Companies Home Search Profile

Certified Information Systems Security Professional - CISSP

Focused View

Cybersecurity Certificates

16:54:27

180 View
  • 1. Introduction.mp4
    00:42
  • 2. About This Training.mp4
    04:21
  • 3. Course Outlines.mp4
    04:09
  • 4. Course Flow.mp4
    04:10
  • 5. Before You Start This Course.mp4
    02:42
  • 1. Important Websites NIST.mp4
    02:56
  • 2. Understand and Apply CIA.mp4
    11:19
  • 3. Evaluate and Apply Security Governance Principles.mp4
    08:13
  • 4. NIST 800-100.mp4
    06:04
  • 5. Security Governance - Requirements.mp4
    06:14
  • 6. The Organizational Culture.mp4
    11:06
  • 7. Due Care and Due Diligence.mp4
    07:27
  • 8. Exam Question.mp4
    04:11
  • 9. Guidelines for Applying Security Governance Principles.html
  • 10. Determine Compliance Requirements.mp4
    08:40
  • 11. Understand Legal and Regulatory Issues.mp4
    02:55
  • 12. Exam Question.mp4
    02:13
  • 13. Computer Crime.mp4
    08:27
  • 14. Guidelines for Upholding Professional Ethics in Security.html
  • 15. Ethics.mp4
    02:26
  • 16. Security Policy Framework.mp4
    24:41
  • 17. Resources CIS.mp4
    04:17
  • 18. Exam Tips.mp4
    01:45
  • 19. The Relationship Between Security Documents Types.mp4
    03:42
  • 20. Guidelines for Drafting Security Documentation.html
  • 21. Identify Business Continuity (BC) Requirements.mp4
    08:17
  • 22. BCP Phases.mp4
    12:01
  • 23. Business Impact Analysis - BIA.mp4
    10:41
  • 24. NIST SP 800-34.mp4
    08:06
  • 25. MTD-RTO-RPO.mp4
    11:29
  • 26. MTTF-MTTR.mp4
    06:12
  • 27. Business Continuity Controls.mp4
    09:42
  • 28. High Availability and Fault Tolerance.mp4
    11:28
  • 29. Exam Tips.mp4
    01:27
  • 30. Guidelines for Applying Business Continuity Plan Fundamentals.html
  • 31. Contribute To and Enforce Personal Security.mp4
    12:59
  • 32. Insider Threat Prevention.mp4
    15:20
  • 33. Employees Privacy.mp4
    04:50
  • 34. Social Media Security.mp4
    09:33
  • 35. Understand and Apply Risk Management Concepts.mp4
    10:53
  • 36. Qualitatively vs Quantitatively Assessment.mp4
    08:24
  • 37. Risks Formula.mp4
    11:41
  • 38. Risk Management Strategies.mp4
    10:12
  • 39. Security Controls.mp4
    06:28
  • 40. NIST 800-37.mp4
    02:19
  • 41. Risk Register.mp4
    01:17
  • 42. Exam Tips.mp4
    01:58
  • 43. Guidelines for Implementing Risk Management.html
  • 44. Understand and Apply Threat.mp4
    05:46
  • 45. STRIDE Model.mp4
    05:23
  • 46. Threat Intelligence Sources.mp4
    03:07
  • 47. Apply Risk-Based Management.mp4
    06:17
  • 48. Vendor Management Life Cycle.mp4
    05:26
  • 49. Establish and Maintain a Security Awareness.mp4
    09:30
  • 50. Awareness Resources.mp4
    09:09
  • 51. Some Important Policies.mp4
    07:20
  • 1. Identify Information and Assets.mp4
    14:12
  • 2. Assets Classification and Labeling.mp4
    12:37
  • 3. Military - Commercial Classification.mp4
    12:42
  • 4. Sample of Classification Tool 1.mp4
    02:49
  • 5. Sample of Classification Tool 2.mp4
    02:30
  • 6. Data Lost Prevention.mp4
    03:11
  • 7. Sample of DLP Tool.mp4
    03:18
  • 8. Determine and Maintain Information and Asset Ownership.mp4
    03:33
  • 9. Protect Privacy.mp4
    07:49
  • 10. 2.3.1 Guidelines for Implementing Privacy Protection.html
  • 11. Ensure Appropriate Asset Retention.mp4
    11:56
  • 12. Determine Data Security Controls.mp4
    12:51
  • 13. Data Encryption.mp4
    01:46
  • 1. Introduction to Security Architecture.mp4
    03:50
  • 2. Security Engineering Lifecycle.mp4
    04:13
  • 3. NISP SP 14-27.mp4
    11:36
  • 4. Trusted Computing Base _ TCB.mp4
    09:21
  • 5. TCB Vulnerability.mp4
    09:46
  • 6. Security Models.mp4
    17:07
  • 7. TCSEC.mp4
    05:38
  • 8. ITSEC.mp4
    06:02
  • 9. Security Architecture Questions.mp4
    03:17
  • 10. Enterprise Security Architecture.mp4
    05:05
  • 11. Virtualization.mp4
    09:50
  • 12. Fault Tolerance.mp4
    06:30
  • 13. Server Fault Tolerance Techniques.mp4
    02:05
  • 14. New Technology.mp4
    06:27
  • 15. Cryptography.mp4
    16:30
  • 16. Alternative Ciphers.mp4
    07:52
  • 17. Symmetric Encryption.mp4
    12:42
  • 18. Asymmetric Encryption.mp4
    13:51
  • 19. Hash.mp4
    06:04
  • 20. Physical Security.mp4
    07:38
  • 21. Physical Access Barriers.mp4
    09:41
  • 22. Power Issue.mp4
    03:10
  • 23. Fire.mp4
    05:28
  • 1. The OSI Model.mp4
    17:22
  • 2. TCP-IP Model.mp4
    02:37
  • 3. Network Architecture Components.mp4
    17:04
  • 4. Firewall.mp4
    10:37
  • 5. Network Types and Topologies.mp4
    08:36
  • 6. Remote Access Technology.mp4
    18:29
  • 7. Wireless Network.mp4
    07:09
  • 8. Network Attacks.mp4
    08:49
  • 9. Remote Access Security Mechanisms.mp4
    02:03
  • 10. RAID.mp4
    06:40
  • 11. Backup.mp4
    05:46
  • 12. Network Questions.mp4
    01:08
  • 1. Access Control.mp4
    06:42
  • 2. Authorization.mp4
    19:19
  • 3. Authentication.mp4
    18:47
  • 4. Single Sign on SSO.mp4
    13:08
  • 5. Central Administration (RADUIS).mp4
    04:13
  • 6. Access Control Attack.mp4
    17:10
  • 7. Intrusion Detection System (IDS).mp4
    06:54
  • 8. Access Control Important Exam Area.mp4
    04:09
  • 9. Access Control Questions.mp4
    07:57
  • 1. Introduction Security Assessment and Testing.mp4
    11:20
  • 2. Test Output.mp4
    04:33
  • 3. Vulnerability Assessment - Part 1.mp4
    02:16
  • 4. Vulnerability Assessment - Part 2.mp4
    03:16
  • 5. Nessus VA - Part 1.mp4
    13:25
  • 6. Nessus VA - Part 2.mp4
    14:05
  • 7. Nessus VA Report.mp4
    05:20
  • 8. OWASP ZAP - VA.mp4
    05:06
  • 9. Nexpose VA.mp4
    05:03
  • 10. Penetration Testing.mp4
    08:33
  • 11. Reconnaissance Demo - Maltego 2.mp4
    07:56
  • 12. Scanning Demo - Zenmap.mp4
    05:00
  • 13. Exploitation Demo - MetaSploit 2.mp4
    14:33
  • 14. Event Log Review 2.mp4
    07:19
  • 15. NIST 800-92.mp4
    02:56
  • 16. SIEM Solution.mp4
    06:16
  • 17. SIEM Solution Demo - Qradar.mp4
    03:09
  • 18. Code Review.mp4
    05:20
  • 19. Security KPI s.mp4
    06:57
  • 1. Introduction to Security Operation 2.mp4
    01:41
  • 2. Security Operation 2.mp4
    09:53
  • 1. The System Life Cycle.mp4
    06:43
  • 2. Software Development Methods.mp4
    06:34
  • 3. Change Control Process.mp4
    02:58
  • 4. Security Consideration.mp4
    01:48
  • 5. Software Control.mp4
    02:43
  • 6. Introduction to SQL Injection 2.mp4
    02:25
  • 7. What is SQL Injection.mp4
    09:48
  • Description


