Video description
The fast, powerful way to prepare for your CISSP exam!
30+ hours of personal video training from leading security
expert Shon Harris
Achieving the (ISC)2’s globally recognized CISSP can give
your IT career a lift. In this DVD, the world’s #1 CISSP trainer
brings her legendary five-day boot camp to your computer screen.
Packed with over 30 hours of instruction adapted from Shon’s
classes, this video course includes realistic labs, scenarios, case
studies, and animations designed to build and test your knowledge
in real-word settings. Preparing for the CISSP has never been this
easy or convenient.
Master the skills and concepts you need for all ten CISSP
common body of knowledge domains:
Access Control
Application Security
Business Continuity and Disaster Recovery Planning
Cryptography
Information Security and Risk Management
Legal, Regulations, Compliance, and Investigations
Operations Security
Physical (Environmental) Security
Security Architecture and Design
Telecommunications and Network Security
System Requirements
OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4
(Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card
with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more
Table of Contents
Course Introduction
00:07:24
Domain 7 – Telecommunications and Networking
00:00:48
OSI Model
00:03:09
Networking Communications
00:04:22
Application Layer
00:02:33
Presentation Layer
00:02:37
OSI – Session Layer
00:03:12
Transport Layer
00:03:00
Network Layer
00:02:46
Data Link Layer
00:05:52
Physical Layer
00:01:33
Layers Working Together
00:10:43
Network Topologies
00:06:32
LAN Media Access Technologies
00:02:45
Media Access Technologies
00:13:02
Cabling Types-Coaxial
00:01:39
Cabling Types – Twisted Pair
00:01:51
Types of Cabling – Fiber
00:01:47
Signal and Cable Issues
00:01:56
Transmission Types
00:11:52
Network Technologies
00:03:48
Networking Devices
00:06:20
Virtual LANs
00:04:31
Sniffers
00:03:13
Networking Devices – Router
00:02:14
Hops
00:00:56
Routers
00:00:49
Bridges Compared to Routers
00:01:29
Port and Protocol Relationship
00:05:24
TCP/IP Suite
00:01:09
UDP versus TCP
00:02:29
TCP Segment
00:00:50
SYN Flood
00:03:29
Teardrop Attack
00:02:05
Source Routing
00:01:03
Source Routing Types
00:00:52
IP Address Ranges
00:02:56
IPv6
00:02:25
Protocols
00:00:11
Protocols – ARP
00:01:09
IP to MAC Mapping
00:00:50
How ARP Works
00:01:27
ARP Poisoning
00:01:13
ICMP Packets
00:01:22
A Way Hackers Use ICMP
00:01:19
Ping Steps
00:01:30
Protocols – SNMP
00:00:49
SNMP In Action
00:03:20
SNMP
00:01:48
SNMP Output
00:00:58
POP3 and SMTP
00:01:20
Mail Relay
00:02:00
Protocols – FTP, TFTP, Telnet
00:02:36
Protocols – RARP and BootP
00:01:18
DHCP – Dynamic Host Configuration Protocol
00:01:04
Networking Device – Bastion Host
00:04:01
Network Devices – Firewalls
00:06:37
Rule Set Example
00:01:22
Firewall Types – Proxy Firewalls
00:01:50
Firewall Types – Circuit-Level Proxy Firewall
00:01:48
Circuit-Level Proxy
00:05:44
Dedicated Proxy Servers
00:21:54
Dial-Up Protocols and Authentication Protocols
00:04:55
Authentication Protocols
00:08:07
Virtual Private Network Technologies
00:19:32
SDLC and HDLC
00:04:42
Quality of Service (QoS)
00:02:37
Autonomous Systems
00:02:04
Routing Protocols
00:10:53
Routing Protocol Attacks
00:17:26
Network Service – NAT
00:06:32
WAN Technologies Are Circuit or Packet Switched
00:01:10
PSTN
00:02:24
Multiplexing
00:01:40
Types of Multiplexing
00:04:02
Packet Switching
00:03:52
WAN Technologies – Packet Switched
00:00:17
WAN Technologies – X.25
00:00:54
X.25
00:01:09
WAN Technologies – Frame Relay
00:01:47
WAN Example
00:00:44
Frame Relay
00:02:26
WAN Technologies – ATM
00:01:21
Cell Switching
00:00:46
Wide Area Network Technologies
00:05:50
WAN Technologies – Cable Modem
00:01:37
Cable Modems and Satellites
00:03:38
Network Perimeter Security
00:01:03
Complexity Only Increases
00:01:04
Agenda 9
00:01:21
PSTN (Cont.)
00:01:54
Private Branch Exchange
00:01:50
PBX Vulnerabilities
00:01:33
PBX Best Practices
00:01:44
IP Telephony
00:14:39
Mobile Phone Security
00:01:23
Mobile Device Security
00:01:22
Cell Phone
00:02:40
Wireless Technologies
00:15:20
OFDM
00:02:52
802.11n
00:01:09
Wireless Technologies – Access Point (Cont.)
00:01:01
Architectures
00:00:46
Wireless Technologies – Service Set ID
00:01:46
Authenticating to an AP
00:01:03
802.11 Authentication
00:02:27
Wireless Technologies – WEP Woes
00:07:43
802.11 Security Solutions
00:10:40
Types of 802.11 Security
00:03:30
Wireless EAP
00:23:20
Wireless Technologies – WAP and WTLS
00:03:52
Instant Messaging
00:03:02
Domain 7 Review
00:01:40