Companies Home Search Profile

CISSP & CISM Exam Prep Course - Fast Track Training

Focused View

Nour | Cyvitrix Train,Experts Learn | Cyvitrix

19:58:55

22 View
  • 1. CISM Course Introduction.mp4
    06:09
  • 2. CISSP Course Introduction.mp4
    02:15
  • 1. Security Objective.mp4
    07:23
  • 2. Security Threats.mp4
    04:35
  • 3. Security Vulnerabilities.mp4
    11:38
  • 4. Adversaries.mp4
    09:41
  • 5. Malware.mp4
    14:42
  • 6. Cyber Attacks.mp4
    11:52
  • 7. Cyber Kill Chain.mp4
    08:59
  • 8. Application Attacks.mp4
    18:32
  • 9. File-Less Malware.mp4
    06:03
  • 10. Social Engineering.mp4
    16:06
  • 11. Password Attacks.mp4
    05:34
  • 12. Cybersecurity Standards and Frameworks.mp4
    16:36
  • 1. Risk Management Overview.mp4
    22:27
  • 2. Types of Risk.mp4
    08:56
  • 3. Risk identifcation and Analysis.mp4
    14:35
  • 4. Specialized techniques in Risk Analysis.mp4
    04:19
  • 5. Managing the Risk - Risk Response.mp4
    07:22
  • 6. Risk Reporting and Monitoring.mp4
    05:01
  • 7. Key Risk Indicators.mp4
    05:58
  • 8. Risk Management Frameworks.mp4
    02:55
  • 9. Threat Modeling Techniques.mp4
    13:15
  • 1. Security Controls Overview.mp4
    11:49
  • 2. Example of Security Controls.mp4
    05:37
  • 3. Control Objective and Compensating Controls.mp4
    08:30
  • 4. Defense in Depth and Control References.mp4
    09:05
  • 5. Selection and Implementation of Security Controls.mp4
    06:53
  • 6. Security Controls Assessment.mp4
    02:58
  • 1. What is Governance and Management.mp4
    07:12
  • 2. Organizational Structure.mp4
    06:16
  • 3. Security Governance.mp4
    06:35
  • 4. Security Program and Strategy.mp4
    04:16
  • 5. Security Manager Roles.mp4
    09:28
  • 6. Security Program Stakeholders.mp4
    06:31
  • 7. Security Functions.mp4
    08:35
  • 8. Governance Frameworks.mp4
    07:47
  • 9. Policies.mp4
    10:44
  • 10. Policy development.mp4
    03:33
  • 11. Standards.mp4
    07:55
  • 12. Procedures and Guidelines.mp4
    07:11
  • 13. Documentation Review.mp4
    03:33
  • 14. Security Program documentation.mp4
    04:27
  • 1. Legal Laws and Regulations.mp4
    12:22
  • 1. Security Program.mp4
    08:18
  • 2. Security Functions.mp4
    08:35
  • 3. Roles of Security Manager.mp4
    09:28
  • 4. Roles in Data and Assets Protection.mp4
    08:31
  • 5. due care and due dillegence.mp4
    02:53
  • 1. Incident Management Overview.mp4
    22:09
  • 2. Collecting digital Evidences and Forensic.mp4
    05:51
  • 3. Incident Response Training.mp4
    03:24
  • 4. Incident Response Plan Testing.mp4
    09:17
  • 5. SOC Team.mp4
    05:30
  • 6. SOC Tools.mp4
    17:59
  • 1. What is Disaster and BIA.mp4
    06:51
  • 2. What is the DRP.mp4
    06:28
  • 3. Business Continuity Introduction.mp4
    06:42
  • 4. RPO & RTO.mp4
    09:01
  • 5. AIW,SDO,MTO and Relation.mp4
    06:14
  • 6. Linking RPO, RTO, AIW, SDO, MTO.mp4
    05:28
  • 7. Recovery Strategies.mp4
    07:57
  • 8. Reciprocal Agreement.mp4
    02:08
  • 9. BCP Testing and Evaluation.mp4
    07:36
  • 1. Personnel Security.mp4
    26:27
  • 2. Security Awareness Training.mp4
    07:04
  • 3. SoD and Two Person Control.mp4
