Companies Home Search Profile

(ISC)² CISSP Online Certification Training

Focused View

Keith Barker

8:45:10

76 View
  • 01 - Welcome to CISSP 2018.mp4
    01:16
  • 02 - CIA Concepts.mp4
    04:28
  • 03 - Cyber Crime Terms and Vocabulary.mp4
    04:10
  • 04 - 27000 Series Framework.mp4
    05:49
  • 05 - Due Care Due Diligence.mp4
    05:02
  • 06 - Inside Threats and Ethics.mp4
    05:19
  • 07 - Policies Start with Senior Management.mp4
    05:39
  • 08 - Defining Risk.mp4
    04:40
  • 09 - Control Types.mp4
    04:32
  • 10 - Compliance Requirements.mp4
    05:41
  • 11 - DR, BC, and BIA.mp4
    05:42
  • 12 - Security Awareness Training.mp4
    04:41
  • 13 - Intellectual Property and Licensing.mp4
    06:18
  • 14 - Policy Life Cycle.mp4
    06:02
  • 15 - Threat Modeling.mp4
    06:05
  • 16 - Supply Chain Risk Management.mp4
    05:29
  • 17 - Classifying Assets and Information.mp4
    07:47
  • 18 - Stewards and Custodians of Assets and Information.mp4
    06:58
  • 19 - Protecting Privacy.mp4
    04:24
  • 20 - Data Retention.mp4
    04:03
  • 21 - Determining Security Controls.mp4
    05:12
  • 22 - Data State and Resources for Security Control Frameworks.mp4
    02:17
  • 23 - Information and Asset Handling Policies.mp4
    07:32
  • 24 - Designing with Security in Mind.mp4
    05:56
  • 25 - Security Model Fundamentals.mp4
    06:58
  • 26 - System Security Requirements.mp4
    04:55
  • 27 - Hardware and Firmware Security Capabilities.mp4
    06:36
  • 28 - Assessing Vulnerabilities.mp4
    05:20
  • 29 - Vulnerabilities in Web-Based Systems.mp4
    05:14
  • 30 - Vulnerabilities in Mobile Systems.mp4
    04:39
  • 31 - Vulnerabilities in Embedded Devices.mp4
    06:27
  • 32 - Facility Design and Controls.mp4
    06:25
  • 33 - Symmetric Encryption Concepts.mp4
    06:05
  • 34 - Symmetric Keys and Algorithms.mp4
    04:22
  • 35 - Asymmetric Encryption Concepts.mp4
    05:04
  • 36 - Digital Signature Concepts.mp4
    05:55
  • 37 - Hashing for Integrity.mp4
    04:41
  • 38 - Asymmetrical Encryption with Email.mp4
    05:45
  • 39 - PKI uses and Revoking Certs.mp4
    04:28
  • 40 - Power Considerations.mp4
    03:53
  • 41 - OSI and IP Models.mp4
    06:09
  • 42 - IP Networking.mp4
    06:54
  • 43 - Wi-Fi Security Considerations.mp4
    08:03
  • 44 - Network Component Security.mp4
    07:07
  • 45 - Virtualized Network Security Considerations.mp4
    04:24
  • 46 - Securing Communications Channels.mp4
    07:51
  • 47 - Identity Management (IdM).mp4
    07:28
  • 48 - AAA as Part of Our Controls.mp4
    06:30
  • 49 - Centralized Authentication with RADIUS.mp4
    06:47
  • 50 - Using LDAP with Directory Services.mp4
    04:14
  • 51 - Multi-Factor Authentication Categories.mp4
    03:23
  • 52 - Biometric Accept-Reject Rates.mp4
    05:03
  • 53 - Options for Biometric Authentication.mp4
    05:02
  • 54 - DAC and MAC and RBAC.mp4
    06:23
  • 55 - IAM Provisioning Lifecycle.mp4
    08:06
  • 56 - Testing, Auditing, and Assessment Overview.mp4
    06:14
  • 57 - Penetration Testing.mp4
    05:19
  • 58 - Vulnerability Scans and Assessments.mp4
    02:44
  • 59 - Reviewing and Testing Code.mp4
    06:19
  • 60 - Security-Related Data Collection.mp4
    06:38
  • 61 - Continuous Monitoring.mp4
    04:24
  • 62 - Supporting Investigations.mp4
    03:18
  • 63 - Types of Evidence.mp4
    04:14
  • 64 - Chain of Custody.mp4
    03:40
  • 65 - The Forensics Process.mp4
    03:17
  • 66 - Separation of Duties.mp4
    04:53
  • 67 - Media Management.mp4
    05:28
  • 68 - Backups.mp4
    07:33
  • 69 - Logging with Separation of Duties.mp4
    07:11
  • 70 - RAID Concepts.mp4
    03:19
  • 71 - Incident Response Overview.mp4
    06:14
  • 72 - Phases of Incident Handling.mp4
    03:06
  • 73 - Improving Security with Configuration Management.mp4
    04:43
  • 74 - Patch Management.mp4
    05:07
  • 75 - Change Management.mp4
    10:17
  • 76 - Comparing IDS and IPS.mp4
    04:12
  • 77 - IDS and IPS Detection Methods.mp4
    04:29
  • 78 - Network vs Host-Based IDS and IPS.mp4
    05:59
  • 79 - IDS and IPS Alarms.mp4
    04:15
  • 80 - Traditional and Next-Generation Firewalls.mp4
    04:19
  • 81 - Categorizing Vulnerabilities with CVSS.mp4
    03:38
  • 82 - Calculating Vulnerability Scores.mp4
    05:14
  • 83 - Honeypots.mp4
    05:34
  • 84 - Fault Tolerance for Availability.mp4
    04:36
  • 85 - DR and Alternate Sites.mp4
    05:01
  • 86 - H W and S W Planning for DR.mp4
    03:32
  • 87 - Directing and Communicating DR.mp4
    06:04
  • 88 - Personnel Safety and Security.mp4
    05:18
  • 89 - Software Development Security.mp4
    05:58
  • 90 - Software Development Life Cycle (SDLC).mp4
    06:49
  • 91 - Change Management.mp4
    04:31
  • 92 - Software Capability Maturity Model (CMMI).mp4
    05:37
  • 93 - Programming Concepts.mp4
    06:42
  • 94 - Programming Methodology.mp4
    07:43
  • 95 - Common Software Vulnerabilities.mp4
    08:07
  • 96 - Web Software Vulnerabilities.mp4
    08:21
  • Description


