Companies Home Search Profile

CISSP Training Course - Domains 7 and 8 ' 2023

Focused View

Experts Learn | Cyvitrix

8:14:54

43 View
  • 1. CISSP Course Introduction.mp4
    13:23
  • 1. CISSP-EN-7-0-Introduction to Domain 7.mp4
    00:55
  • 2. CISSP-EN-7-1-Change Management Process.mp4
    06:52
  • 3. CISSP-EN-7-2-Types of Changes.mp4
    06:15
  • 4. CISSP-EN-7-3-Configuration Management.mp4
    05:39
  • 5. CISSP-EN-7-4-Patch Management and Vulnerability Management.mp4
    03:10
  • 6. CISSP-EN-7-5-Release Management and types of Software Releases.mp4
    10:07
  • 7. CISSP-EN-7-6-Financial, Portfolio, Capacity and Supplier Management.mp4
    08:57
  • 8. CISSP-EN-7-7-Capex and Opex and ROI and ROSI.mp4
    09:30
  • 9. CISSP-EN-7-8-IT Performance Management and IT Balanced Score Card.mp4
    07:54
  • 10. CISSP-EN-7-9-Endpoint security best practices.mp4
    14:56
  • 11. CISSP-EN-7-10-End-user Security Software Overview.mp4
    14:00
  • 1. CISSP-EN-7-11-Incident Management Process.mp4
    15:27
  • 2. CISSP-EN-7-12-Forensic Investigation and dealing with Digital Evidences.mp4
    09:52
  • 3. CISSP-EN-7-13-Incident Response Training.mp4
    03:24
  • 4. CISSP-EN-7-14-Incident Response Testing.mp4
    05:12
  • 5. CISSP-EN-7-15-Security Operation Center Overview.mp4
    05:30
  • 6. CISSP-EN-7-16-SOC Tools - SIEM Solution.mp4
    08:30
  • 7. CISSP-EN-7-17-SOC Tools - FIM Solution.mp4
    05:13
  • 8. CISSP-EN-7-18-SOC Tools - EDR and NDR Overview.mp4
    06:55
  • 9. CISSP-EN-7-19-SOC Tools - XDR and SOAR Overview.mp4
    06:43
  • 10. CISSP-EN-7-20-SOC Tools - Threat Intel and IOCs and TTPs.mp4
    04:26
  • 1. CISSP-EN-7-21-Understand Business Impact Assessment.mp4
    05:22
  • 2. CISSP-EN-7-22-Disaster Recovery Plan and its components.mp4
    05:03
  • 3. CISSP-EN-7-23-Business Continuity Plan.mp4
    05:36
  • 4. CISSP-EN-7-24-Considerations for BCP & DRP development and execution.mp4
    03:21
  • 5. CISSP-EN-7-25-Recovery Point Objective and Recovery Time Objective.mp4
    02:53
  • 6. CISSP-EN-7-26-Acceptable Interruption Window, Service Delivery Objective and MTO.mp4
    03:17
  • 7. CISSP-EN-7-27-Linking RPO, RTO, AIW, SDO, MTO.mp4
    05:28
  • 8. CISSP-EN-7-28-Recovery Sites.mp4
    07:11
  • 9. CISSP-EN-7-29-Reciprocal Agreement.mp4
    01:56
  • 10. CISSP-EN-7-30-Testing and evaluating BCP and DRP.mp4
    06:19
  • 11. CISSP-EN-7-31-Data Backup Overview.mp4
    07:55
  • 12. CISSP-EN-7-32-Data Backup types and Backup Strategy.mp4
    13:41
  • 13. CISSP-EN-7-33-Storage Redundancy using Redundant Array of Independent Disks.mp4
    11:03
  • 1. CISSP-EN-8-0-Introduction to Domain 8.mp4
    01:06
  • 2. CISSP-EN-8-1-Software development overview.mp4
    08:57
  • 3. CISSP-EN-8-2-Software development methodologies overview.mp4
    16:31
  • 4. CISSP-EN-8-3-Software Testing.mp4
    07:59
  • 5. CISSP-EN-8-4-Software Testing UAT.mp4
    03:25
  • 6. CISSP-EN-8-5-Certification vs Accreditation.mp4
    03:37
  • 7. CISSP-EN-8-6-Version Control System - VCS.mp4
    03:27
  • 8. CISSP-EN-8-7-DevOps.mp4
    07:06
  • 9. CISSP-EN-8-8-DevSecOps.mp4
    08:04
  • 10. CISSP-EN-8-9-Application Attacks.mp4
    18:32
  • 11. CISSP-EN-8-10-Secure Code Practices.mp4
    08:21
  • 1. CISSP-EN-8-10-Project vs Program, PMO vs PM.mp4
    12:32
  • 2. CISSP-EN-8-11-The Process of Acquiring New technology.mp4
    17:55
  • 3. CISSP-EN-8-12-Feasibility Analysis and Business case.mp4
    04:30
  • 4. CISSP-EN-8-13-Request for Budget and Request for Proposal.mp4
    04:50
  • 5. CISSP-EN-8-14-Project Scheduling and Monitoring Tools.mp4
    12:45
  • 6. CISSP-EN-8-15-Project Closure Activities.mp4
    02:37
  • 1. CISSP-EN-8-16-introduction to Databases.mp4
    11:29
  • 2. CISSP-EN-8-17-Database Keys and Referential Integrity.mp4
    03:09
  • 3. CISSP-EN-8-18-Database Management System and Normalization overview.mp4
    03:24
  • 4. CISSP-EN-8-19-Clark Wilson Security Model Key principals and relation with DBMS.mp4
    06:59
  • 5. CISSP-EN-8-20-Database Security Key Concepts.mp4
    12:12
  • 6. CISSP-EN-8-21-Database Resiliency.mp4
    08:25
  • 1. CISSP-EN-8-22-Architectual Concepts, SOA, VDI, SDP.mp4
    08:08
  • 2. CISSP-EN-8-23-Virtualization and SDDC.mp4
    04:49
  • 3. CISSP-EN-8-24-SDN - Software Defined Networking.mp4
    12:30
  • 4. CISSP-EN-8-25-Containers and Functions.mp4
    09:00
  • 5. CISSP-EN-8-26-Content Delivery Networks - CDN.mp4
    06:34
  • 6. CISSP-EN-8-27-Cloud Computing Concept.mp4
    14:06
  • Description


