Certified Information Systems Security Professional CISSP

Newest Version Released 2022
Certified Information Systems Security Professional CISSP
File Size :
2.12 GB
Total length :
12h 33m

Category

Instructor

Stone River eLearning

Language

Last update

10/2022

Ratings

4/5

Certified Information Systems Security Professional CISSP

What you’ll learn

After successfully completing this course, the students shall be able to completely learn and understand the eight domains of CISSP:
Security and Risk Management
Asset Security
Security Engineering
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security

Certified Information Systems Security Professional CISSP

Requirements

The candidates are supposed to have some basic concept about IT security and the industry best practices. The students are also required to have a minimum of five years of professional experience in an IT security related job role. The experience required is a must for appearing in the certification exam.

Description

The Certified Information System Security Professional (CISSP) course is one of the most comprehensive courses available for the preparation of CISSP certification exam. The certification is offered by (ISC)2 and is among the most highly sought after certifications in the IT industry. The course reviews in great detail the information security concepts and industry best practices, and covers the eight domains of the official CISSP CBK (Common Body of Knowledge). The candidates are able to gain knowledge in information security that increases their ability to successfully implement and manage security programs in any organization.The goal of this preparatory course is to help the students achieve the (ISC)2 CISSP certification. The course will enable the students to validate their knowledge about the information security in general and the eight domains of CISSP exam in particular. The course alumni are supposed to become involved in critical security decision and risk management.On successfully completion of this course, the students shall be able to completely learn and gain indepth understanding of the eight domains of CISSP. The major domains covered in this course are:1) Security and Risk Management2) Asset Security3) Security Engineering4) Communications and Network Security5) Identity and Access Management6) Security Assessment and Testing7) Security Operations8) Software Development Security

Overview

Section 1: NEW CISSP RELEASE – 2022

Lecture 1 Course Introduction

Lecture 2 Instructor Introduction

Lecture 3 Experience Requirements

Lecture 4 Examination Information – CAT

Lecture 5 Examination Information – Linear

Lecture 6 Examination Retakes

Lecture 7 Domains Average Weight

Lecture 8 Exam Tips – CAT

Lecture 9 Domain 1 – Security and Risk Management

Lecture 10 Domain 2 – Asset Security

Lecture 11 Domain 3 – Security Architecture and Engineering

Lecture 12 Domain 4 – Communication and Network Security

Lecture 13 Domain 5 – Identity and Access Management

Lecture 14 Domain 6 – Security Assessment and Testing

Lecture 15 Domain 7 – Security Operations

Lecture 16 Domain 8 – Software Development Security

Lecture 17 Examination Policies and Procedures

Lecture 18 References

Section 2: Domain 1 – Security and Risk Management

Lecture 19 Security and Risk Management

Lecture 20 Topic: Professional Ethics

Lecture 21 Ethics

Lecture 22 (ISC)2 Code of Professional Ethics

Lecture 23 Organizational Code of Ethics

Lecture 24 References

Lecture 25 Topic: Security Concepts

Lecture 26 Security Terminology

Lecture 27 Information Security

Lecture 28 Cybersecurity

Lecture 29 Asset

Lecture 30 Vulnerability

Lecture 31 Threat

Lecture 32 Risk

Lecture 33 Subject

Lecture 34 Object

Lecture 35 CIA Triad

Lecture 36 Confidentiality

Lecture 37 Confidentiality

Lecture 38 Confidentiality

Lecture 39 Integrity

Lecture 40 Integrity

Lecture 41 Availability

Lecture 42 Availability

Lecture 43 DAD Triad

Lecture 44 DAD Triad

Lecture 45 AAA Services

Lecture 46 Protection Mechanisms

Lecture 47 Layering/Defense in Depth

Lecture 48 Abstraction

Lecture 49 Data Hiding

Lecture 50 Encryption

Lecture 51 References

Lecture 52 Topic: Security Governance Principles

Lecture 53 Governance

Lecture 54 Information Security Governance

Lecture 55 Security Governance vs Security Management

Lecture 56 Third-Party Governance

Lecture 57 Documentation Review

Lecture 58 References

Lecture 59 Topic: Security Function

Lecture 60 Alignment of Security Function

Lecture 61 Alignment to Strategy, Goals, Mission, and Objectives

Lecture 62 Security Function

Lecture 63 Top-Down Approach

Lecture 64 Management Approval

Lecture 65 Security Management

Lecture 66 Security Management Plans

Lecture 67 Organizational Processes

Lecture 68 Organizational Roles and Responsibilities

Lecture 69 Organizational Roles and Responsibilities (Cont.)

