CISSP® Exam Preparation Training Course – Mohamed Atef
Original price was: $120.00.$21.00Current price is: $21.00.
CISSP® Exam Preparation Training Course – Mohamed Atef Download. Each domain of knowledge is dissected into its critical components, and those components a…
Salepage link: At HERE. Archive: http://archive.is/wip/3Ij5s
CISSP® Exam Preparation Training Course
Get CISSP Certified Guarantee
CISSP® preparation training course focuses solely on the 8 domains of knowledge as determined by (ISC)2. Each domain of knowledge is dissected into its critical components, and those components are then discussed in terms of their relationship with one another and with other areas of information security.
CISSP® preparation training course will guide you step by step on how to implement Information Security Management System in any organization from scratch using a set of templates that are used in real life implementation and will qualify you to pass the CISSP exam from the first attempt and get certified.
Course Curriculum
Introduction
- 1. Introduction (1:51)w
- 2. What is CISSP Certificate (5:47)
- 3. Course Outline (5:18)
- 4. Latest CISSP Curriculum (4:33)
- 5. Course Materials and Resources (5:19)
- 6. Course flow and follow up (7:22)
- 7. Important communication channel (2:49)
- Course Materials and Resources (Attached)
Security and Risk Management
- 8. Introduction to Security and Risk Management (4:11)
- 9. Important Definitions (12:28)
- 10. Important Definitions 2 (4:42)
- 11. Governance Requirements (5:22)
- 12. Due Care and Due Diligence (8:42)
- 13. Question (3:09)
- 14. Compliance (8:50)t
- 15. Important Document (6:47)
- 16. Ethics (9:12)
- 17. Question (3:00)
- 18. Security Document 2 (15:35)
- 19.Security Document Types (5:18)
- 20. Policy Sample (3:14)
- 21. The Relationship Between Security Document Types (3:09)
- 22. Risk Management (7:51)
- 23. Risk Management Part 2 (11:09)
- 24. Asset Evaluation (18:33)
- 25. Exam Question (4:03)
- 26. Rsa Archer (4:41)
- 27. ARIS GRC (1:41)
- 28. Business Continuity Plans (1:16)
- 29. Business Continuity Plans – BCP (14:21)
- 30. Business Impact Analysis- BIA (10:15)
- 31. MTD – RTO- RPO (11:44)
- 32. Disaster Recovery Plan -DRP (3:34)
- 33. Alternatives Sites (8:10)
- 34. Exam Quiz (8:12)
- 35. The Need of Personnel Security (8:39)
- 36. Employment Policies (2:20)
- 37. Employment Policies -Part 2 (10:29)
- 38. Termination (1:40)
- 39. Security Awareness (7:02)
- Domain Evaluation (5:34)
Asset Security
- 40. Introduction to Asset Security (5:35)
- 41. Asset Management (10:38)
- 42. Information Asset List (12:40)
- 43. Classification (8:10)
- 44. Labeling (4:44)
- 45. DLP (2:55)
- 46. DLP – Data Classification (3:37)
- 47. Klassify – Data Labeling 2 (2:50)
- 48. Privacy (13:02)
- 49. Retention (12:12)
- 50. Data Security Control (8:01)
- Domain Evaluation (5:34)
Security Architecture and Engineering
- 51. Introduction to Security Architecture and Engineering (3:52)
- 52. Security Engineering Lifecycle (4:14)
- 53. NISP SP 14-27 (11:36)
- 54. Trusted Computing Base _ TCB (9:22)
- 54.1 TCB Vulnerability (9:48)
- 55. Security Models (17:08)
- 56. TCSEC (5:51)
- 57. ITSEC (6:14)
- 58. Security Architecture Questions (3:18)
- 59. Enterprise Security Architecture (5:06)
- 60. Virtualization (9:51)
- 61. Fault Tolerance (6:32)
- 62. Server Fault Tolerance Techniques (2:06)
- 63. New Technology (6:28)
- 64. Spoofing Number (5:52)
- 65. Spoofing Email (7:04)
- 66. Cryptography (16:31)
- 67. Alternative Ciphers (7:56)
- 68. Symmetric Encryption (12:43)
- 69. Asymmetric Encryption (13:52)
- 70. Hash (6:10)
- 72. Physical Access barriers (9:49)
- 71. Physical Security (7:44)
- 73. Power Issue (3:15)
- 74. Fire (5:33)
- Domain Evaluation (5:34)
Communications and Network Security
