Companies Home Search Profile

CISSP : Domain 1 : Security and Risk Management - Learn 2024

Focused View

CloudMatrix Learning

8:37:28

36 View
  • 1. Introduction Course Overview.mp4
    04:45
  • 2. Domain 1 Introduction Security and Risk Management.mp4
    02:45
  • 1. Introduction Security Concepts.mp4
    03:56
  • 2. The CIA Triad.mp4
    02:41
  • 3. The Five Pillars of Security.mp4
    03:36
  • 4. Confidentiality Terms.mp4
    02:08
  • 5. Integration Terms.mp4
    02:40
  • 6. Availability Terms.mp4
    02:03
  • 7. Authenticity Terms.mp4
    02:42
  • 8. Non-repudiation Terms.mp4
    02:18
  • 9. Common Security Terms.mp4
    05:19
  • 10. Security Concepts Best Practices for Application.mp4
    02:20
  • 11. Lab Discussing Security Concepts.html
  • 12. Template Security Concepts Documentation Template.html
  • 1. Introduction Security Governance Principles.mp4
    03:28
  • 2. Security Governance.mp4
    02:53
  • 3. Governance Requirements.mp4
    03:52
  • 4. Due Care and Due Diligence.mp4
    03:42
  • 5. Security Goal Categories.mp4
    02:34
  • 6. IT Governance Committee.mp4
    03:39
  • 7. Organizational Governance Structure.mp4
    02:59
  • 8. The Organizational Cultures Impact on Security.mp4
    03:30
  • 9. Roles and Responsibilities.mp4
    07:24
  • 10. CISO (Chief Information Security Officer) Role.mp4
    02:27
  • 11. CISO (Chief Information Security Officer) Responsibilities.mp4
    04:25
  • 12. Organizational Processes.mp4
    03:04
  • 13. Communications.mp4
    03:19
  • 14. Security Reporting Options.mp4
    04:51
  • 15. Summary Security Governance Principles.mp4
    03:26
  • 16. Lab Discussing Security Governance Principles.html
  • 17. Template Security Governance Principles.html
  • 1. Introduction Compliance.mp4
    03:09
  • 2. Compliance.mp4
    02:02
  • 3. CISSP Legislative and Regulatory Compliance.mp4
    02:54
  • 4. Privacy Issues and Personally Identifiable Information (PII).mp4
    01:59
  • 5. U.S. Information Privacy Law.mp4
    08:38
  • 6. International Privacy Law.mp4
    02:39
  • 7. EU GDPR.mp4
    03:00
  • 8. Computer Crime.mp4
    02:18
  • 9. U.S. Computer Crime Law.mp4
    02:59
  • 10. Data Breach.mp4
    03:19
  • 11. Intellectual Property Law and Licensing.mp4
    02:36
  • 12. License Types.mp4
    02:12
  • 13. Trans-Border Data Flow (TBDF).mp4
    02:54
  • 14. CISSP Import and Export Controls.mp4
    02:51
  • 15. Industry Standards.mp4
    05:26
  • 16. Summary Supporting Compliance.mp4
    05:45
  • 17. Lab Discussing Compliance.html
  • 18. Template CISSP Compliance Documentation Template.html
  • 1. Introduction Professional Ethics.mp4
    02:52
  • 2. The Purpose of Ethics.mp4
    01:40
  • 3. The Organizational Ethics.mp4
    01:48
  • 4. Regulatory Requirements for Ethics Programs.mp4
    01:47
  • 5. Ethics Issues in a Computing Environment.mp4
    01:41