    01:46
  • 4. Least Privilege and Need to Know.mp4
    01:47
  • 1. Physical Security Overview.mp4
    13:53
  • 2. Physical Access Control.mp4
    05:52
  • 3. Badges and Smart Cards and PACs.mp4
    05:35
  • 4. Motion Detectors and Security Cameras.mp4
    07:39
  • 5. Security Cameras.mp4
    04:45
  • 6. Work Area & Priemeter Security.mp4
    10:48
  • 7. Securing Power Sources.mp4
    07:52
  • 8. Env Controls.mp4
    05:17
  • 9. Fire Suppression System.mp4
    11:09
  • 1. Software Development Overview.mp4
    08:57
  • 1. Computing devices overview.mp4
    19:05
  • 2. Computing devices components.mp4
    20:31
  • 3. Application architecture and Network architecture.mp4
    23:43
  • 1. Introduction to Networks.mp4
    13:17
  • 2. Network Topologies.mp4
    10:26
  • 3. OSI and TCPIP.mp4
    15:33
  • 4. Explaining Layers 1,2,3.mp4
    20:23
  • 5. Explaining Layers 4,5,6,7.mp4
    13:37
  • 6. Layer 2 Attacks.mp4
    03:04
  • 7. Network Segmentation and VLANs.mp4
    05:31
  • 8. NAC and dot1x and Port Security - SUB.mp4
    03:09
  • 9. Wireless Security.mp4
    07:32
  • 10. Firewall and IPS and DMZ and Screened Subnet.mp4
    09:09
  • 11. IP Security Protocol (IPSEC).mp4
    10:33
  • 1. PKI.mp4
    06:52
  • 2. Digital Certificate.mp4
    05:59
  • 3. Digital Signature.mp4
    05:16
  • 4. Hashing.mp4
    15:22
  • 1. Security Design Principals.mp4
    15:56
  • 2. Security through Obsecurity.mp4
    10:01
  • 3. Security Models.mp4
    18:14
  • 4. Brewer Nash and HRU.mp4
    04:51
  • 5. TCSEC, ITSEC and Common Criteria.mp4
    07:30
  • 1. What is Information System Auditing.mp4
    05:58
  • 2. Security Testing and Assessment.mp4
    06:21
  • 1. AAA Overview.mp4
    03:14
  • 2. Manage Privileged Accounts.mp4
    05:09
  • 3. SSO RSO.mp4
    05:39
  • 4. MFA.mp4
    10:03
  • 5. Authorization and Access Control Models.mp4
    10:13
  • 1. Change Management.mp4
    06:52
  • 2. Type of Changes.mp4
    06:14
  • 3. Data Backup.mp4
    07:55
  • 4. Backup Types.mp4
    13:41
  • 5. Storage Redundancy using RAID.mp4
    07:47
  • 6. Database overview.mp4
    11:29
  • 7. Database Security.mp4
    05:31
  • 8. Database Resiliency.mp4
    08:25
  • 9. Patch Management.mp4
    03:10
  • 10. Configuration Management.mp4
    05:39
  • 11. ATO Accrediation.mp4
    02:09
  • 1. Data life cycle.mp4
    05:45
  • 2. Data Classification.mp4
    07:05
  • 3. Data Security Controls.mp4
    07:53
  • 4. Data Protection Concepts.mp4
    04:23
  • 5. Data Destruction.mp4
    07:54
  • 1. Outsourcing and Third Party Management.mp4
    17:00
  • 2. Supply chain Risk Management.mp4
    05:43
  • 1. Cloud Computing.mp4
    12:22
  • 2. Microservices, VDI, Architectural Concepts.mp4
    07:51
  • 3. Virtualization and SDDC.mp4
    04:49
  • 4. SDN and SDWAN.mp4
    12:22
  • 5. Containers and Functions.mp4
    08:34
  • 6. CDN - Content Delivery Network.mp4
    06:30
  • 1. RACI Matrix.mp4
    06:48
  • 2. IT Balanced Scorecards.mp4
    05:33
  • 3. Gap analysis Process.mp4
    19:47
  • 4. Feasibility Analaysis and Business Case.mp4
    06:30
  • 1. ISACA Code of Ethics.mp4
    03:28
  • 2. ISC2 Code of Ethics.mp4
    02:14
  • Description


