Companies Home Search Profile

ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

Focused View

Mike Chapple

21:27:00

679 View
  • 01 - Earning your CISSP.mp4
    01:04
  • 02 - What you should know.mp4
    00:43
  • 03 - Study resources.mp4
    01:48
  • 01 - The CISSP exam.mp4
    01:13
  • 02 - Is the CISSP right for you.mp4
    04:45
  • 03 - Careers in information security.mp4
    03:33
  • 04 - Value of certification.mp4
    02:50
  • 01 - Registering for the exam.mp4
    03:07
  • 02 - Exam environment.mp4
    03:13
  • 03 - Question types.mp4
    05:12
  • 04 - Computerized adaptive testing.mp4
    01:28
  • 05 - Passing the exam.mp4
    02:28
  • 01 - Exam tips.mp4
    01:05
  • 02 - Practice tests.mp4
    01:22
  • 01 - Meeting the experience requirement.mp4
    05:16
  • 02 - Continuing education requirements.mp4
    04:06
  • 01 - Overview of the Security and Risk Management domain.mp4
    00:44
  • 01 - The five pillars of information security.mp4
    03:39
  • 02 - Confidentiality.mp4
    01:32
  • 03 - Integrity.mp4
    02:58
  • 04 - Availability.mp4
    01:39
  • 05 - Authenticity and nonrepudiation.mp4
    03:37
  • 01 - Aligning security with the business.mp4
    03:24
  • 02 - Organizational processes.mp4
    03:13
  • 03 - Security roles and responsibilities.mp4
    02:30
  • 04 - Control and risk frameworks.mp4
    08:54
  • 01 - Legal and compliance risks.mp4
    02:19
  • 02 - Data privacy.mp4
    04:00
  • 03 - General Data Protection Regulation (GDPR).mp4
    07:12
  • 04 - California privacy law.mp4
    05:56
  • 05 - National data privacy laws.mp4
    02:48
  • 06 - Computer crimes.mp4
    01:49
  • 07 - Software licensing.mp4
    02:54
  • 08 - Intellectual property.mp4
    04:22
  • 09 - Import and export controls.mp4
    01:42
  • 10 - Data breaches.mp4
    02:16
  • 11 - Ethics.mp4
    01:32
  • 01 - Security policy framework.mp4
    04:13
  • 02 - Security policies.mp4
    04:13
  • 01 - Business continuity planning.mp4
    03:44
  • 02 - Business continuity controls.mp4
    03:32
  • 03 - High availability and fault tolerance.mp4
    05:27
  • 01 - Personnel security.mp4
    02:51
  • 02 - Security in the hiring process.mp4
    03:30
  • 03 - Employee termination process.mp4
    02:38
  • 04 - Employee privacy.mp4
    01:57
  • 05 - Social networking.mp4
    02:56
  • 01 - Risk analysis, assessment, and scope.mp4
    06:36
  • 02 - Quantitative risk assessment.mp4
    06:10
  • 03 - Risk treatment.mp4
    06:00
  • 04 - Security control selection and implementation.mp4
    05:17
  • 05 - Continuous monitoring, measurement, and tuning.mp4
    04:52
  • 06 - Risk management frameworks.mp4
    03:04
  • 07 - Risk visibility and reporting.mp4
    05:04
  • 01 - Threat intelligence.mp4
    03:21
  • 02 - Managing threat indicators.mp4
    03:37
  • 03 - Intelligence sharing.mp4
    02:06
  • 04 - Threat research.mp4
    02:20
  • 05 - Identifying threats.mp4
    02:24
  • 06 - Automating threat intelligence.mp4
    03:48
  • 07 - Threat hunting.mp4
    03:50
  • 01 - Managing vendor relationships.mp4
    04:17
  • 02 - Vendor agreements.mp4
    03:49
  • 03 - Vendor information management.mp4
    01:41
  • 04 - Cloud audits.mp4
    03:26
  • 01 - Security awareness training.mp4
    05:49
  • 02 - Compliance training.mp4
    03:07
  • 03 - User habits.mp4
    03:07
  • 04 - Measuring compliance and security posture.mp4
    01:47
  • 01 - Overview of the Asset Security domain.mp4
    00:35
  • 01 - Understanding data security.mp4
    03:07
  • 02 - Data security policies.mp4
    05:02
  • 03 - Data security roles.mp4
    04:50
  • 04 - Limiting data collection.mp4
    02:50
  • 05 - The data lifecycle.mp4
    05:13
  • 01 - Developing security baselines.mp4
    04:00
