Video description
The fast, powerful way to prepare for your CISSP exam!
30+ hours of personal video training from leading security
expert Shon Harris
Achieving the (ISC)2’s globally recognized CISSP can give
your IT career a lift. In this DVD, the world’s #1 CISSP trainer
brings her legendary five-day boot camp to your computer screen.
Packed with over 30 hours of instruction adapted from Shon’s
classes, this video course includes realistic labs, scenarios, case
studies, and animations designed to build and test your knowledge
in real-word settings. Preparing for the CISSP has never been this
easy or convenient.
Master the skills and concepts you need for all ten CISSP
common body of knowledge domains:
Access Control
Application Security
Business Continuity and Disaster Recovery Planning
Cryptography
Information Security and Risk Management
Legal, Regulations, Compliance, and Investigations
Operations Security
Physical (Environmental) Security
Security Architecture and Design
Telecommunications and Network Security
System Requirements
OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4
(Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card
with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more
Table of Contents
Course Introduction
00:07:24
Domain 8 – Business Continuity
00:01:06
Needs for BCP
00:03:49
9/11 Changed Mentalities About BCP
00:03:07
Do We Have a Plan?
00:02:15
What Is the Purpose of a BCP?
00:02:26
More Reasons to Have Plans in Place
00:02:41
BCP Is a Core Component of Every Security Program
00:01:01
Steps of BCP Process
00:01:56
Different BCP Model
00:01:15
Documentation
00:01:08
BCP Policy Outlines
00:01:43
Who Is In Charge and Who Can We Blame?
00:01:52
What’s Needed In a Team?
00:00:51
BCP Development Team
00:01:31
Project Sizing
00:01:44
Properly Determining Scope Is Important
00:00:50
BCP Risk Analysis Steps
00:02:11
BIA Steps
00:01:28
Information from Different Sources
00:01:18
Analysis
00:01:31
How to Identify the Most Critical Company Functions
00:02:46
Interdependencies
00:00:45
Well, Of Course an Organization Knows How It Works!
00:00:54
Business Silos
00:05:42
Maximum Tolerable Downtime
00:05:30
Range of Threats to Consider
00:02:42
Thinking Outside of the Box What If…
00:00:55
Biological Threats
00:00:46
BIA Steps (Cont.)
00:00:56
Potential Disasters
00:02:26
Risk Approach
00:03:28
What Have We Completed Up to Now?
00:02:39
Recovery Strategies
00:01:17
Alternate Business Process Procedures
00:02:36
Business Process Reconstruction
00:01:46
Recovery Strategies
00:00:55
Facility Backups
00:02:33
Compatibility Issues with Offsite Facility
00:02:04
Tertiary Sites
00:00:56
Subscription Costs
00:02:17
Multiple Processing Centers
00:01:03
Choosing Site Location
00:00:56
Other Offsite Approaches
00:01:51
Security Does Not Stop
00:01:12
More Options
00:02:01
Rolling Hot Site
00:00:58
Recovery Strategies (Cont.)
00:00:41
Supply and Technology Recovery
00:01:44
VoIP
00:01:07
Equipment Replacement
00:03:23
What Items Need to Be Considered?
00:01:31
Priorities
00:01:05
Executive Succession Planning
00:01:29
Recovery Strategies (Cont.)
00:03:14
Co-Location
00:00:51
Data Recovery
00:01:52
Backup Redundancy
00:01:52
Recovering Data
00:00:41
Automated Backup Technologies
00:02:04
Tape Vaulting
00:02:40
Clustering for Fault Tolerance
00:01:30
Disk or Database Shadowing
00:05:28
Cost and Recovery Times
00:02:04
Recovery Solutions
00:00:48
Preventative Measures
00:01:18
Reviewing Insurance
00:00:50
Results from the BIA
00:01:42
Basic Structure of BCP
00:04:04
External Groups
00:01:29
Activation Phase
00:07:51
Reconstitution Phase
00:02:37
Who Goes First?
00:00:56
Disaster Hit – Now What?
00:01:05
Termination of BCP
00:01:05
Life Cycle
00:02:12
Types of Tests to Choose From
00:03:49
Test Objectives
00:01:02
Training Requirements
00:01:58
What Is Success?
00:00:51
Out of Date?
00:01:01
Keeping It Current
00:00:52
Change Control
00:00:58
Resulting Plan Should Contain
00:01:24
Phases of the BCP
00:00:54
Domain 8 Review
00:03:16