Library

Course: CISSP Master Class: Become a CISSP Today - 2018

CISSP Master Class: Become a CISSP Today - 2018

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
About this Course

In this CISSP Master Class: Become a CISSP Today - 2018. I will help you with all the knowledge you need to pass the CISSP Certification.

Hi, I am Sagar Bansal, world's youngest CISSP Certified trainer. I'm pleased to bring you this course.

It is a simple exam in English, you need to answer the Questions from (ISC)²'s point of view, in their perfect world.

Understand and answer every question from a Manager or a Risk Advisers point of view, NOT from an executive or as a techie. Most hands-on techies that fail the CISSP exams do so because they answer from a point of being reactive, not being proactive.

The CISSP exam is using the Computerized Adaptive Testing (CAT) format, and is 3 hour long and will have 100-150 questions.

Most people studying for the CISSP certification will use multiple books, video courses, and 3-5000 practice questions before taking the exam, this really is the path to success.

Who is the target audience?

  • Anyone wanting lean more about the CISSP certification!
  • Anyone wanting to learn about CISSP domain 1 Security and Risk Management and CISSP domain 2 Asset Security
  • People wanting to grow their IT Security and Cyber Security knowledge
  • New and experienced IT Security professionals
  • Anyone wanting to break into IT Security
Basic knowledge
  • Wanting to pass the Information Systems Security Professional (CISSP) Certification Exam
  • Wanting to learn about management level IT Security and Cyber Security
What you will learn
  • Prepare for the 2018 version of the Information Systems Security Professional (CISSP) Certification Exam
  • Learn why you want to get your CISSP certification, what it can give you
  • Where to start on your CISSP certification journey
  • Learn why you want to get your CISSP certification, what it can give you
  • Clear understanding of CISSP Domain 1 (Security and Risk Management) and domain 2 (Asset Security)
  • Understand IT Security and Cyber Security from a management level perspective
Curriculum
Number of Lectures: 104
Total Duration: 09:42:16
Introduction
  • CISSP Master Class Introduction  
Domain 1
  • AIC TRIAD  
  • IAAA  
  • Security Governance Principles  
  • Types of Evidence  
  • Evidence Handling  
  • Types of Law  
  • Entrapment vs Enticement  
  • CFAA  
  • Forth Amendment of US Constitution  
  • ECPA  
  • Security Breach Notification  
  • Sarbenes Oxlay Act  
  • GBLA  
  • Partiot Act  
  • HIPAA  
  • PCI DSS  
  • Intellectual Property  
  • Professional Ethics  
  • Legal and Regulatory  
  • What is Risk  
  • Risk Management Strategies  
  • Risk Analysis Process  
  • BCP and DRP Essentials  
  • Important BCP Terms  
  • Asset Evaluation  
  • BIA Practical  
  • Security Documents  
Domain 2
  • Sensitive Information and Media Security  
  • Data Classification  
  • Data Responsibility  
  • Memory  
  • Data Destruction  
  • Data Security Controls and Frameworks  
Domain 3
  • Important Lecture of Domain 3  
  • Computer System Architecture  
  • Security Modes of Operation  
  • Rings of Protection  
  • Open and Close Systems  
  • Operating States  
  • Recovery Procedure  
  • Process Isolation  
  • Information Flow Model  
  • State Machine Model  
  • Non Interference Model  
  • Bell-LuPadula Model  
  • BIBA Model  
  • Clark Wilson Model  
  • Take Grant Protection Model  
  • Brewer Nash Model  
  • Graham Denning Model  
  • HRU Model  
  • Lattice Model  
  • TCSEC  
  • TNI  
  • ITSEC  
  • Common Criteria  
  • New Technologies  
  • Virtualization  
  • Fault Tolerance  
  • Cryptography  
  • Symmetric Cryptography  
  • Asymmetric Cryptography  
  • Hash  
  • What else to study in Cryptography?  
  • Fire  
  • Humidity and Tempest  
Domain 4
  • Importance of Domain 4  
  • Networking  
  • Network Topologies  
  • Switch Vs Hub  
  • Router Vs Modem  
  • Wireless  
  • Firewall  
  • RAID  
  • Backups  
  • Denial of Service  
  • Attack Malware and Bad Stuff  
  • OSI Model  
  • TCP-IP Model  
Domain 5
  • Important Lecture of Domain 5  
  • Security Model Access Controls  
  • Security Architecture Threats (From Domain 3 but also a part of Domain 5)  
  • Categories of Access Controls  
  • Access Control Threats  
  • Single Sign-On  
  • SSO Mehods  
  • Central Authentication  
  • Multifactor Authentication  
  • IDS  
  • Biometric Errors  
  • Cloud Models  
  • Data Life Cycle Security  
  • Storage Architecture  
  • Cloud Security  
Domain 6
  • Security Audits  
  • Security Logs  
  • Vulnerability Assessment  
  • Penetration Testing  
  • Classification of Hackers  
  • Types of Penetration Testing  
  • Social Engineering Elements  
  • Penetration Testing Terms  
  • Penetration Testing Demo  
Reviews (0)