  • 02 - Leveraging industry standards.mp4
    03:07
  • 03 - Customizing security standards.mp4
    02:14
  • 04 - Cloud storage security.mp4
    04:30
  • 05 - Information classification.mp4
    02:54
  • 06 - Digital rights management.mp4
    02:46
  • 07 - Data loss prevention.mp4
    05:17
  • 01 - Change management.mp4
    02:21
  • 02 - Configuration and asset management.mp4
    02:31
  • 03 - Physical asset management.mp4
    03:09
  • 04 - Supply chain risks and mitigations.mp4
    06:47
  • 01 - Overview of the Security Architecture and Engineering domain.mp4
    00:40
  • 01 - Secure design principles.mp4
    04:56
  • 02 - Security models.mp4
    03:57
  • 03 - Security evaluation models.mp4
    03:07
  • 04 - Segregation of duties.mp4
    03:18
  • 05 - Privacy by design.mp4
    03:02
  • 06 - Secure defaults.mp4
    03:18
  • 07 - Information system lifecycle.mp4
    03:10
  • 01 - What is the cloud.mp4
    03:53
  • 02 - Cloud computing roles.mp4
    02:35
  • 03 - Drivers for cloud computing.mp4
    03:17
  • 04 - Security service providers.mp4
    02:38
  • 05 - Multitenant computing.mp4
    02:15
  • 06 - Virtualization.mp4
    04:48
  • 07 - Desktop and application virtualization.mp4
    02:38
  • 08 - Cloud compute resources.mp4
    07:52
  • 09 - Containerization.mp4
    01:58
  • 10 - Cloud activities and the cloud reference architecture.mp4
    02:48
  • 11 - Cloud deployment models.mp4
    02:45
  • 12 - Cloud service categories.mp4
    04:47
  • 13 - Edge and fog computing.mp4
    01:46
  • 01 - Memory protection.mp4
    03:08
  • 02 - Hardware encryption.mp4
    05:23
  • 03 - Hardware and firmware security.mp4
    04:38
  • 01 - Server and database security.mp4
    03:51
  • 02 - NoSQL databases.mp4
    06:36
  • 03 - Distributed and high-performance computing.mp4
    04:29
  • 01 - Industrial control systems and operational technology.mp4
    05:09
  • 02 - Internet of things.mp4
    03:06
  • 03 - Securing smart devices.mp4
    03:07
  • 04 - Secure networking for smart devices.mp4
    02:23
  • 05 - Embedded systems.mp4
    04:29
  • 06 - Communications for embedded devices.mp4
    01:27
  • 01 - Understanding encryption.mp4
    02:49
  • 02 - Symmetric and asymmetric cryptography.mp4
    04:18
  • 03 - Goals of cryptography.mp4
    03:47
  • 04 - Codes and ciphers.mp4
    03:05
  • 05 - Cryptographic math.mp4
    02:38
  • 06 - Choosing encryption algorithms.mp4
    03:27
  • 07 - The perfect encryption algorithm.mp4
    03:21
  • 08 - The cryptographic lifecycle.mp4
    02:33
  • 01 - Data encryption standard.mp4
    02:49
  • 02 - 3DES.mp4
    02:49
  • 03 - AES, Blowfish, and Twofish.mp4
    05:47
  • 04 - RC4.mp4
    02:00
  • 05 - Cipher modes.mp4
    03:39
  • 06 - Steganography.mp4
    03:57
  • 01 - Rivest-Shamir-Adelman (RSA).mp4
    02:47
  • 02 - PGP and GnuPG.mp4
    10:47
  • 03 - Elliptic curve and quantum cryptography.mp4
    03:08
  • 01 - Key management practices.mp4
    03:04
  • 02 - Key exchange.mp4
    02:42
  • 03 - Diffie-Hellman.mp4
    04:33
  • 04 - Key escrow.mp4
    02:58
  • 05 - Key stretching.mp4
    01:43
  • 06 - Hardware security modules.mp4
    01:36
  • 01 - Trust models.mp4
    02:52
  • 02 - PKI and digital certificates.mp4
    04:05
  • 03 - Hash functions.mp4
    07:38
  • 04 - Digital signatures.mp4
    03:51
  • 05 - Digital signature standard.mp4
    01:39
  • 06 - Create a digital certificate.mp4
    04:55
  • 07 - Revoke a digital certificate.mp4
    01:41
  • 08 - Certificate stapling.mp4
    02:29
  • 09 - Certificate authorities.mp4
    06:13
  • 10 - Certificate subjects.mp4
    03:35
  • 11 - Certificate types.mp4
    02:55
  • 12 - Certificate formats.mp4
    02:30
  • 01 - Brute-force attacks.mp4
    02:57
