Video description
The new CISSP Complete Video Course covering the 2021 CISSP exam is now available. Please use the new course to study for your certification.
Duration
Almost 26 hours of deep-dive training covering every objective in the latest (ISC)2 CISSP exam.
Overview
CISSP Complete Video Course is an engaging self-paced video training solution that provides learners with almost 26 hours of personal training from 2017 Cybersecurity Educator of the Year, Sari Greene. With each lesson, Sari fully explains the topics associated with each CISSP exam objective. To reinforce what you’ve learned, each lesson concludes with a 3Sec Challenge to test your knowledge and a Security-in-Action case study to demonstrate how the lesson concepts apply to real-life scenarios. This combination of teaching, testing, and application will ensure that you are prepared to take the CISSP exam.
Description
CISSP Complete Video Course contains almost 26 hours of training with content divided into 9 modules with 65 exam objective-targeted lessons and 106 related sublessons. This title covers every objective in the newly updated (ISC)2 CISSP exam and includes screencast teaching, and applied real-world scenarios.
The video lessons in this course review each exam objective, so you can use it as a complete study tool for taking the CISSP exam.
Major sections are as follows:
- Security and Risk Management
- Asset Security
- Security Architecture and Engineering
- Communication and Network Security
- Identity and Access Management (IAM)
- Security Assessment and Testing
- Security Operations
- Software Development Security
- Becoming a CISSP
About the Instructor
Sari Greene is an information security practitioner, author, and entrepreneur. In 2003, Sari founded one of the first dedicated cybersecurity consultancies. She is a recognized leader in the field of cybersecurity and has amassed thousands of hours in the field working with a spectrum of technical, operational, compliance, and management personnel as well as boards of directors, regulators, service providers, and law enforcement agencies.
Sari’s first book was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel, followed soon after by the first edition of Security Policies and Procedures: Principles and Practices. The second edition of Security Program and Policies: Principles and Practices is currently being used in undergraduate and graduate programs nationwide. She is also the author and presenter of the best-selling CompTIA Security+ (SY0-501) Complete Video Course, and CISA Complete Video Course. Sari has published a number of articles related to cybersecurity; has been quoted in The New York Times, in The Wall Street Journal, on CNN, and on CNBC; speaks regularly at cybersecurity, legal, financial, and healthcare conferences and workshops around the country; and is a frequent guest lecturer.
Sari serves on the Bangor Savings Bank Board of Directors and is chair of the Enterprise Risk Management Committee. She provided expert witness testimony in the groundbreaking PATCO v. Ocean National Bank case, represents industry on the Massachusetts Bankers Association Cybersecurity Task Force, and is a member of the American Bankers Association cybersecurity faculty.
Sari earned her MBA from the University of New Hampshire system. She holds multiple industry accreditations, including CISSP-ISSMP, CRISC, CISM, CISA, MCSE, and NSA/IAM. She is also certified in Offshore Emergency Medicine. In 2017, she was awarded Cybersecurity Educator of the Year. Learn more at sarigreene.com.
Skill Level
Beginning
What You Will Learn
- Every objective on the (ISC)2 CISSP exam
- Tips to prepare for and pass the exam
- Real-world cybersecurity skills
Who Should Take This Course
Primary audience: Anyone preparing for the (ISC)2 CISSP examination.
Secondary audience: Anyone interested in pursuing a career in cybersecurity.