    Security Operations & Software Development Security - ISC2 CISSP Training ' 2023

    What You'll Learn?


    • Understand the topics related to the CISSP Common Body of Knowledge (CBK) and their relationship to information security - domains 7 & 8
    • Gain a comprehensive understanding of information security principles, concepts, and practices, including access control, cryptography, network security.
    • Learn how to apply security and risk management principles to protect an organization's assets and resources.
    • Understand the different types of threats and vulnerabilities that can impact an organization's information security.
    • Learn how to design and implement secure network architectures and communication channels.
    • Understand the principles of identity and access management and how to implement them in an organization.
    • Learn how to assess and test security controls and processes to ensure their effectiveness.
    • Understand the principles of security operations, including incident management and disaster recovery planning.
    • Learn how to design and implement secure software development processes and controls.
    • Prepare for the CISSP certification exam and become a certified information security professional.

    Who is this for?


  • Security analysts, GRC Analysts and Managers
  • Students who need to gain an understanding in Infosec and cybersecurity.
  • People who are interested in pursuing this certification.
  • IT Managers, and Analysts who want to understand and advance their career.
  • Auditors Risk practitioners and compliance specialists
  • Anyone interested in the subject of the training.
  • What You Need to Know?


  • No requirements, everything will be explained from scratch, however basic understanding for IT and Security will be beneficial to keep the pace!
  • More details


    Description

    About CISSP


    CISSP stands for Certified Information Systems Security Professional. It is a globally recognized certification in information security that demonstrates expertise in protecting organizational information assets. The certification covers various domains such as security and risk management, asset security, security engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security. It is awarded by the International Information System Security Certification Consortium (ISC)².


    Covered Topics

    Course Curriculum:


    1. Security Operations

    • Understand and Support Investigations

    • Incident Management

    • Disaster Recovery Planning

    1. Software Development Security

    • Development Environment Security Controls

    • Software Security Effectiveness

    • Acquired Software Security Impact


    Course requirements


    To enroll in this course, you should have a basic understanding of information security concepts and practices. There are no other prerequisites for this course. To enroll, simply visit the course landing page on Udemy and click on the "Enroll Now" button.


    The CISSP course on Udemy is an excellent choice for anyone who wants to learn about information security principles, concepts, and practices. With comprehensive coverage of the eight domains of information security, interactive quizzes and assessments, and preparation for the CISSP certification exam, this course will help you become a skilled information security professional. Enroll now and start your journey towards a successful career in information security!


    Secure Your Future with Cyvitrix


    In today's digital age, cybersecurity and information security are no longer optional. With an increasing amount of sensitive information being stored and shared online, the need for top-notch security has never been greater. Welcome to Cyvitrix, your ultimate resource for comprehensive and cutting-edge cybersecurity courses.


    At Cyvitrix, we understand that knowledge is power — power to protect, power to prevent, and power to prosper. Our wide range of courses caters to everyone, from beginners who want to understand the basics to professionals seeking advanced skills to stay ahead of the curve.