  • 6. Common Computer Ethics Fallacies.mp4
    :
  • 7. Internet Architecture Board Ethics (IAB).mp4
    01:32
  • 8. Ethical Minefields for Security Professionals.mp4
    01:52
  • 9. Code of Ethics.mp4
    01:32
  • 10. Summary Upholding Professional Ethics in Security.mp4
    02:09
  • 11. Lab Discussing Professional Ethics in Security.html
  • 12. Template CISSP Professional Ethics Documentation.html
  • 1. Introduction Security Documentation.mp4
    03:30
  • 2. The Value of Security Documentation and Types.mp4
    03:30
  • 3. Security Policy Objectives and Types.mp4
    03:14
  • 4. The Relationship Between Security Document Types.mp4
    01:32
  • 5. Summary Drafting Security Documentation.mp4
    02:03
  • 6. Lab Discussing Security Documentation.html
  • 7. Template Security Documentation.html
  • 1. Introduction Risk Management.mp4
    02:49
  • 2. What is Risk.mp4
    01:30
  • 3. Risk Management.mp4
    02:02
  • 4. Integrating Governance, Compliance, and Risk Management.mp4
    01:47
  • 5. Results of Improper Risk Management.mp4
    02:24
  • 6. The Risk Analysis Process.mp4
    02:38
  • 7. Asset Identification and Valuation.mp4
    07:48
  • 8. Vulnerability Areas.mp4
    04:35
  • 9. Identify Threats.mp4
    03:45
  • 10. Risk Assessment Methodology.mp4
    03:42
  • 11. Risk Assessment Determination Factors.mp4
    02:18
  • 12. Qualitative and Quantitative Assessments.mp4
    05:14
  • 13. Risk Prioritization.mp4
    02:28
  • 14. Risk Management Frameworks.mp4
    03:35
  • 15. Risk Maturity Model (RMM).mp4
    02:37
  • 16. Summary Implementing Risk Management.mp4
    04:51
  • 17. Lab Discussing Risk Management.html
  • 18. Template Risk Management Documentation Template.html
  • 1. Introduction Threat Modeling.mp4
    02:49
  • 2. Threat Modeling Process.mp4
    03:33
  • 3. Threat Models.mp4
    04:42
  • 4. Threat Types.mp4
    05:20
  • 5. Virus Types.mp4
    05:08
  • 6. Malware Types.mp4
    04:58
  • 7. Reduction Analysis.mp4
    03:26
  • 8. Threat Agents.mp4
    02:57
  • 9. Diagramming Attacks.mp4
    03:10
  • 10. Rating Threat Impact (DREAD) aka. DREAD Model.mp4
    02:18
  • 11. Summary Implementing Threat Modeling.mp4
    06:05
  • 12. Lab Discussing Threat Modeling.html
  • 13. Template Threat Modeling Documentation.html
  • 1. Introduction Risk Response.mp4
    02:11
  • 2. Threat Remediation.mp4
    03:11
  • 3. Responses to Risks.mp4
    02:14
  • 4. Risk Treatment.mp4
    02:16
  • 5. Control Selection Criteria (Framework and Types).mp4
    08:43
  • 6. Control Functions and Implementation.mp4
    11:16
  • 7. Residual Risk.mp4
    02:15
  • 8. Monitoring and Measuring.mp4
    03:11
  • 9. Continuous Improvement.mp4
    02:50
  • 10. Summary Risk Response.mp4
    03:55
  • 11. Lab Discussing Risk Response.html
  • 12. Template Risk Response Documentation.html
  • 1. Introduction Business Continuity Plan Fundamentals.mp4
    02:41