Lecture 70 Security Control Frameworks

Lecture 71 Due Care and Due Diligence

Lecture 72 References

Lecture 73 Topic: Policy, Standards, Procedures, and Guidelines

Lecture 74 Topic: Personnel Security

Lecture 75 Personnel Management

Lecture 76 Employment

Lecture 77 Screening and Hiring

Lecture 78 Onboarding, Offboarding, and Termination

Lecture 79 Transfers

Lecture 80 Agreements, Polices, and Procedures

Lecture 81 Vendor, Consultant, and Contractor Controls

Lecture 82 Compliance

Lecture 83 Privacy

Lecture 84 Security Awareness, Education, and Training

Lecture 85 References

Lecture 86 Topic: Risk Management Concepts

Lecture 87 Risk Management

Lecture 88 Risk Terminologies

Lecture 89 Risk Terminologies

Lecture 90 Threats and Vulnerabilities Identification

Lecture 91 Risk Analysis/Assessment

Lecture 92 Quantitative Risk Analysis

Lecture 93 Quantitative Risk Analysis

Lecture 94 Qualitative Risk Analysis

Lecture 95 Qualitative Risk Analysis

Lecture 96 Risk Responses

Lecture 97 Safeguard/Countermeasure Selection

Lecture 98 Safeguard/Countermeasure Implementation

Lecture 99 Types of Controls

Lecture 100 Security Control Assessment

Lecture 101 Monitoring and Measuring

Lecture 102 Risk Reporting

Lecture 103 Continuous Improvement

Lecture 104 Risk Frameworks

Lecture 105 References

Lecture 106 Topic: Threat Modeling

Lecture 107 Threat Modeling

Lecture 108 Identifying Threats

Lecture 109 Threat Schemes and Models

Lecture 110 Security Development Lifecycle (SDL)

Lecture 111 STRIDE

Lecture 112 PASTA

Lecture 113 Others Threat Models

Lecture 114 Determining and Diagramming Potential Attacks

Lecture 115 Performing Reduction Analysis

Lecture 116 Prioritization and Response

Lecture 117 DREAD

Lecture 118 References

Lecture 119 Topic: Supply Chain Risk Management

Lecture 120 Topic: Business Continuity Planning

Lecture 121 Project Scope and Planning

Lecture 122 Business Impact Assessment

Lecture 123 Continuity Planning

Lecture 124 Approval and Implementation

Lecture 125 References

Lecture 126 Topic: Compliance, Legal, and Regulatory Issues

Lecture 127 Categories of Laws

Lecture 128 Laws

Lecture 129 Computer Crime

Lecture 130 Intellectual Property

Lecture 131 Licensing

Lecture 132 Import/Export

Lecture 133 Privacy

Lecture 134 Privacy

Lecture 135 State Privacy Laws

Lecture 136 Compliance

Lecture 137 Contracting and Procurement

Lecture 138 References

Lecture 139 Domain 1 Review

Lecture 140 Domain 1 Review

Section 3: Domain 2 – Asset Security

Lecture 141 Asset Security

Lecture 142 Topic: Asset Identification and Classification

Lecture 143 Defining Sensitive Data

Lecture 144 Data Classification

Lecture 145 Data Classification – Government/Military

Lecture 146 Data Classification

Lecture 147 Data Classification – Government/Military

Lecture 148 Data Classification – Non-government/Civilian

Lecture 149 Asset Classification

Lecture 150 Data States

Lecture 151 References

Lecture 152 Topic: Asset Ownership and Handling Requirements

Lecture 153 Data Roles

Lecture 154 Data Roles

Lecture 155 Asset Handling Requirements

Lecture 156 Data Maintenance

Lecture 157 Marking and Labeling

Lecture 158 Data Loss Prevention

Lecture 159 References

Lecture 160 Topic: Asset and Data Management

Lecture 161 Handling Information and Assets

Lecture 162 Eliminating Data Remanence

Lecture 163 Eliminating Data Remanence (Cont.)