  • 02 - Knowledge-based attacks.mp4
    02:41
  • 03 - Eavesdropping attacks.mp4
    04:12
  • 04 - Implementation attacks.mp4
    01:40
  • 05 - Limitations of encryption algorithms.mp4
    02:42
  • 06 - Ransomware.mp4
    07:39
  • 01 - Site and facility design.mp4
    03:24
  • 02 - Data center environmental controls.mp4
    03:49
  • 03 - Data center environmental protection.mp4
    05:05
  • 04 - Power control.mp4
    02:32
  • 05 - Physical access control.mp4
    04:56
  • 06 - Visitor management.mp4
    01:30
  • 07 - Physical security personnel.mp4
    02:12
  • 01 - SOAP and REST.mp4
    02:25
  • 02 - SOA and microservices.mp4
    01:39
  • 01 - Introducing the Communication and Network Security domain.mp4
    00:33
  • 01 - Introducing TCPIP.mp4
    05:50
  • 02 - IP addresses and DHCP.mp4
    03:55
  • 03 - Network traffic.mp4
    02:54
  • 04 - Domain name system (DNS).mp4
    04:22
  • 05 - Network ports.mp4
    03:37
  • 06 - ICMP.mp4
    03:16
  • 07 - Multilayer protocols.mp4
    01:58
  • 01 - Public and private addressing.mp4
    05:51
  • 02 - Subnetting.mp4
    03:03
  • 03 - Security zones.mp4
    03:52
  • 04 - Isolating sensitive systems.mp4
    02:59
  • 05 - VLANs and logical segmentation.mp4
    04:37
  • 06 - Security device placement.mp4
    06:17
  • 07 - Software defined networking (SDN).mp4
    04:58
  • 08 - Transmission media.mp4
    02:50
  • 09 - Cloud networking.mp4
    02:30
  • 10 - Zero trust and SASE.mp4
    05:32
  • 01 - Routers, switches, and bridges.mp4
    03:06
  • 02 - Network topologies.mp4
    03:04
  • 03 - Transport architecture.mp4
    02:52
  • 04 - Firewalls.mp4
    06:07
  • 05 - Proxy servers.mp4
    02:41
  • 06 - Load balancers.mp4
    04:09
  • 07 - VPNs and VPN concentrators.mp4
    04:29
  • 08 - Network intrusion detection and prevention.mp4
    05:01
  • 09 - Protocol analyzers.mp4
    08:57
  • 10 - Unified threat management.mp4
    01:57
  • 11 - Content distribution networks.mp4
    04:04
  • 01 - Restricting network access.mp4
    02:08
  • 02 - Network access control.mp4
    05:33
  • 03 - Firewall rule management.mp4
    04:09
  • 04 - Router configuration security.mp4
    04:05
  • 05 - Switch configuration security.mp4
    03:42
  • 06 - Maintaining network availability.mp4
    02:34
  • 07 - Network monitoring.mp4
    02:30
  • 08 - Firewall and network logs.mp4
    04:01
  • 09 - Network performance metrics.mp4
    02:59
  • 10 - SNMP.mp4
    02:54
  • 11 - Isolating sensitive systems.mp4
    01:58
  • 12 - Deception technologies.mp4
    02:51
  • 13 - Network support.mp4
    02:04
  • 01 - Telephony.mp4
    02:13
  • 02 - Multimedia collaboration.mp4
    04:41
  • 03 - Storage networks.mp4
    03:20
  • 01 - TLS and SSL.mp4
    05:05
  • 02 - IPsec.mp4
    02:49
  • 03 - Remote network access.mp4
    04:59
  • 01 - Understanding wireless networking.mp4
    03:25
  • 02 - Wireless encryption.mp4
    02:52
  • 03 - Wireless authentication.mp4
    04:42
  • 04 - Wireless signal propagation.mp4
    02:48
  • 05 - Wireless networking equipment.mp4
    01:43
  • 01 - Mobile connection methods.mp4
    02:36
  • 02 - Mobile device security.mp4
    02:27
  • 03 - Mobile device management.mp4
    06:28
  • 04 - Mobile device tracking.mp4
    03:05
  • 05 - Mobile application security.mp4
    03:54
  • 06 - Mobile security enforcement.mp4
    03:54
  • 07 - Bring your own device (BYOD).mp4
    04:35
  • 08 - Mobile deployment models.mp4
    02:54
  • 01 - Operating system security.mp4
    08:44
  • 02 - Malware prevention.mp4
    07:25
  • 03 - Application management.mp4
    05:23
  • 04 - Host-based network security controls.mp4
    07:44
  • 05 - File integrity monitoring.mp4
    04:09
  • 01 - Introducing the Identity and Access Management (IAM) domain.mp4