  • 2. BCP (Business Continuity Planning) and Content.mp4
    04:48
  • 3. Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP).mp4
    03:10
  • 4. Business Continuity Plan (BCP) Project Management.mp4
    06:05
  • 5. Advisory Committee-BCP Team.mp4
    03:30
  • 6. BCP Program Coordinators.mp4
    03:00
  • 7. BCP Team Responsibilities.mp4
    04:39
  • 8. Project Initiation and Scope.mp4
    06:00
  • 9. NIST SP 800-34.mp4
    03:27
  • 10. Business Organization Analysis.mp4
    04:01
  • 11. BIA (Business Impact Analysis).mp4
    02:16
  • 12. External Dependencies.mp4
    03:06
  • 13. Critical Business Processes.mp4
    02:58
  • 14. Impact of Financial Loss.mp4
    02:44
  • 15. MTD ( Maximum Tolerable Downtime).mp4
    02:40
  • 16. Reduced Operational.mp4
    02:27
  • 17. Business Plan Evaluation.mp4
    03:55
  • 18. Business Plan Testing.mp4
    03:28
  • 19. Business Plan Maintenance.mp4
    02:10
  • 20. BCP Implementation During a Disaster.mp4
    02:44
  • 21. Summary Applying BCP Fundamentals.mp4
    05:07
  • 22. Lab Discussing Business Continuity Plan Fundamentals.html
  • 23. Template Business Continuity Plan Fundamentals.html
  • 1. Introduction Acquisition Strategy and Practice.mp4
    02:57
  • 2. Supply Chain Risks.mp4
    02:57
  • 3. Supply Chain Risk Management.mp4
    02:52
  • 4. Acquisition Security Requirements.mp4
    03:00
  • 5. Acquisition Strategy.mp4
    03:18
  • 6. Hardware, Software and Service Acquisition.mp4
    04:59
  • 7. Security Questions to Ask Before Acquisition.mp4
    02:17
  • 8. Service Level Agreement (SLA).mp4
    03:12
  • 9. Business Documents.mp4
    03:16
  • 10. Outsourcing.mp4
    05:38
  • 11. Third-Party Assessment.mp4
    04:08
  • 12. Chain of Trust.mp4
    02:46
  • 13. PUF (Physical Unclonable Function).mp4
    02:20
  • 14. SBOM (Software Bill of Materials).mp4
    02:16
  • 15. Summary Acquisition Strategy and Practice.mp4
    02:34
  • 16. Lab Discussing Acquisition Strategy and Practice.html
  • 17. Template Acquisition Strategy and Practice.html
  • 1. Introduction Personnel Security Policies.mp4
    03:02
  • 2. Personnel Security.mp4
    02:47
  • 3. Job.mp4
    05:31
  • 4. Onboarding and Transfers.mp4
    02:51
  • 5. Employment Agreements and Policies.mp4
    10:56
  • 6. Termination.mp4
    03:09
  • 7. Contractors.mp4
    03:10
  • 8. Summary Drafting Personnel Security Policies.mp4
    02:46
  • 9. Lab Discussing Personnel Security Policies.html
  • 1. Introduction Security Awareness and Training.mp4
    03:07
  • 2. Security Awareness.mp4
    02:49
  • 3. Training Security and Methodology.mp4
    08:04
  • 4. Appropriate Levels.mp4
    01:42
  • 5. Training.mp4
    08:51
  • 6. Security Fatigue and Champion.mp4
    04:57
  • 7. Gamification.mp4
    03:37
  • 8. Summary Developing Security Awareness and Training.mp4
    03:58
  • 1. Summary Domain 1.mp4
    04:05
  • Description