- 75. The OSI Model (17:27)
- 76. TCP-IP Model (2:50)
- 77. Network Architecture Components (17:09)
- 78. Firewall (10:43)
- 79. Network Types and Topolgies (8:42)
- 80. Remote Access Technology (18:34)
- 81. Wireless Network (7:20)
- 82. Network Attacks (9:03)
- 83. Remote Access Security Mechanisms (2:17)
- 84. RAID (7:00)
- 85. Backup (6:00)
- 86. Network Questions (1:21)
- Domain Evaluation (5:34)
Identity and Access Management
- 87. Access Control (6:50)
- 88. Authorization (19:23)
- 89. Authentication (18:50)
- 90. Single Sign on SSO (13:10)
- 91. Central Administration (RADUIS) (4:16)
- 92. Access Control Attack (17:15)
- 93. Instrusion Detection System (IDS) (6:58)
- 94. Access Control Inportant exam area (4:15)
- 95. Access Control Questions (8:02)
- Domain Evaluation (5:34)
Cloud Security
- 96. Introduction to Cloud Security (2:50)
- 97. NIST 800-145 (1:55)
- 98. IaaS vs PaaS vs SaaS (2:25)
- 99. SaaS (4:25)
- 100. PaaS (2:04)
- 101. IaaS (1:59)
- 102. Storage Architecture (1:25)
- 103. Data Life Cycle Security (4:27)
- 104. Hypervisor (4:49)
- 105. Virtualization Security (5:26)
- 106. Perimeter Security (6:05)
Security Assessment and Testing
- 107. Introduction Security Assessment and Testing (11:20)
- 108. Test Output (4:33)
- 109. Vulnerability asessment – Part 1 (2:16)
- 110. Vulnerability asessment -Part 2 (3:16)
- 112. Nessus VA (13:25)
- 113. Nessus VA- Part 2 (14:05)
- 114. Nessus VA Report (5:20)
- 115. OWASP ZAP – VA (5:06)
- 116. Nexpose VA (5:05)
- 117. Penetration testing (8:33)
- 118. Reconnaissance Demo -Maltego (7:59)
- 119. Scanning Demo -Zenmap (5:06)
- 120. Exploitation Demo -MetaSploit (14:33)
- 121. Event Log Review (7:19)
- 122. NIST 800-92 (2:56)
- 124. SIEM Solution Demo – Qradar (3:09)
- 123. SIEM Solution (6:16)
- 125. Code Review (5:20)
- 126. Security KPI’s (6:57)
Security Operations
- 127. Introduction to Security Operation (1:40)
- 128. Security Operation 2 (9:53)
- Guidelines for Applying Security Operations Concepts
- Domain Evaluation (5:34)
Software Development Security
- 129. The System Life Cycle (6:45)
- 130. Software development Methods (6:42)
- 132. Change Control Process (3:07)
- 133. Security Consideration (1:54)
- 134. Software Control (2:50)
- 135. Introduction to SQL Injection 2 (11:26)
- 136. What is SQL Injection (11:26)
- Domain Evaluation (5:34)
Here's an overview of the prominent keywords and a list of famous authors:
Business and Sales: Explore business strategies, sales skills, entrepreneurship, and brand-building from authors like Joe Wicks, Jillian Michaels, and Tony Horton.
Sports and Fitness: Enhance athleticism, improve health and fitness with guidance from experts like Shaun T, Kayla Itsines, and Yoga with Adriene.
Personal Development: Develop communication skills, time management, creative thinking, and enhance self-awareness from authors like Gretchen Rubin, Simon Sinek, and Marie Kondo.
Technology and Coding: Learn about artificial intelligence, data analytics, programming, and blockchain technology from thought leaders like Neil deGrasse Tyson, Amy Cuddy, and Malcolm Gladwell.
Lifestyle and Wellness: Discover courses on holistic health, yoga, and healthy living from authors like Elizabeth Gilbert, Bill Nye, and Tracy Anderson.
Art and Creativity: Explore the world of art, creativity, and painting with guidance from renowned artists like Bob Ross and others.
All the courses on WSOlib are led by top authors and experts in their respective fields. Rest assured that the knowledge and skills you acquire are reliable and highly applicable.
Specification: CISSP® Exam Preparation Training Course – Mohamed Atef
|
User Reviews
Only logged in customers who have purchased this product may leave a review.
Original price was: $120.00.$21.00Current price is: $21.00.
There are no reviews yet.