    Why Choose Cyvitrix?


    1. Industry-Relevant Curriculum: We constantly update our courses to reflect the latest threats and trends in cybersecurity. You'll learn how to deal with real-world scenarios, preparing you for the challenges you'll face in the field.

    2. Expert Instructors: Our courses are taught by industry veterans with years of experience in cybersecurity and information security. They're not just teachers, they're practitioners who have been in the trenches.

    3. Flexible Learning: We believe in making learning accessible. Whether you prefer to study at your own pace online or enjoy the intensity of live online classes, we've got you covered.

    4. Certification: Upon completion of our courses, you'll receive a Cyvitrix certification, a testament to your newfound skills and a valuable addition to your professional profile.

    5. Community: Join a network of like-minded learners and experts. Share insights, ask questions, and build connections in our vibrant community.

    Whether you're looking to advance your career, start a new one, or simply enhance your understanding of cybersecurity, Cyvitrix is your trusted partner on this journey. With our courses, you're not just investing in education; you're investing in your future.

    Take the first step towards empowering your digital life. Enroll in a Cyvitrix course today.


    At Cyvitrix, we provide Training courses that help you as students to conquer and pass your certification exams from first attempt.

    Our courses are designed to provide you all what you need in order not only to pass the exam, but also to apply this knowledge to elevate and support your career objectives

    Why training with us is ideal for you?

    - Excellent quality video content

    - High courses quality

    - Organized materials

    - Real life scenarios and examples

    - Practice questions and questions ideas

    - Up to date content

    - Instructor is available to answer all questions you might get

    - Reasonable pricing


    Who this course is for:

    • Security analysts, GRC Analysts and Managers
    • Students who need to gain an understanding in Infosec and cybersecurity.
    • People who are interested in pursuing this certification.
    • IT Managers, and Analysts who want to understand and advance their career.
    • Auditors Risk practitioners and compliance specialists
    • Anyone interested in the subject of the training.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Experts Learn | Cyvitrix
    Experts Learn | Cyvitrix
    Instructor's Courses
    At Cyvitrix, we provide Training courses that help you as students to conquer and pass your certification exams from first attempt.Our courses are designed to provide you all what you need in order not only to pass the exam, but also to apply this knowledge to elevate and support your career objectivesWhy training with us is ideal for you?- Excellent quality video content- High courses quality- Organized materials- Real life scenarios and examples- Practice questions and questions ideas- Up to date content- Instructor is available to answer all questions you might get- Reasonable pricingHere are 10 reasons why you should train with me as your cyber-security trainer:Expertise: With years of experience working in the cyber-security field, I bring a wealth of knowledge and expertise to my courses. I stay up-to-date with the latest trends and best practices in the industry, and I am dedicated to sharing this knowledge with my students.Comprehensive Training: My courses cover a wide range of cyber-security topics, including network security, cloud security, data protection, threat detection, and incident response. This ensures that learners have a well-rounded understanding of the cyber-security landscape.Practical Insights: My courses are designed to be practical and actionable, with a focus on real-world scenarios and challenges. I provide hands-on exercises and case studies that help learners apply their knowledge and skills in a practical setting.Accessibility: My courses are accessible to learners of all skill levels and backgrounds. I use clear and concise language, and I provide explanations and examples that are easy to understand.Engaging Instruction: I use a variety of teaching methods, including lectures, interactive exercises, and quizzes, to keep learners engaged and motivated. My courses are designed to be dynamic and interesting, with a focus on active learning.Flexibility: My courses are self-paced, which means learners can complete them at their own pace and on their own schedule. This makes it easy for busy professionals to fit training into their busy schedules.Support: I am always available to answer questions and provide support to my students. I am dedicated to helping learners succeed, and I offer personalized support to ensure that students get the most out of their training.Collaboration: I encourage collaboration and communication among learners, which helps to foster a sense of community and support. I provide opportunities for learners to connect with each other and share their experiences and insights.Soft Skills Training: In addition to technical skills, I emphasize the importance of soft skills such as critical thinking, problem-solving, and communication. These skills are essential for success in the security field, and I provide training and guidance on how to develop them.Affordability: My courses are affordable and offer exceptional value for the price. I believe that everyone should have access to quality cyber-security training, and I strive to make my courses accessible to as many learners as possible.As a cyber-security trainer on Udemy, I am committed to helping learners develop the knowledge and skills they need to succeed in the cyber-security field. I am dedicated to providing high-quality training that is relevant, engaging, and practical, and I am always available to answer questions and provide support to my students.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 64
    • duration 8:14:54
    • Release Date 2023/10/12

    Courses related to CISSP - Certified Information Systems Security Professional