Lecture 164 Data and Asset Retention

Lecture 165 References

Lecture 166 Topic: Security Controls and Compliance Requirements

Lecture 167 Using Security Baselines

Lecture 168 NIST SP 800-53B

Lecture 169 Tailoring and Scoping

Lecture 170 Standards Selection

Lecture 171 Data Security Controls

Lecture 172 References

Lecture 173 Domain 2 Review

Lecture 174 Domain 2 Review

Section 4: Domain 3 – Security Architecture and Engineering

Lecture 175 Security Architecture and Engineering

Lecture 176 Topic: Fundamental Security Engineering Processes and Secure Design Principles

Lecture 177 Objects and Subjects

Lecture 178 Open and Closed Systems

Lecture 179 Open and Closed Source

Lecture 180 Techniques for Ensuring Confidentiality, Integrity, and Availability

Lecture 181 Controls

Lecture 182 Trust and Assurance

Lecture 183 References

Lecture 184 Topic: Security Models

Lecture 185 Trusted Computing Base

Lecture 186 State Machine Model

Lecture 187 Information Flow Model and Noninterference Model

Lecture 188 Bell-LaPadula Model

Lecture 189 Biba Model

Lecture 190 Bell-LaPadula vs Biba Model

Lecture 191 Clark-Wilson Model

Lecture 192 Other Security Models

Lecture 193 References

Lecture 194 Topic: Controls Selection

Lecture 195 Rainbow Series

Lecture 196 Evaluation Models

Lecture 197 Evaluation Models (Cont.)

Lecture 198 Certification and Accreditation

Lecture 199 References

Lecture 200 Topic: Security Capabilities of Information Systems

Lecture 201 Memory Protection

Lecture 202 Virtualization

Lecture 203 Trusted Platform Module (TPM)

Lecture 204 Interfaces

Lecture 205 Fault Tolerance

Lecture 206 References

Lecture 207 Topic: Vulnerability Management in Security Architectures, Designs, and Solution

Lecture 208 Hardware

Lecture 209 Hardware

Lecture 210 Firmware

Lecture 211 Client-Based

Lecture 212 Server-Based Systems

Lecture 213 Distributed Systems

Lecture 214 High-Performance Computing (HPC) Systems

Lecture 215 Serverless, Containerization, and Cloud-Based Systems

Lecture 216 Edge and Fog Computing

Lecture 217 Industrial Control Systems

Lecture 218 Endpoint, Embedded Devices, and Cyber-Physical Systems

Lecture 219 Critical Security Protection Mechanisms

Lecture 220 Common Architecture Flaws and Security Issues

Lecture 221 References

Lecture 222 References

Lecture 223 Topic: Cryptographic Concepts, Solutions, and Attacks

Lecture 224 Foundations

Lecture 225 Goals of Cryptography

Lecture 226 Cryptography Concepts

Lecture 227 Cryptography Concepts

Lecture 228 Cryptographic Mathematics

Lecture 229 Codes and Ciphers

Lecture 230 References

Lecture 231 Modern Cryptography

Lecture 232 Hashing

Lecture 233 Symmetric Key Cryptography

Lecture 234 Symmetric Key Cryptography

Lecture 235 Symmetric Key Cryptography

Lecture 236 Asymmetric Key Cryptography

Lecture 237 Asymmetric Key Cryptography

Lecture 238 Asymmetric Key Cryptography

Lecture 239 Asymmetric Key Cryptography

Lecture 240 Asymmetric Key Cryptography

Lecture 241 Cryptographic Life Cycle

Lecture 242 References

Lecture 243 Applied Cryptography

Lecture 244 References

Lecture 245 Cryptographic Attacks

Lecture 246 Cryptographic Attacks

Lecture 247 References

Lecture 248 Topic: Site and Facility Selection, Design, and Security Controls

Lecture 249 Security Principles for Site and Facility Design

Lecture 250 Site and Facility Security Controls

Lecture 251 Site and Facility Security Controls

Lecture 252 Site and Facility Security Controls

Lecture 253 Physical Security

Lecture 254 References

Lecture 255 Domain 3 Review

Lecture 256 Domain 3 Review

Section 5: Domain 4 – Communication and Network Security

Lecture 257 Communication and Network Security

Lecture 258 Topic: Secure Network Architecture and Design

Lecture 259 Security Boundaries

Lecture 260 Protocol Security

Lecture 261 Secure Communication Protocols

Lecture 262 IPsec

Lecture 263 Kerberos

Lecture 264 Secure Shell (SSH)

