CISSP Exam Prep
Focused View
6:51:07
76 View
01 - Course Intro.mp4
01:24
02 - Module Intro.mp4
00:06
03 - Learning objectives.mp4
00:40
04 - 1.1 About this Course.mp4
02:48
05 - 1.2 Understanding the CISSP Exam Structure.mp4
02:47
06 - 1.3 Preparing for the Types of Questions You Will Encounter on the Exam.mp4
12:23
07 - Learning objectives.mp4
00:56
08 - 2.1 Test Taking Rules of Thumb.mp4
04:40
09 - 2.2 The Zen of Test Taking.mp4
01:03
10 - Module Intro.mp4
00:06
11 - Learning objectives.mp4
00:52
12 - 3.1 Understanding Quantitative Risk Assessments.mp4
14:08
13 - 3.2 Exploring Business Impact Analysis.mp4
07:46
14 - 3.3 Exam Practice Questions.mp4
14:39
15 - Learning objectives.mp4
00:43
16 - 4.1 Grasping Privacy Concepts.mp4
09:43
17 - 4.2 Understanding Information Lifecycle.mp4
08:27
18 - 4.3 Exam Practice Questions.mp4
10:59
19 - Learning objectives.mp4
00:59
20 - 5.1 Applying the Star and Simple Properties.mp4
04:43
21 - 5.2 Deciphering Ciphers and Algorithms.mp4
12:08
22 - 5.3 Demystifying Symmetric and Asymmetric Encryption.mp4
05:56
23 - 5.4 Applying Asymmetric Encryption.mp4
06:08
24 - 5.5 Understanding Hashing.mp4
13:06
25 - 5.6 Examining Digital Signatures.mp4
04:27
26 - 5.7 Deconstructing the Digital Certificate Lifecycle.mp4
06:27
27 - 5.8 Understanding Cryptographic Protocols.mp4
09:09
28 - 5.9 Assessing Cryptographic Attacks.mp4
08:47
29 - 5.10 Understanding Database Security.mp4
09:06
30 - 5.11 Exam Practice Questions.mp4
19:48
31 - Learning objectives.mp4
00:47
32 - 6.1 Analyzing OSI & TCP IP Model Relevance.mp4
06:10
33 - 6.2 Understanding Decision Engines.mp4
04:25
34 - 6.3 Surveying Non-IP Network Protocols.mp4
04:39
35 - 6.4 Exploring VoIP.mp4
05:12
36 - 6.5 Securing 802.1x Wireless Networks.mp4
08:30
37 - 6.6 Assessing Network Attacks.mp4
07:04
38 - 6.7 Exam Practice Questions.mp4
13:03
39 - Learning objectives.mp4
00:42
40 - 7.1 Understanding Mutual Authentication.mp4
10:52
41 - 7.2 Investigating Federated Identity.mp4
10:14
42 - 7.3 Surveying Access Control Models.mp4
05:05
43 - 7.4 Exam Practice Questions.mp4
09:22
44 - Learning objectives.mp4
00:42
45 - 8.1 Defining the Penetration Testing Rules of Engagement.mp4
08:05
46 - 8.2 Interpreting SSAE16 SOC Reports.mp4
07:37
47 - 8.3 Understanding Information Security Continuous Monitoring (ISCM).mp4
04:54
48 - 8.4 Exam Practice Questions.mp4
09:22
49 - Learning objectives.mp4
00:48
50 - 9.1 Evaluating Vulnerability, Change, and Configuration Management.mp4
06:39
51 - 9.2 Assessing Resiliency and Fault Tolerance.mp4
10:07
52 - 9.3 Deciphering Digital Forensics and Evidence Handling.mp4
12:28
53 - 9.4 Protecting People and Places.mp4
06:32
54 - 9.5 Exam Questions.mp4
08:36
55 - Learning objectives.mp4
00:38
56 - 10.1 Evaluating Source Code Flaws.mp4
15:07
57 - 10.2 Understanding the Software Development Processes.mp4
09:04
58 - 10.3 Surveying Software Testing.mp4
05:19
59 - 10.4 Deconstructing the Product Development Lifecycle.mp4
05:55
60 - 10.5 Exam Practice Questions.mp4
07:19
61 - Module Intro.mp4
00:06
62 - Learning objectives.mp4
00:22
63 - 11.1 The Week Leading Up to the Exam.mp4
01:59
64 - 11.2 What to Do on Test Day.mp4
02:08
65 - 11.3 What to Expect at the Testing Center.mp4
04:13
66 - 11.4 Attaining and Maintaining Your CISSP Certification.mp4
01:23
67 - Course Summary.mp4
00:45
More details
User Reviews
Rating
average 0
Focused display

LiveLessons
View courses LiveLessonsPearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
- language english
- Training sessions 67
- duration 6:51:07
- Release Date 2023/11/07