    Learn once and Certify Many - Be Ready to clear your upcoming CISSP, CISM & CRISC Exams

    What You'll Learn?


    • - Essential concepts and principles of CISSP, CISM, and CRISC
    • - The importance of information security governance and risk management
    • - How to assess, implement, and manage security controls
    • - Real-life examples of security threats and how to mitigate them
    • - Secure software development and database management best practices
    • - Access and identity management, including authentication and authorization techniques
    • - The fundamentals of cryptography
    • - Network security, including secure protocols and firewalls
    • - Incident response and disaster recovery planning
    • - Compliance with laws, regulations, and industry standards
    • - Developing effective security policies and procedures
    • - Analyzing potential security risks and creating strategies to mitigate them.

    Who is this for?


  • IT professionals who want to specialize in cybersecurity management and are interested in obtaining certifications such as CISSP, CISM, and CRISC.
  • Cybersecurity professionals who want to enhance their knowledge and skills in security management to advance their careers.
  • Security analysts who want to gain more insight into security management principles and practices used in large organizations.
  • Anyone who wants to learn how to identify, assess, and mitigate security risks within their organization.
  • Managers, executives, and directors who are responsible for overseeing security initiatives and want to develop knowledge of security management.
  • Individuals looking to learn more about information security, cybersecurity, and the management of cybersecurity risks in their workplace.
  • This course is ideal for those wanting to shift their focus from technical knowledge to security management and cybersecurity leadership.
  • What You Need to Know?


  • You should have a basic understanding of information technology and network operations.
  • You should also have some fundamental knowledge of cybersecurity concepts
  • It is recommended that you have some work experience in the field of information security or related fields, although this is not mandatory.
  • You must come with a willingness to learn and a passion for cybersecurity, a willingness to participate actively in the course, complete the assignments and work towards increasing your skillset in the cybersecurity domain.
  • More details


    Description

    Welcome to our groundbreaking CISSP, CISM, and CRISC Course, the first of its kind, designed to provide you with all the essential knowledge and expertise to prepare you for a career in information security.


    In today’s digital age, securing information has become a crucial aspect of any organization’s success. Therefore, employers are looking for professionals with a strong background in information security who can protect sensitive data and eliminate security threats.


    Our comprehensive course is designed to help you achieve your desired career outcomes. Our experienced educators have combined the essential elements of CISSP, CISM, and CRISC to create a syllabus that provides a complete overview of security risk management.


    Our course is aimed at professionals who want to improve their skills and knowledge in information security. We cover a wide range of topics in-depth, including risk management, security governance, access and identity management, cryptography, network security, and much more.


    Our instructors will guide you through the course materials using state-of-the-art tools and techniques and offer personalized support throughout the course. Our interactive training methods provide a dynamic and engaging learning experience that keeps you motivated and engaged.


    By the end of this course, you’ll have the confidence to take on any information security challenge. You’ll have learned how to deliver secure solutions and technologies, develop effective security policies, comply with regulations and standards, and analyze potential risks.


    Don’t hesitate! Give your career a boost today and enroll in our CISSP, CISM, and CRISC Course. Take the first step towards securing your future!

    Who this course is for:

    • IT professionals who want to specialize in cybersecurity management and are interested in obtaining certifications such as CISSP, CISM, and CRISC.
    • Cybersecurity professionals who want to enhance their knowledge and skills in security management to advance their careers.
    • Security analysts who want to gain more insight into security management principles and practices used in large organizations.
    • Anyone who wants to learn how to identify, assess, and mitigate security risks within their organization.
    • Managers, executives, and directors who are responsible for overseeing security initiatives and want to develop knowledge of security management.
    • Individuals looking to learn more about information security, cybersecurity, and the management of cybersecurity risks in their workplace.
    • This course is ideal for those wanting to shift their focus from technical knowledge to security management and cybersecurity leadership.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Nour | Cyvitrix Train
    Nour | Cyvitrix Train
    Instructor's Courses
    Hi there!As cyber threats continue to evolve and become more sophisticated, the need for skilled cyber-security professionals has never been greater. A cyber-security trainer can play a critical role in preparing individuals and organizations to defend against cyber attacks and protect their sensitive information and assets.Here are 10 reasons why you should train with me as your cyber-security trainer:Expertise: With years of experience working in the cyber-security field, I bring a wealth of knowledge and expertise to my courses. I stay up-to-date with the latest trends and best practices in the industry, and I am dedicated to sharing this knowledge with my students.Comprehensive Training: My courses cover a wide range of cyber-security topics, including network security, cloud security, data protection, threat detection, and incident response. This ensures that learners have a well-rounded understanding of the cyber-security landscape.Practical Insights: My courses are designed to be practical and actionable, with a focus on real-world scenarios and challenges. I provide hands-on exercises and case studies that help learners apply their knowledge and skills in a practical setting.Accessibility: My courses are accessible to learners of all skill levels and backgrounds. I use clear and concise language, and I provide explanations and examples that are easy to understand.Engaging Instruction: I use a variety of teaching methods, including lectures, interactive exercises, and quizzes, to keep learners engaged and motivated. My courses are designed to be dynamic and interesting, with a focus on active learning.Flexibility: My courses are self-paced, which means learners can complete them at their own pace and on their own schedule. This makes it easy for busy professionals to fit training into their busy schedules.Support: I am always available to answer questions and provide support to my students. I am dedicated to helping learners succeed, and I offer personalized support to ensure that students get the most out of their training.Collaboration: I encourage collaboration and communication among learners, which helps to foster a sense of community and support. I provide opportunities for learners to connect with each other and share their experiences and insights.Soft Skills Training: In addition to technical skills, I emphasize the importance of soft skills such as critical thinking, problem-solving, and communication. These skills are essential for success in the security field, and I provide training and guidance on how to develop them.Affordability: My courses are affordable and offer exceptional value for the price. I believe that everyone should have access to quality cyber-security training, and I strive to make my courses accessible to as many learners as possible.As a cyber-security trainer on Udemy, I am committed to helping learners develop the knowledge and skills they need to succeed in the cyber-security field. I am dedicated to providing high-quality training that is relevant, engaging, and practical, and I am always available to answer questions and provide support to my students.
    Experts Learn | Cyvitrix
    Experts Learn | Cyvitrix
    Instructor's Courses
    At Cyvitrix, we provide Training courses that help you as students to conquer and pass your certification exams from first attempt.Our courses are designed to provide you all what you need in order not only to pass the exam, but also to apply this knowledge to elevate and support your career objectivesWhy training with us is ideal for you?- Excellent quality video content- High courses quality- Organized materials- Real life scenarios and examples- Practice questions and questions ideas- Up to date content- Instructor is available to answer all questions you might get- Reasonable pricingHere are 10 reasons why you should train with me as your cyber-security trainer:Expertise: With years of experience working in the cyber-security field, I bring a wealth of knowledge and expertise to my courses. I stay up-to-date with the latest trends and best practices in the industry, and I am dedicated to sharing this knowledge with my students.Comprehensive Training: My courses cover a wide range of cyber-security topics, including network security, cloud security, data protection, threat detection, and incident response. This ensures that learners have a well-rounded understanding of the cyber-security landscape.Practical Insights: My courses are designed to be practical and actionable, with a focus on real-world scenarios and challenges. I provide hands-on exercises and case studies that help learners apply their knowledge and skills in a practical setting.Accessibility: My courses are accessible to learners of all skill levels and backgrounds. I use clear and concise language, and I provide explanations and examples that are easy to understand.Engaging Instruction: I use a variety of teaching methods, including lectures, interactive exercises, and quizzes, to keep learners engaged and motivated. My courses are designed to be dynamic and interesting, with a focus on active learning.Flexibility: My courses are self-paced, which means learners can complete them at their own pace and on their own schedule. This makes it easy for busy professionals to fit training into their busy schedules.Support: I am always available to answer questions and provide support to my students. I am dedicated to helping learners succeed, and I offer personalized support to ensure that students get the most out of their training.Collaboration: I encourage collaboration and communication among learners, which helps to foster a sense of community and support. I provide opportunities for learners to connect with each other and share their experiences and insights.Soft Skills Training: In addition to technical skills, I emphasize the importance of soft skills such as critical thinking, problem-solving, and communication. These skills are essential for success in the security field, and I provide training and guidance on how to develop them.Affordability: My courses are affordable and offer exceptional value for the price. I believe that everyone should have access to quality cyber-security training, and I strive to make my courses accessible to as many learners as possible.As a cyber-security trainer on Udemy, I am committed to helping learners develop the knowledge and skills they need to succeed in the cyber-security field. I am dedicated to providing high-quality training that is relevant, engaging, and practical, and I am always available to answer questions and provide support to my students.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 138
    • duration 19:58:55
    • English subtitles has
    • Release Date 2024/01/03