Lecture 265 Signal Protocol

Lecture 266 Secure Remote Procedure Call (S-RPC)

Lecture 267 Transport Layer Security (TLS)

Lecture 268 Authentication Protocols

Lecture 269 Password Authentication Protocol (PAP)

Lecture 270 Challenge-Handshake Authentication Protocol (CHAP)

Lecture 271 Extensible Authentication Protocol (EAP)

Lecture 272 Internet Protocol

Lecture 273 IPv4 and IPv6

Lecture 274 IP Classes

Lecture 275 VLSM and CIDR

Lecture 276 ICMP and IGMP

Lecture 277 Topology Communication Technologies

Lecture 278 Network Topologies

Lecture 279 Transmission Media

Lecture 280 Transmission Media

Lecture 281 LAN Technologies

Lecture 282 Ethernet

Lecture 283 Analog and Digital

Lecture 284 Synchronous and Asynchronous

Lecture 285 Baseband and Broadband

Lecture 286 Broadcast, Multicast, and Unicast

Lecture 287 LAN Media Access

Lecture 288 Carrier-Sense Multiple Access (CSMA)

Lecture 289 Token Passing

Lecture 290 Polling

Lecture 291 Site Survey

Lecture 292 References

Lecture 293 References

Lecture 294 Topic: Models, Devices, and Protocols

Lecture 295 OSI Model

Lecture 296 Encapsulation / Decapsulation

Lecture 297 OSI Layers

Lecture 298 OSI Layers

Lecture 299 OSI Layers

Lecture 300 OSI Layers

Lecture 301 OSI Layers

Lecture 302 TCP/IP Model

Lecture 303 Secure Protocols

Lecture 304 Converged Protocols

Lecture 305 Wireless Networks and Security

Lecture 306 Wireless Networks and Security

Lecture 307 Wireless Networks and Security

Lecture 308 Cellular Networks

Lecture 309 Cellular Networks

Lecture 310 Firewalls

Lecture 311 Firewall Deployment Architectures

Lecture 312 Network Access Control

Lecture 313 References

Lecture 314 Topic: Secure Communications Design and Technologies

Lecture 315 Secure Communication Protocols

Lecture 316 Voice and Multimedia

Lecture 317 Voice and Multimedia

Lecture 318 Email Security

Lecture 319 Remote Access Management

Lecture 320 Remote Access Management

Lecture 321 Virtual Private Network

Lecture 322 Switching Technologies

Lecture 323 WAN

Lecture 324 Common Network Attacks

Lecture 325 References

Lecture 326 Domain 4 Review

Lecture 327 Domain 4 Review

Section 6: Domain 5 – Identity and Access Management

Lecture 328 Identity and Access Management

Lecture 329 Topic: Physical and Logical Access Control

Lecture 330 Physical and Logical Access

Lecture 331 Defense-in-Depth

Lecture 332 CIA Triad and Access Controls

Lecture 333 References

Lecture 334 Topic: Authentication Methods

Lecture 335 Subjects and Objects

Lecture 336 Recap: AAA Services

Lecture 337 Authorization

Lecture 338 Accounting

Lecture 339 Authentication Factors

Lecture 340 Authentication Factors

Lecture 341 Type 1 Authentication Factor – Something You Know

Lecture 342 Type 2 Authentication Factor – Something You Have

Lecture 343 Type 3 Authentication Factor – Something You Are

Lecture 344 Types of Authentication

Lecture 345 Multifactor Authentication (MFA)

Lecture 346 Passwordless Authentication

Lecture 347 Device Authentication

Lecture 348 Service Authentication

Lecture 349 Mutual Authentication

Lecture 350 References

Lecture 351 Topic: Identity, Federation, and Third-Party Identity Services

Lecture 352 Centralized and Decentralized Access Control

Lecture 353 Single Sign-On

Lecture 354 SSO and Identity Federation

Lecture 355 Credential Management

Lecture 356 Scripted Access

Lecture 357 Session Management

Lecture 358 References

Lecture 359 Topic: Access Control Models

Lecture 360 Permissions, Rights, and Privileges

Lecture 361 Authorization Mechanisms

Lecture 362 Authorization Mechanisms

Lecture 363 Security Policy

Lecture 364 Access Control Models

Lecture 365 Discretionary Access Control (DAC)