Table of Contents
Introduction
Module 1 Domain 1 Security and Risk Management
Lesson 1: Understand and Apply Concepts of Confidentiality, Integrity and Availability
Lesson 2: Evaluate and Apply Security Governance Principles
Lesson 3: Determine Compliance Requirements
Lesson 4: Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context
Lesson 5: Understand, Adhere to and Promote Professional Ethics
Lesson 6: Develop, Document and Implement Security Policy, Standards, Procedures and Guidelines
Lesson 7: Identify, Analyze, and Prioritize Business Continuity (BC) Requirements
Lesson 8: Contribute to and Enforce Personnel Security Policies and Procedures
Lesson 9: Understand and Apply Risk Management Concepts
Lesson 10: Understand and Apply Threat Modeling Concepts and Methodologies
Lesson 11: Apply Risk Management Concepts to the Supply Chain
Lesson 12: Establish and Maintain a Security Awareness, Education, and Training Program
Module 2 Domain 2 Asset Security
Lesson 13: Identify and Classify Information and Assets
Lesson 14: Determine and Maintain Information and Asset Ownership
Lesson 15: Protect Privacy
Lesson 16: Ensure Appropriate Asset Retention
Lesson 17: Determine Data Security Controls
Lesson 18: Establish Information and Asset Handling Requirements
Module 3 Domain 3 Security Architecture and Engineering
Lesson 19: Implement and Manage Engineering Processes Using Secure Design Principles
Lesson 20: Understand the Fundamental Concepts of Security Models
Lesson 21: Select Controls Based Upon Systems Security Requirements
Lesson 22: Understand Security Capabilities of Information Systems
Lesson 23: Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Lesson 24: Assess and Mitigate Vulnerabilities in Web-based Systems
Lesson 25: Assess and Mitigate Vulnerabilities in Mobile Systems
Lesson 26: Assess and Mitigate Vulnerabilities in Embedded Systems
Lesson 27: Apply Cryptography
Lesson 28: Apply Security Principles to Site and Facility Design
Lesson 29: Implement Site and Facility Security Controls
Module 4 Domain 4 Communication and Network Security
Lesson 30: Implement Secure Design Principles in Network Architectures
Lesson 31: Secure Network Components
Lesson 32: Implement Secure Communication Channels According to Design
Module 5 Domain 5 Identity and Access Management (IAM)
Lesson 33: Control Physical and Logical Access to Assets
Lesson 34: Manage Identification and Authentication of People, Devices, and Services
Lesson 35: Integrate Identify as a Third-party Service
Lesson 36: Implement and Manage Authorization Mechanisms
Lesson 37: Manage the Identity and Access Provisioning Lifecycle
Module 6 Domain 6 Security Assessment and Testing
Lesson 38: Design and Validate Assessment, Test, and Audit Strategies
Lesson 39: Conduct Security Control Testing
Lesson 40: Collect Security Process Data
Lesson 41: Analyze Test Output and Generate Report
Lesson 42: Conduct or Facilitate Security Audits
Module 7 Domain 7 Security Operations
Lesson 43: Understand and Support Investigations
Lesson 44: Understand Requirements for Investigation Types
Lesson 45: Conduct Logging and Monitoring Activities
Lesson 46: Securely Provisioning Resources
Lesson 47: Understand and Apply Foundational Security Operations Concepts
Lesson 48: Apply Resource Protection Techniques
Lesson 49: Conduct Incident Management
Lesson 50: Operate and Maintain Detective and Preventative Measures
Lesson 51: Implement and Support Patch and Vulnerability Management
Lesson 52: Understand and Participate in Change Management Processes
Lesson 53: Implement Recovery Strategies
Lesson 54: Implement Disaster Recovery (DR) Processes
Lesson 55: Test Disaster Recovery Plans (DRP)
Lesson 56: Participate in Business Continuity (BC) Planning and Exercises
Lesson 57: Implement and Manage Physical Security
Lesson 58: Address Personnel Safety and Security Concerns
Module 8 Domain 8 Software Development Security
Lesson 59: Understand and Integrate Security in the Software Development Life Cycle (SDLC)
Lesson 60: Identify and Apply Security Controls in Development Environments
Lesson 61: Assess the Effectiveness of Software Security
Lesson 62: Assess Security Impact of Acquired Software
Lesson 63: Define and Apply Secure Coding Guidelines and Standards
Module 9 Becoming a CISSP
Lesson 64: Acing Your Exam
Lesson 65: Certification Process
Summary
About LiveLessons Video Training
Pearson’s LiveLessons video training series publishes the industry’s leading video tutorials for IT pros, developers, sys admins, devops, network engineers, and certification candidates. LiveLessons feature the highest-quality professional skills training led by recognized author instructors published by Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT certification, programming, development, networking, software skills for the home, office, and business, and more. Your purchase provides you with lifetime online access to the content.