    Comprehensive cybersecurity certification covering risk management, access control, cryptography, and incident response.

    What You'll Learn?


    • Principles of risk management, including risk identification, assessment, and mitigation strategies.
    • Security governance frameworks and their implementation.
    • Security policies, standards, procedures, and guidelines development and enforcement.
    • Asset classification and control, including information classification and handling.
    • Compliance with relevant laws, regulations, and business requirements.
    • Professional ethics and the importance of security awareness and training.
    • Incident response and disaster recovery planning.
    • Business continuity management and its integration with security practices.

    Who is this for?


  • This CISSP Domain 1: Security and Risk Management course is designed for individuals who are preparing for the CISSP (Certified Information Systems Security Professional) certification exam.
  • It covers the first domain of the CISSP exam, which focuses on security and risk management.
  • The course is suitable for IT professionals, security analysts, security managers, and anyone interested in enhancing their knowledge and skills in information security and risk management.
  • Whether you're new to the field or an experienced security practitioner, this course will provide you with the necessary knowledge and strategies to succeed in the CISSP certification process.
  • What You Need to Know?


  • Familiarity with cybersecurity concepts and principles.
  • Understanding of information security fundamentals.
  • Basic knowledge of risk management and assessment.
  • Familiarity with security policies, standards, and guidelines.
  • Awareness of legal, regulatory, and compliance requirements.
  • Ability to analyze and interpret security-related data.
  • Willingness to actively participate in the learning process.
  • Dedication to expanding your cybersecurity knowledge and skills.
  • More details


    Description

    Here's a detailed course outline for the Certified Information Systems Security Professional (CISSP) certification:


    CISSP Course Outline:


    1. Introduction to CISSP

      • Overview of the CISSP certification

      • Understanding the CISSP domains and their importance

      • Exam structure, format, and requirements

    2. Security and Risk Management

      • Principles of security and risk management

      • Risk assessment and management

      • Security governance and compliance

      • Business continuity and disaster recovery planning

    3. Asset Security

      • Identifying and classifying information assets

      • Protecting data confidentiality, integrity, and availability

      • Cryptography and its applications

      • Physical security controls

    4. Security Architecture and Engineering

      • Secure system design principles

      • Security models and frameworks

      • Security control types and their implementation

      • Security in the Software Development Life Cycle (SDLC)

    5. Communication and Network Security

      • Network security architecture and components

      • Secure network design and protocols

      • Wireless security

      • Remote access and VPN technologies

    6. Identity and Access Management

      • Principles of identity and access management

      • Authentication, authorization, and accounting

      • Identity federation and single sign-on

      • Privileged account management

    7. Security Assessment and Testing

      • Security assessment methodologies

      • Vulnerability assessment and penetration testing

      • Security monitoring and auditing

      • Incident response and forensics

    8. Security Operations

      • Operational security controls

      • Patch and vulnerability management

      • Logging, monitoring, and alerting

      • Disaster recovery and business continuity

    9. Software Development Security

      • Secure software design principles

      • Secure coding techniques and practices

      • Security testing and validation

      • Supply chain security

    10. Exam Preparation and Review

      • Practice questions and mock exams

      • Time management and exam-taking strategies

      • Final review and consolidation of key concepts


    This comprehensive course outline covers the eight domains of the CISSP exam, providing a detailed understanding of the knowledge and skills required to become a Certified Information Systems Security Professional. The course will equip participants with the necessary expertise to protect organizations from cyber threats, manage security risks, and implement effective security controls.

    Who this course is for:

    • This CISSP Domain 1: Security and Risk Management course is designed for individuals who are preparing for the CISSP (Certified Information Systems Security Professional) certification exam.
    • It covers the first domain of the CISSP exam, which focuses on security and risk management.
    • The course is suitable for IT professionals, security analysts, security managers, and anyone interested in enhancing their knowledge and skills in information security and risk management.
    • Whether you're new to the field or an experienced security practitioner, this course will provide you with the necessary knowledge and strategies to succeed in the CISSP certification process.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    CloudMatrix Learning
    CloudMatrix Learning
    Instructor's Courses
    CloudMatrix Learning. is an innovative information technology company specializing in Learning Services. Based in the Europe, the company was established with the mission to transform how educational content is delivered and consumed by leveraging cutting-edge technologies.The flagship product of CloudMatrix Learning is a dynamic learning management system (LMS) that offers scalable solutions for educational institutions and corporate training programs. This platform integrates seamlessly with existing educational tools and provides real-time analytics that helps educators enhance their teaching methods and improve student engagement.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 148
    • duration 8:37:28
    • Release Date 2024/08/11

    Courses related to CISSP - Certified Information Systems Security Professional

    Courses related to Cyber Security

    Courses related to Cyber Security Awareness