    00:36
  • 01 - Authentication, authorization, and accounting (AAA).mp4
    03:31
  • 02 - Usernames and access cards.mp4
    03:23
  • 03 - Biometrics.mp4
    02:42
  • 04 - Registration and identity proofing.mp4
    04:11
  • 01 - Authentication factors.mp4
    03:26
  • 02 - Multifactor authentication.mp4
    02:35
  • 03 - Something you have.mp4
    04:23
  • 04 - Password authentication protocols.mp4
    03:10
  • 05 - Single sign-on and federation.mp4
    03:09
  • 06 - RADIUS.mp4
    02:18
  • 07 - Kerberos and LDAP.mp4
    05:18
  • 08 - SAML.mp4
    02:35
  • 09 - Identity as a service (IDaaS).mp4
    02:50
  • 10 - OAuth and OpenID Connect.mp4
    02:55
  • 11 - Certificate-based authentication.mp4
    05:25
  • 12 - Passwordless authentication.mp4
    03:23
  • 01 - Accountability.mp4
    02:41
  • 02 - Session management.mp4
    01:50
  • 01 - Understand account and privilege management.mp4
    03:09
  • 02 - Account types.mp4
    03:52
  • 03 - Account policies.mp4
    03:31
  • 04 - Password policies.mp4
    04:19
  • 05 - Manage roles.mp4
    03:44
  • 06 - Account monitoring.mp4
    03:48
  • 07 - Provisioning and deprovisioning.mp4
    04:18
  • 01 - Understand authorization.mp4
    03:51
  • 02 - Mandatory access controls.mp4
    02:34
  • 03 - Discretionary access controls.mp4
    02:28
  • 04 - Access control lists.mp4
    04:50
  • 05 - Database access control.mp4
    04:04
  • 06 - Advanced authorization concepts.mp4
    05:36
  • 01 - Social engineering.mp4
    05:29
  • 02 - Impersonation attacks.mp4
    04:39
  • 03 - Identity fraud and pretexting.mp4
    02:56
  • 04 - Watering hole attacks.mp4
    02:33
  • 05 - Physical social engineering.mp4
    02:31
  • 01 - Introducing the Security Assessment and Testing domain.mp4
    00:34
  • 01 - What is vulnerability management.mp4
    05:02
  • 02 - Identify scan targets.mp4
    04:24
  • 03 - Scan configuration.mp4
    05:20
  • 04 - Scan perspective.mp4
    04:24
  • 05 - Analyzing scan reports.mp4
    04:30
  • 06 - Correlating scan results.mp4
    02:20
  • 01 - Penetration testing.mp4
    05:49
  • 02 - Ethical disclosure.mp4
    03:00
  • 03 - Bug bounty.mp4
    03:48
  • 04 - Cybersecurity exercises.mp4
    02:40
  • 01 - Logging security information.mp4
    05:30
  • 02 - Security information and event management.mp4
    04:08
  • 03 - Continuous security monitoring.mp4
    04:13
  • 04 - Endpoint monitoring.mp4
    02:56
  • 01 - Code review.mp4
    02:31
  • 02 - Code tests.mp4
    04:08
  • 03 - Fuzz testing.mp4
    06:48
  • 04 - Interface testing.mp4
    03:42
  • 05 - Misuse case testing.mp4
    02:21
  • 06 - Test coverage analysis.mp4
    02:28
  • 07 - Code repositories.mp4
    06:57
  • 08 - Third-party code.mp4
    03:38
  • 09 - Software risk analysis and mitigation.mp4
    02:52
  • 01 - Disaster recovery.mp4
    04:24
  • 02 - Backups.mp4
    04:38
  • 03 - Restoring backups.mp4
    02:11
  • 04 - Disaster recovery sites.mp4
    04:14
  • 05 - Testing BCDR plans.mp4
    03:58
  • 06 - After action reports.mp4
    02:39
  • 01 - Collect security process data.mp4
    03:19
  • 02 - Management review and approval.mp4
    02:52
  • 03 - Security metrics.mp4
    02:56
  • 04 - Audits and assessments.mp4
    05:56
  • 05 - Control management.mp4
    02:31
  • 01 - Introducing the Security Operations domain.mp4
    00:40
  • 01 - Conducting investigations.mp4
    03:50
  • 02 - Evidence types.mp4
    03:28
  • 03 - Introduction to forensics.mp4
    03:21
  • 04 - System and file forensics.mp4
    04:26
  • 05 - Network forensics.mp4
    04:01
  • 06 - Software forensics.mp4
    04:25
  • 07 - Mobile device forensics.mp4
    01:10
  • 08 - Embedded device forensics.mp4
    02:30