Lecture 366 Nondiscretionary Access Control

Lecture 367 Role-Based Access Control (RBAC)

Lecture 368 Rule-Based Access Control (RuBAC)

Lecture 369 Attribute-Based Access Control (ABAC)

Lecture 370 Mandatory Access Control (MAC)

Lecture 371 Risk-Based Access Control

Lecture 372 References

Lecture 373 Topic: Identity and Access Lifecycle

Lecture 374 Topic: Authentication Systems

Lecture 375 SSO and the Internet

Lecture 376 Extensible Markup Language (XML)

Lecture 377 Security Assertion Markup Language (SAML)

Lecture 378 OAuth

Lecture 379 OpenID

Lecture 380 OpenID Connect (OIDC)

Lecture 381 SSO and the Internal Networks

Lecture 382 AAA Protocols

Lecture 383 Kerberos

Lecture 384 Kerberos

Lecture 385 RADIUS

Lecture 386 DIAMETER

Lecture 387 TACACS+

Lecture 388 References

Lecture 389 References

Lecture 390 Topic: Access Control Attacks

Lecture 391 Crackers vs Hackers

Lecture 392 Common Attacks

Lecture 393 Common Attacks

Lecture 394 Topic: Protection Methods

Lecture 395 Domain 5 Review

Lecture 396 Domain 5 Review

Section 7: Domain 6 – Security Assessment and Testing

Lecture 397 Security Assessment and Testing

Lecture 398 Topic: Security Assessments, Tests, and Audit Strategies

Lecture 399 Security Testing

Lecture 400 Security Testing

Lecture 401 Security Assessments

Lecture 402 Security Audits

Lecture 403 References

Lecture 404 Topic: Security Control Testing

Lecture 405 Vulnerability Assessments

Lecture 406 Describing Vulnerabilities

Lecture 407 Security Content Automation Protocol (SCAP)

Lecture 408 Vulnerability Scanning

Lecture 409 Network Discovery Scanning

Lecture 410 Network Vulnerability Scanning

Lecture 411 Web Vulnerability Scanning

Lecture 412 Database Vulnerability Scanning

Lecture 413 Penetration Testing

Lecture 414 Penetration Testing

Lecture 415 Software Testing

Lecture 416 Code Review and Testing

Lecture 417 Code Review and Testing

Lecture 418 Interface Testing

Lecture 419 Misuse Case Testing

Lecture 420 Test Coverage Analysis

Lecture 421 Website Monitoring

Lecture 422 References

Lecture 423 Topic: Security Processes Data Collection and Reporting

Lecture 424 Security Processes Data Collection and Reporting

Lecture 425 Security Processes Data Collection and Reporting

Lecture 426 References

Lecture 427 Topic: Security Audits

Lecture 428 Categories of Audits

Lecture 429 Auditing Standards

Lecture 430 System and Organization Controls (SOC)

Lecture 431 Compliance Checks

Lecture 432 References

Lecture 433 Domain 6 Review

Lecture 434 Domain 6 Review

Section 8: Domain 7 – Security Operations

Lecture 435 Security Operations

Lecture 436 Topic: Foundational Security Operations Concepts

Lecture 437 Need to Know and Principle of Least Privilege

Lecture 438 Separation of Duties/Responsibilities,Two-Person Control, and Split Knowledge

Lecture 439 Job Rotation and Mandatory Vacations

Lecture 440 Privileged Account Management and Service Level Agreements

Lecture 441 References

Lecture 442 Topic: Personnel Safety and Security

Lecture 443 References

Lecture 444 Topic: Provisioning Resources

Lecture 445 Ownership

Lecture 446 Asset Management and Protection

Lecture 447 References

Lecture 448 Topic: Configuration, Change, Patch, and Vulnerability Management

Lecture 449 Configuration Management

Lecture 450 Change Management

Lecture 451 Patch and Vulnerability Management

Lecture 452 References

Lecture 453 Incident Management and Response

Lecture 454 Defining Incident

Lecture 455 Incident Response Steps

Lecture 456 Incident Response Steps

Lecture 457 References

Lecture 458 Topic: Detective and Preventive Measures

Lecture 459 Intrusion Detection and Prevention Systems

Lecture 460 Preventive Measures

Lecture 461 Attacks

Lecture 462 Attacks

Lecture 463 Attacks

Lecture 464 References

Lecture 465 Topic: Logging and Monitoring

Lecture 466 Logging and Monitoring Techniques

Lecture 467 Role of Monitoring

Lecture 468 Automating Incident Response

Lecture 469 Automating Incident Response (Cont.)

