain 1 (Security and Risk Management) of the CISSP exam

Full understanding of the objectives that relate to Domain 2 (Asset Security) of the CISSP exam

Full understanding of the objectives that relate to Domain 3 (Security Architecture and Engineering) of the CISSP exam

Full understanding of the objectives that relate to Domain 4 (Communication and Network Security) of the CISSP exam

Security management perspectives from the view of a Chief Information Security Officer (CISO)

How to begin on the CISSP certification journey along with practical real-world experiences providing knowledge and context

Learn the benefits and rewards for gaining your CISSP certification, and what it will provide to your career

Requirements

  • You will need a copy of Adobe XD 2019 or above. A free trial can be downloaded from Adobe.
  • No previous design experience is needed.
  • No previous Adobe XD skills are needed.

Course Content

27 sections • 95 lectures
Expand All Sections
1-Introductions, Concentrations and Exam Highlights
6
1.1-Introduction
1.2-Cyber Beginings
1.3-Corporate and College
1.4-CISSP Concentrations
1.5-Consortium and Associate
1.6-Exam Highlights
2-Domain 1.1: Understand, adhere to and promote professional ethics
3
2.1-Domain 1 Overview
2.2-ISC2 Code of Ethics
2.3-Organizational Code of Ethics
3-Domain 1.2: Understand and apply security concepts
10
3.1-CIA Triad - Confidentiality #1
3.2-CIA Triad - Confidentiality #2
3.3-CIA Triad - Integrity #1
3.4-CIA Triad - Integrity #2
3.5-CIA Triad - Availability #1
3.6-CIA Triad - Availability #2
3.7-AAA Services
3.8-DAD Triad - Video #1
3.9-DAD Triad - Video #2
3.10-Authenticity - Non Repudiation
4-Domain 1.3: Evaluate and apply security governance principles
5
4.1-Security Governance Principles
4.2-Security Frameworks
4.3-Security Control Framework Mapping
4.4-Organizational Roles and Responsibilities
4.5-Due Care and Diligence
5-Domain 1.4: Determine compliance and other requirements
3
5.1-Contractual Aspects
5.2-Regulatory Aspects - Video #1
5.3-Regulatory Aspects - Video #2
6-Domain 1.5: Understand legal and regulatory issues that pertain to InfoSec
9
6.1-Legal and Regulatory Overview
6.2-Cyber Crimes and Data Breaches
6.3-Licensing and Intellectual Property - Video #1
6.4-Licensing and Intellectual Property - Video #2
6.5-Licensing and Intellectual Property - Video #3
6.6-Import, Export and Trans Border Data Flows
6.7-Privacy - Video #1
6.8-Privacy - Video #2
6.9-Privacy - Video #3
7-Domain 1.6 Understand requirement for investigation types
5
7.1-Overview and Administrative Investigations
7.2-Civil Investigations
7.3-Regulatory Investigations and Electronic Discovery
7.4-Evidence - Video #1
7.5-Evidence - Video #2
8-Domain 1.7: Develop, Document and implement security policy, standards, etc.
4
8.1-Security Policies, Standards, and Procedures Overview
8.2-Types of Security Policies
8.3-Hierarchical Breakdown
8.4-Areas to Avoid
9-Domain 1.8: Identify, analyze and prioritize business continuity (BC) req.
3
9.1-Business Continuity Overview
9.2-Business Continuity - Developing a Plan
9.3-BIA, RTO, and RPO
10-Domain 1.9: Contribute to and enforce personnel security policies and procedures
7
10.1-Hiring and Background Checks
10.2-Candidate Screening and Hiring
10.3-Employment Agreements
10.4-Vendor, consultant, and contractor agreements and controls
10.5-Onboarding, Transfers, Terminations, and Associated Processes - Video #1
10.6-Onboarding, Transfers, Terminations, and Associated Processes - Video #2
10.7-Compliance and Privacy
11-Domain 1.10: Understand and apply risk management concepts
5
11.1-Apply Risk Management Overview
11.2-Identifying Threats and Vulnerabilities
11.3-Risk Response
11.4-Countermeasures and Security Control Assessments
11.5-Monitoring and Continuous Improvement