  • 09 - Chain of custody.mp4
    01:50
  • 10 - Reporting and documenting incidents.mp4
    03:58
  • 11 - Electronic discovery (eDiscovery).mp4
    03:03
  • 01 - Need to know and least privilege.mp4
    02:34
  • 02 - Privileged account management.mp4
    02:31
  • 01 - Build an incident response program.mp4
    04:13
  • 02 - Creating an incident response team.mp4
    02:15
  • 03 - Incident communications plan.mp4
    02:42
  • 04 - Incident identification.mp4
    04:26
  • 05 - Escalation and notification.mp4
    02:29
  • 06 - Mitigation.mp4
    02:22
  • 07 - Containment techniques.mp4
    03:00
  • 08 - Incident eradication and recovery.mp4
    05:28
  • 09 - Validation.mp4
    02:24
  • 10 - Post-incident activities.mp4
    03:50
  • 01 - Personnel safety.mp4
    02:25
  • 02 - Emergency management.mp4
    02:00
  • 01 - Introducing the Software Development Security domain.mp4
    00:35
  • 01 - Software platforms.mp4
    02:07
  • 02 - Development methodologies.mp4
    07:16
  • 03 - Scaled agile framework.mp4
    03:11
  • 04 - Maturity models.mp4
    04:11
  • 05 - Automation and DevOps.mp4
    04:42
  • 06 - Programming languages.mp4
    02:34
  • 07 - Acquired software.mp4
    02:57
  • 01 - OWASP top ten.mp4
    04:45
  • 02 - Application security.mp4
    04:03
  • 03 - Preventing SQL injection.mp4
    04:25
  • 04 - Understanding cross-site scripting.mp4
    03:17
  • 05 - Request forgery.mp4
    04:08
  • 06 - Defending against directory traversal.mp4
    03:04
  • 07 - Overflow attacks.mp4
    03:21
  • 08 - Explaining cookies and attachments.mp4
    04:07
  • 09 - Session hijacking.mp4
    04:08
  • 10 - Code execution attacks.mp4
    02:43
  • 11 - Privilege escalation.mp4
    01:56
  • 12 - Driver manipulation.mp4
    02:16
  • 13 - Memory vulnerabilities.mp4
    03:34
  • 14 - Race condition vulnerabilities.mp4
    02:13
  • 01 - Input validation.mp4
    02:37
  • 02 - Parameterized queries.mp4
    03:00
  • 03 - Authenticationsession management issues.mp4
    01:49
  • 04 - Output encoding.mp4
    03:13
  • 05 - Error and exception handling.mp4
    03:00
  • 06 - Code signing.mp4
    02:08
  • 07 - Database security.mp4
    03:53
  • 08 - Data de-identification.mp4
    02:44
  • 09 - Data obfuscation.mp4
    02:12
  • 01 - Preparing for the exam.mp4
    01:16
  • Description


    In this course, instructor and cybersecurity expert Mike Chapple covers the entire set of information you need to know as you prepare for the ISC2 Certified Information Systems Security Professional (CISSP) certification. The CISSP is one of the most in-demand certifications for security professionals. Learn about security and risk management and asset security. Explore security architecture and engineering. Learn about communication and network security, as well as identity and access management (IAM). Go over security assessment, testing, and operations. Plus, gain valuable insights into software development security. This course gets your preparations for the CISSP exam off to a great start.

    This course was created by Mike Chapple. We are pleased to host this training in our library.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Mike Chapple
    Mike Chapple
    Instructor's Courses
    Cybersecurity and analytics educator and leader with over 20 years of experience in government, the private sector and higher education. Author of over 30 books, including best-selling study guides from Wiley covering the CISSP, Security+, CISM, CySA+, CIPP/US, and PenTest+ exams. Creator of over 100 cybersecurity and business analytics video courses on LinkedIn Learning.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 365
    • duration 21:27:00
    • English subtitles has
    • Release Date 2024/06/22