http://www.pearsonitcertification.com/livelessons
Table of Contents
Introduction
CISSP: Introduction
Module 1 Domain 1 Security and Risk Management
Module introduction
Lesson 1: Understand and Apply Concepts of Confidentiality, Integrity and Availability
Learning objectives
1.1 Information Security Fundamentals
Lesson 2: Evaluate and Apply Security Governance Principles
Learning objectives
2.1 Frameworks, Benchmarks, and Guidelines
2.2 Leadership Roles and Responsibilities
Lesson 3: Determine Compliance Requirements
Learning objectives
3.1 Regulatory and Contractual Obligations
3.2 Privacy and Data Protection
Lesson 4: Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context
Learning objectives
4.1 Cybercrime and Data Breaches
4.2 Licensing and Intellectual Property Law
Lesson 1-4 Assessment
Lesson 5: Understand, Adhere to and Promote Professional Ethics
Learning objectives
5.1 Organizational and Professional Ethics
Lesson 6: Develop, Document and Implement Security Policy, Standards, Procedures and Guidelines
Learning objectives
6.1 Information Security Policy
Lesson 7: Identify, Analyze, and Prioritize Business Continuity (BC) Requirements
Learning objectives
7.1 Business Continuity Planning
7.2 Business Impact Analysis
Lesson 8: Contribute to and Enforce Personnel Security Policies and Procedures
Learning objectives
8.1 Personnel Policies and Agreements
Lesson 5-8 Assessment
Lesson 9: Understand and Apply Risk Management Concepts
Learning objectives
9.1 Risk Management Concepts
9.2 Risk Assessment
9.3 Countermeasure Selection
Lesson 10: Understand and Apply Threat Modeling Concepts and Methodologies
Learning objectives
10.1 Threat Modeling
10.2 Attack Vectors
Lesson 11: Apply Risk Management Concepts to the Supply Chain
Learning objectives
11.1 Supply Chain Risk Management
Lesson 12: Establish and Maintain a Security Awareness, Education, and Training Program
Learning objectives
12.1 SETA Principles and Practices
12.2 Social Engineering Training
Lesson 9-12 Assessment
Module 2 Domain 2 Asset Security
Module introduction
Lesson 13: Identify and Classify Information and Assets
Learning objectives
13.1 Classification Frameworks
Lesson 14: Determine and Maintain Information and Asset Ownership
Learning objectives
14.1 Asset Ownership and Management
Lesson 15: Protect Privacy
Learning objectives
15.1 Privacy Principles
Lesson 16: Ensure Appropriate Asset Retention
Learning objectives
16.1 Data Retention and Destruction
Lesson 17: Determine Data Security Controls
Learning objectives
17.1 Data Security Standards and Selection
Lesson 18: Establish Information and Asset Handling Requirements
Learning objectives
18.1 Labeling and Handling Standards
Lesson 13-18 Assessment
Module 3 Domain 3 Security Architecture and Engineering
Module introduction
Lesson 19: Implement and Manage Engineering Processes Using Secure Design Principles
Learning objectives
19.1 Security Design Principles
Lesson 20: Understand the Fundamental Concepts of Security Models
Learning objectives
20.1 Information Security Models
Lesson 21: Select Controls Based Upon Systems Security Requirements
Learning objectives
21.1 Security Evaluation Models
Lesson 22: Understand Security Capabilities of Information Systems
Learning objectives
22.1 Information Systems Security Capabilities
Lesson 19-22 Assessment
Lesson 23: Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Learning objectives
23.1 Traditional Computing Environments
23.2 Cloud Computing
Lesson 24: Assess and Mitigate Vulnerabilities in Web-based Systems
Learning objectives
24.1 Web Vulnerabilities
Lesson 25: Assess and Mitigate Vulnerabilities in Mobile Systems
Learning objectives
25.1 Mobile Systems Vulnerabilities
Lesson 26: Assess and Mitigate Vulnerabilities in Embedded Systems
Learning objectives
26.1 Embedded Systems Vulnerabilities
Lesson 23-26 Assessment
Lesson 27: Apply Cryptography
Learning objectives
27.1 Cryptographic Fundamentals
27.2 Symmetric Encryption
27.3 Asymmetric Encryption
27.4 Hashing and Digital Signatures
27.5 PKI and Digital Certificates
27.6 Cryptographic Attacks and Vulnerabilities
Lesson 28: Apply Security Principles to Site and Facility Design
Learning objectives
28.1 Physical Security Principles
Lesson 29: Implement Site and Facility Security Controls
Learning objectives
29.1 Site and Facility Security Controls
29.2 Environmental Issues and Controls
Lesson 27-29 Assessment
Module 4 Domain 4 Communication and Network Security
Module introduction
Lesson 30: Implement Secure Design Principles in Network Architectures
Learning objectives
30.1 Network Models and IP Convergence
30.2 Non-IP Multilayer Protocols
30.3 Wireless Networks
Lesson 31: Secure Network Components
Learning objectives
31.1 Transmission and Connectivity
31.2 Network Access Control Devices
31.3 Endpoint Security
Lesson 32: Implement Secure Communication Channels According to Design
Learning objectives