12-Domain 1.11: Understand and apply threat modeling concepts and methodologies
5
12.1-Proactive and Reactive
12.2-Identifying Threats
12.3-Threat Modeling
12.4-Analyzing Risk
12.5-Prioritization and Response
13-Domain 1.12: Apply supply chain risk management (SCRM) concepts
2
13.1-Applying Supply Chain Key Concepts
13.2-Supply Chain Attacks
14-Domain 1.13: Establish and maintain a security awareness, education, etc.
2
14.1-Security Awareness, Education, and Training
14.2-Domain 1 Completion (freecisspquestions.com)
15-Domain 2.1: Identify and classify information and assets
4
15.1-Domain 2 Overview
15.2-Identify and Classify Information Assets
15.3-Data Classification - Video #1
15.4-Data Classification - Video #2
16-Domain 2.2: Establish information and asset handling requirements
1
16.1-Establish Information and Asset Handling
17-Domain 2.3: Provision Resources Securely
2
17.1-Provisioning Resources Securely
17.2-Asset Management
18-Domain 2.4: Manage Data Lifecycle
8
18.1-Data Owners
18.2-Data Custodian
18.3-Data Processor
18.4-Data User
18.5-Data Collection and Location
18.6-Data Maintenance and Retention
18.7-Data Remanence
18.8-Data Remanence and Automated Information Systems
19-Domain 2.5: Ensure Appropriate Asset Retention
2
19.1-End of Life
19.2-Asset Retention
20-Domain 2.6: Determine Data Security Controls
6
20.1-Data States
20.2-Scoping
20.3-Standards Selection
20.4-Digital Rights Management
20.5-Data Loss Prevention (DLP) and Cloud Security Broker (CASB)
20.6-Domain 2 Completion (freecisspquestions.com)
21-Domain 3.1: Manage Engineering Processes Using Secure Design
4
21.1-Domain 3 Overview
21.2-Key Concepts
21.3-Closed and Open Systems
21.4-Confinement
22-Domain 3.2: Fundamental Concepts of Security Models
3
22.1-Trusted Computing Base
22.2-Reference Models and Security Kernels
22.3-Various Models
23-Domain 3.3: Controls Based on System Security Requirements
1
23.1-Controls Based on System Security Requirements
24-Domain 3.4: Understand Security Capabilities of Information Systems
2
24.1-Virtualization
24.2-Trusted Platform Module
25-Domain 3.5: Assess and Mitigate the Vulnerabilities of Security Architectures
7
25.1-Server Based Systems
25.2-Database Systems
25.3-Industrial Control Systems
25.4-Cloud Based Systems
25.5-Distributed, Embedded, and Micro-services
25.6-Containerization
25.7-Virtualization
26-Domain 3.6: Select and Determine Cryptographic Solutions
3
26.1-Cryptographic Lifecycle
26.2-Key Management Practices
26.3-Non-repudiation, Integrity, and Hashing
27-Domain 3.7: Understand Methods of Cryptanalytic Attacks
4
27.1-Methods of Cryptanalytic Attacks - Video #1
27.2-Methods of Cryptanalytic Attacks - Video #2
27.3-Methods of Cryptanalytic Attacks - Video #3
27.4-Cryptanalytic Attacks
28-Domain 3.8: Apply Security Principles to Site and Facility Design
2
28.1-Secure Facility Plan
28.2-Site Selection
29-Domain 3.9: Design Site and Facility Controls
7
29.1-Wiring Closets
29.2-Evidence Storage
29.3-Heating, Ventilation, Air Conditioning (HVAC) and Data Centers
29.4-Environmental Issues
29.5-Fire Prevention
29.6-Power
29.7-Domain 3 Completion (freecisspquestions.com)
30-Domain 4.1: Implement Secure Design Principles in Network Architectures
5
30.1-Domain 4 Overview
30.2-OSI Model Video #1
30.3-OSI Model Video #2
30.4-IP, IPSEC, and VOIP
30.5-Secure Communication Protocols
31-Domain 4.2: Secure Network Components
4
31.1-Operations Hardware
31.2-Transmission Media
31.3-Network Access Control Devices
31.4-Warranty Support
32-Domain 4.3: Implement Secure Communication Channels According to Design
7
32.1-Voice
32.2-Multi-media Collaboration
32.3-Remote Access
32.4-Communication Protocols
32.5-Virtualized Networks
32.6-Third Party Connectivity
32.7-Domain 4 Completion (freecisspquestions.com)