CISSP Study Course Público

CISSP Study Course

Damon Drake
Curso por Damon Drake, actualizado hace más de 1 año Colaboradores

Descripción

CISSP Study Course by Domain

Información de los módulos

Sin etiquetas

Contexto

The following videos (via YouTube) are provided by Skillset.com.  These videos break down the various aspects of Security & Risk Management and will be used to supplement the Official ISC2 Study Guide and StormWind course modules. Security Governance Fundamentals Risk Frameworks Risk Definitions Control Frameworks Security Training, Education, and Awareness Threat Modeling Risk Assignment Vendor, Consultant, and Contractor Security Professional Ethics Legal Issues Import-Export Regulations Due Diligence and Due Care Personnel Security Protecting Privacy Intellectual Property Regulatory Compliance Computer Crime Investigations Computer Crime SLAs - Service Level Agreements Personnel Safety and Privacy Risk Assessment
Mostrar menos
Sin etiquetas

Contexto

The following videos (via YouTube) are provided by Skillset.com.  These videos break down the various aspects of Asset Security and will be used to supplement the Official ISC2 Study Guide and StormWind course modules. Data Classification Data Ownership & Custodian Data Security Controls Data at Rest Information Security Policy Managing Sensitive Data Protecting Data in Transit Data Remanence Security Documents
Mostrar menos
Sin etiquetas

Contexto

The following videos (via YouTube) are provided by Skillset.com.  These videos break down the various aspects of Security Engineering and will be used to supplement the Official ISC2 Study Guide and StormWind course modules. Security Models Pt 3 Clark-Wilson, Brewer and Nash, Graham-Denning Security Models Pt. 2 - State Machine, Lattice-based information flow Security Models Pt 1 Bell-La Padula and Biba Hybrid Cryptography Asymmetric Public Key Cryptography Symmetric Key Cryptography PKI Certificate and Registration Authorities PKI - Digital Certificates Physical Security Virtualization Cryptography Definition and Terminology Hashing Ciphers Digital Signatures PKI Key Management Process Cryptanalytic Attacks Key Exchange Certification and Accreditation Evaluation Models TCB - Trusted Computing Base System Security Evaluation Models on Common Criteria Media Storage and Wiring Closets Computer Components Security Modes of Operation Data Mining Knowledge Based Systems Database Attacks Database Terminology Database Architecture Transaction Management Virtualized Networks Distributed Systems and Cloud Computing Secure Design Principles Rainbow Series Fire Safety Utilities and HVAC Datacenter Security Physical Intrusion Detection Internal Facilities Security Doors and Locks Perimeter Defenses Facility Construction Facility Design Embedded Systems Covert Channels Web-based Vulnerabilities Common Architecture Flaws Protection Mechanisms
Mostrar menos
Sin etiquetas

Contexto

The following videos (via YouTube) are provided by Skillset.com.  These videos break down the various aspects of Communications and Network Security and will be used to supplement the Official ISC2 Study Guide and StormWind course modules. Firewalls and Perimeter Security Network Communications - Network Access Control Wireless Networks Secure Communication Protocols WAN Connection Technologies Converged Protocols and Multimedia Collaboration Common Network Attacks and Countermeasures DMZ Remote Access Security Switching Technologies IDS - Intrusion Detection Systems Endpoint Security Mobile Systems Threats and Vulnerabilities WLAN Authentication Honeypots VPN and VLAN Remote Access Mobile Code IP Networking ARP Multi-layer Protocols DNS and DHCP Network Devices TCP/IP Model OSI Layers OSI Protocols Signaling Types Network Cabling and Topology
Mostrar menos
Sin etiquetas

Contexto

The following videos (via YouTube) are provided by Skillset.com.  These videos break down the various aspects of Identity and Access Management and will be used to supplement the Official ISC2 Study Guide and StormWind course modules. Categorization of Access Controls  CIA Triad  Access Control Definitions  Authentication Type 2  Biometrics - Type 3 Authentication  Authentication Factors  Access Control Testing  Social Engineering  Single Sign On Technology  Access Control Models  Circumventing Access Controls  Authorization  Remote Authentication Protocols  Identity and Access Provisioning Lifecycle  Access Control Administration  Remote Authentication Services  Authentication Factors - Something a User Knows  Account Management  Access Control Techniques  Integrating Identity Services Identification Types of Access Control Attacks Federated Identity Session Management and Accountability Threats and Threat Agents
Mostrar menos
Sin etiquetas

Contexto

The following videos (via YouTube) are provided by Skillset.com.  These videos break down the various aspects of Security Assessment and Testing and will be used to supplement the Official ISC2 Study Guide and StormWind course modules. Security Assessment Goals Security Management Processes Penetration Testing
Mostrar menos
Sin etiquetas

Elemento multimedia

Contexto

The following videos (via YouTube) are provided by Skillset.com.  These videos break down the various aspects of Security Operations and will be used to supplement the Official ISC2 Study Guide and StormWind course modules. RAID - System Resilience and Fault Tolerance Data Backups Network Redundancy Business Continuity Planning Configuration Management Patch Management Disaster Recovery Strategy Incident Response Plan Preventative Measures Operations Concepts Egress Monitoring Log Management Trusted Recovery DRP - Disaster Recovery Plan Testing Computer Forensic Investigation Process Evidence Analysis and Handling BIA - Business Impact Analysis Disaster Recovery Process
Mostrar menos
Sin etiquetas

Contexto

The following videos (via YouTube) are provided by Skillset.com.  These videos break down the various aspects of Software Development Security and will be used to supplement the Official ISC2 Study Guide and StormWind course modules. Secure Software Design Change Control Secure SDLC Maturity Models Software Development Models Malware Application Attacks Acquired Software Distributed Computing OOP - Object Oriented Programming Software Environment Software Testing
Mostrar menos
Mostrar resumen completo Ocultar resumen completo