32.1 Voice and Multimedia
32.2 Remote Access
32.3 Data Communications
32.4 Virtualization and Software-defined Networks
Lesson 30-32 Assessment
Module 5 Domain 5 Identity and Access Management (IAM)
Module introduction
Lesson 33: Control Physical and Logical Access to Assets
Learning objectives
33.1 Access Control Fundamentals
Lesson 34: Manage Identification and Authentication of People, Devices, and Services
Learning objectives
34.1 Identification and Authentication
34.2 Identity and Access Services
Lesson 35: Integrate Identify as a Third-party Service
Learning objectives
35.1 Identity Management (IdM)
Lesson 36: Implement and Manage Authorization Mechanisms
Learning objectives
36.1 Access Control Models
Lesson 37: Manage the Identity and Access Provisioning Lifecycle
Learning objectives
37.1 Identity and Access Management (IAM)
Lesson 33-37 Assessment
Module 6 Domain 6 Security Assessment and Testing
Module introduction
Lesson 38: Design and Validate Assessment, Test, and Audit Strategies
Learning objectives
38.1 Assessment and Testing Overview
38.2 Planning Engagements
Lesson 39: Conduct Security Control Testing
Learning objectives
39.1 Infrastructure Assessments
39.2 Code Testing and Analysis
Lesson 40: Collect Security Process Data
Learning objectives
40.1 Activity and Error Reporting
40.2 Information Security Continuous Monitoring
Lesson 41: Analyze Test Output and Generate Report
Learning objectives
41.1 Metrics, KPIs, and Business Intelligence
Lesson 42: Conduct or Facilitate Security Audits
Learning objectives
42.1 Managing Third-party Audits and Examinations
Lesson 38-42 Assessment
Module 7 Domain 7 Security Operations
Module introduction
Lesson 43: Understand and Support Investigations
Learning objectives
43.1 Evidence Handling
43.2 Forensic Investigative Techniques
Lesson 44: Understand Requirements for Investigation Types
Learning objectives
44.1 Investigation Objectives and Requirements
Lesson 45: Conduct Logging and Monitoring Activities
Learning objectives
45.1 Logging and Analysis
Lesson 43-45 Assessment
Lesson 46: Securely Provisioning Resources
Learning objectives
46.1 Configuration Management
Lesson 47: Understand and Apply Foundational Security Operations Concepts
Learning objectives
47.1 Security Operations
Lesson 48: Apply Resource Protection Techniques
Learning objectives
48.1 Media Management
48.2 Mobile Device Management
Lesson 49: Conduct Incident Management
Learning objectives
49.1 Incident Management Planning
49.2 Incident Response
Lesson 46-49 Assessment
Lesson 50: Operate and Maintain Detective and Preventative Measures
Learning objectives
50.1 Detective and Preventative Solutions
50.2 Firewalls and Filters
50.3 IDS/IPS
50.4 Anti-Malware Techniques
Lesson 51: Implement and Support Patch and Vulnerability Management
Learning objectives
51.1 Vulnerability Management
51.2 Patch Management
51.3 Threat Intelligence and Information Sharing
Lesson 52: Understand and Participate in Change Management Processes
Learning objectives
52.1 Change Management
Lesson 53: Implement Recovery Strategies
Learning objectives
53.1 Site Recovery Strategies
53.2 Data Backup and Restoration
53.3 Resiliency and Fault Tolerance
Lesson 50-53 Assessment
Lesson 54: Implement Disaster Recovery (DR) Processes
Learning objectives
54.1 DR Planning and Response
Lesson 55: Test Disaster Recovery Plans (DRP)
Learning objectives
55.1 DRP Training and Testing
Lesson 56: Participate in Business Continuity (BC) Planning and Exercises
Learning objectives
56.1 BCP Relationship
Lesson 57: Implement and Manage Physical Security
Learning objectives
57.1 Perimeter and Internal Security Controls
Lesson 58: Address Personnel Safety and Security Concerns
Learning objectives
58.1 Personnel and Workplace Safety
Lesson 54-58 Assessment
Module 8 Domain 8 Software Development Security
Module introduction
Lesson 59: Understand and Integrate Security in the Software Development Life Cycle (SDLC)
Learning objectives
59.1 Software Development Life Cycle
59.2 Secure DevOps
Lesson 60: Identify and Apply Security Controls in Development Environments
Learning objectives
60.1 Staging and Deployment Strategies
Lesson 61: Assess the Effectiveness of Software Security
Learning objectives
61.1 Assessing the Effectiveness of Software Security
Lesson 62: Assess Security Impact of Acquired Software
Learning objectives
62.1 Software Procurement and Acquisition
Lesson 63: Define and Apply Secure Coding Guidelines and Standards
Learning objectives
63.1 Source Code Weaknesses
63.2 Secure Coding Techniques
Lesson 59-63 Assessment
Module 9 Becoming a CISSP
Module introduction
Lesson 64: Acing Your Exam
Learning objectives
64.1 Understanding the Exam Structure
64.2 Test Taking Strategies
64.3 Preparing for Test Day
Lesson 65: Certification Process
Learning objectives
65.1 What to Expect at the Testing Center
65.2 Attaining and Maintaining Your CISSP Certification
Summary
CISSP: Summary