    In this intermediate (ISC)² skills training, Keith Barker and Ben Finkel cover the CISSP methodology objectives in the CISSP exam, which is the one required exam to earn the CISSP certification.

    The CISSP is one of the most valued certifications available to IT security professionals — and employers. There’s a reason for that. CISSP not only validates that you have the skills necessary to design, implement, and maintain your organization’s cybersecurity programs. The CISSP also validates that you have the experience, too. (ISC)² maintains a stringent qualification regime for all its certifications, which includes required documented work experience and a sponsorship. For the CISSP, you’ll need to show a minimum of five (5) years cumulative paid work experience in two or more of the eight domains of the CISSP CBK.

    More details


    After finishing this CISSP Certification training, you'll have a broad understanding of the eight domains of the CISSP CBK, be ready to take on the CISSP exam, and be in a good position to move into more senior-level security roles.

    For anyone who leads an IT team, this (ISC)² training can be used for CISSP exam prep, onboarding new security professionals, individual or team training plans, or as a (ISC)² reference resource.

    CISSP Certification Training: What You Need to Know

    This CISSP training maps to the CISSP methodology exam objectives and covers topics such as:

    • Confidentiality, integrity, and availability (CIA)
    • Cryptography, such as symmetric, asymmetric, Public Key Infrastructure (PKI), and digital signatures
    • Asset classification, data classification, and data security controls
    • Network security, such as Network Access Control (NAC) devices and endpoint security
    • Identity and Access Management (IAM) and authorization, such as RBAC, MAC, and DAC
    • Vulnerability assessments, penetration testing, disaster recovery (DR), and business continuity (BC)
    • Logging and monitoring, such as intrusion detection (IDS), intrusion prevention (IPS), and SIEM
    • Backup storage strategies and recovery site strategies
    • Software Development Life Cycle (SDLC), including change management

    Who Should Take CISSP Certification Training?

    This CISSP certification training is considered professional-level (ISC)² training, which means it was designed for security professionals. This CISSP methodology skills course is designed for security professionals with at least five years of experience with security policies and management.

    New or aspiring security professionals. If you’re a security professional who is new to the field, you’re probably starting to become aware of just how broad and deep the pool of potential knowledge is in this career field. You’ll need expertise in risk management and asset security, architecture and engineering, communication and network security, and much more. Considering the experience requirements for the CISSP, you may not be able to get certified now, but that doesn’t mean you won’t learn a lot from this training.

    Experienced security professionals. If you’re a security professional with several years under your belt and you want to prove your mastery of the career field, you should be seriously planning to earn the Certified Information Systems Security Professional (CISSP) certification. This training covers the length and breadth of the certifying exam’s topics -- penetration testing, cryptography, network security and vulnerability assessment. Learn the details of expert digital security and prepare for your CISSP exam.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Keith Barker
    Keith Barker
    Instructor's Courses

    The best part of being a trainer is making a difference in the life of a student. When a motivated learner and the correct training meet at the right time, the results are amazing.

    Keith Barker discovered a love for computers and networking in 1984 and began his IT career in 1985 at Electronic Data Systems (EDS). He has worked with companies including Paramount Pictures, Blue Cross, and several government agencies. Keith loves to teach and spends most of his time creating fun and useful videos for CBT Nuggets.

    Certifications: Cisco CCIE (2x), CISSP, Network+, Security+, VMware, Palo Alto, Check Point

    Areas of expertise: Networking and Security

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 96
    • duration 8:45:10
    • Release Date 2023/07/17

    Courses related to CISSP - Certified Information Systems Security Professional

    Courses related to Cyber Security

    Courses related to Information Security

    Courses related to Cyber Security Awareness