    Become a certified information systems security professional and enjoy a bright future.

    What You'll Learn?


    • Pass the CISSP exam from the first attempt and get you certified.
    • Let you master the 8 domains of the CISSP.
    • Gain the knowledge required to effectively design, engineer and manage the overall security posture of an organization.
    • Best-practice information security management practices, including IS technical skills, risk management and business continuity planning.

    Who is this for?


  • YOU
  • IT professionals seeking to enhance their careers and gain credibility as information security specialists
  • What You Need to Know?


  • Basic computer knowledge.
  • More details


    Description

    The CISSP Online Course provides a comprehensive review of the knowledge required to effectively design, engineer and manage the overall security posture of an organization. This training course will help students review and refresh their knowledge and identify areas they need to study for the CISSP exam.


    Who Should Enroll

    The training seminar is ideal for those working in positions such as but not limited to:

    • Security Consultant

    • Security Manager

    • IT Director/Manager

    • Security Auditor

    • Security Architect

    • Security Analyst

    • Security Systems Engineer

    • Chief Information Security Officer

    • Security Director

    • Network Architect

    Course Objectives

    After completing this course, the student will be able to:

    • Understand and apply fundamental concepts and methods related to the fields of information technology and security.

    • Align overall organizational operational goals with security functions and implementations.

    • Understand how to protect assets of the organization as they go through their lifecycle.

    • Understand the concepts, principles, structures and standards used to design, implement, monitor and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, integrity and availability.

    • Implement system security through the application of security design principles and application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures.

    • Understand the importance of cryptography and the security services it can provide in today’s digital and information age.

    • Understand the impact of physical security elements on information system security and apply secure design principles to evaluate or recommend appropriate physical security protections.

    • Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function.

    • List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1-7.

    • Identify standard terms for applying physical and logical access controls to environments related to their security practice.

    • Appraise various access control models to meet business security requirements.

    • Name primary methods for designing and validating test and audit strategies that support business requirements.

    • Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures.

    • Recognize risks to an organization’s operational endeavors and assess specific threats, vulnerabilities and controls.

    Who this course is for:

    • YOU
    • IT professionals seeking to enhance their careers and gain credibility as information security specialists

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Cybersecurity Certificates
    Cybersecurity Certificates
    Instructor's Courses
    There will be 3.5 million unfilled cyber security jobs globally, and of the candidates who are applying for these positions, fewer than one in four are even qualified, according to the MIT Technology Review. Cybersecurity Certificates gives you an opportunity to become an industry-ready cyber security professional with advanced cyber security training programs to help you earn certification in this domain. Our self-placed certification courses provide a high-engagement learning experience with real-world applications. Each course has been designed for individuals who want to start a new and satisfying career in cyber security.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 135
    • duration 16:54:27
    • English subtitles has
    • Release Date 2022/11/22