Video description
The fast, powerful way to prepare for your CISSP exam!
30+ hours of personal video training from leading security
expert Shon Harris
Achieving the (ISC)2’s globally recognized CISSP can give
your IT career a lift. In this DVD, the world’s #1 CISSP trainer
brings her legendary five-day boot camp to your computer screen.
Packed with over 30 hours of instruction adapted from Shon’s
classes, this video course includes realistic labs, scenarios, case
studies, and animations designed to build and test your knowledge
in real-word settings. Preparing for the CISSP has never been this
easy or convenient.
Master the skills and concepts you need for all ten CISSP
common body of knowledge domains:
Access Control
Application Security
Business Continuity and Disaster Recovery Planning
Cryptography
Information Security and Risk Management
Legal, Regulations, Compliance, and Investigations
Operations Security
Physical (Environmental) Security
Security Architecture and Design
Telecommunications and Network Security
System Requirements
OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4
(Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card
with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more
Table of Contents
Course Introduction
00:07:24
Domain 10 – Operations Security
00:02:02
Computer Operations
00:04:19
Problem Management Procedures for Processing Problems
00:01:11
Higher Level Look
00:00:36
Administrative Controls Personnel Controls
00:05:50
Resource Protection
00:02:03
Media Labels and Controls
00:01:19
Software Escrow
00:01:22
Media Reuse
00:05:33
Why Not Just Delete the Files?
00:02:57
Backups
00:01:42
Backup Types
00:01:08
Incremental Backup
00:01:15
Incremental
00:02:35
Differential Backup
00:03:19
Mean Time Between Failure
00:01:37
Mean Time to Repair
00:01:30
Redundant and Fault Tolerance
00:02:32
Mirroring Data
00:00:59
Direct Access Storage Device
00:07:27
Serial Advanced Technology Architecture
00:00:50
SAN
00:01:13
Fault Tolerance
00:02:05
Redundancy Mechanism
00:01:40
Some Threats to Computer Operations
00:00:51
Trusted Recovery of Software
00:01:10
After System Crash
00:00:51
Security Concerns
00:01:32
Contingency Planning
00:01:23
Remote Access Security
00:09:23
Before Carrying Out Vulnerability Testing
00:00:58
Testing for Vulnerabilities
00:01:20
Security Testing Issues
00:02:07
Vulnerability Scanning
00:01:42
Data Leakage – Keystroke Logging
00:00:58
Password Cracking
00:02:10
War Dialing
00:02:16
War Driving
00:03:26
Penetration Testing
00:10:05
Post-Testing and Assessment Steps
00:02:14
Penetration Testing Variations
00:00:55
Types of Testing
00:01:17
Protection Mechanism – Honeypot
00:01:49
Log Reviews
00:01:00
Domain 10 Review
00:07:06
Course Closure
00:24:37