Lecture 470 References

Lecture 471 Topic: Developing, Testing, Implementing, and Maintaining BCP and DRP

Lecture 472 Nature of Disaster

Lecture 473 Resilience, High Availability, and Fault Tolerance

Lecture 474 Resilience, High Availability, and Fault Tolerance

Lecture 475 Recovery Strategies

Lecture 476 Recovery Strategies

Lecture 477 Planning

Lecture 478 Testing and Maintenance

Lecture 479 Documentation and Training

Lecture 480 References

Lecture 481 Topic: Investigations and Ethics

Lecture 482 Investigations

Lecture 483 Investigation Types

Lecture 484 Evidence

Lecture 485 Evidence

Lecture 486 Major Categories of Computer Crime

Lecture 487 Ethics

Lecture 488 Organizational Code of Ethics

Lecture 489 (ISC)2 Code of Ethics

Lecture 490 Ethics and the Internet

Lecture 491 References

Lecture 492 Domain 7 Review

Lecture 493 Domain 7 Review

Section 9: Domain 8 – Software Development Security

Lecture 494 Software Development Security

Lecture 495 Topic: Systems Development Controls

Lecture 496 Systems Development Lifecycle

Lecture 497 Lifecycle Models

Lecture 498 Waterfall Model

Lecture 499 Spiral Model

Lecture 500 Agile

Lecture 501 Capability Maturity Model (CMM)

Lecture 502 IDEAL Model

Lecture 503 Change Management and Configuration Management

Lecture 504 Service-Level Agreements

Lecture 505 Third-Party Software Acquisition

Lecture 506 References

Lecture 507 Topic: Programming Languages and Concepts

Lecture 508 Programming Languages

Lecture 509 Libraries

Lecture 510 Application Programming Interface (API)

Lecture 511 DevOps

Lecture 512 References

Lecture 513 Topic: Security Controls in Software Development

Lecture 514 Code Security

Lecture 515 Database Security

Lecture 516 Database Security

Lecture 517 Web Application Firewall (WAF)

Lecture 518 References

Lecture 519 Topic: Secure Coding Standards and Guidelines

Lecture 520 Source Code Comments

Lecture 521 Error/Exception Handling

Lecture 522 Hard-Coded Credentials

Lecture 523 Memory Management

Lecture 524 References

Lecture 525 Topic: Software Testing, Assurance, and Vulnerabilities

Lecture 526 Software Testing

Lecture 527 Software Assurance (SwA)

Lecture 528 Vulnerabilities

Lecture 529 Types of Malware

Lecture 530 Sources of Malware

Lecture 531 Types of Attacks

Lecture 532 Password Attacks

Lecture 533 Application Attacks

Lecture 534 Web Application Attacks

Lecture 535 Reconnaissance Attacks

Lecture 536 Masquerading Attacks

Lecture 537 Zero-Day Attacks

Lecture 538 References

Lecture 539 Domain 8 Review

Lecture 540 Domain 8 Review

Section 10: Course Review

Lecture 541 Certified Information Systems Security Professional

Lecture 542 Domains Average Weight

Lecture 543 Domain 1 – Security and Risk Management

Lecture 544 Domain 1 – Security and Risk Management

Lecture 545 Domain 1 – Security and Risk Management

Lecture 546 Domain 1 – Security and Risk Management

Lecture 547 Domain 1 – Security and Risk Management

Lecture 548 Domain 1 – Security and Risk Management

Lecture 549 Domain 1 – Security and Risk Management

Lecture 550 Domain 2 – Asset Security

Lecture 551 Domain 2 – Asset Security

Lecture 552 Domain 2 – Asset Security

Lecture 553 Domain 3 – Security Architecture and Engineering

Lecture 554 Domain 3 – Security Architecture and Engineering

Lecture 555 Domain 3 – Security Architecture and Engineering

Lecture 556 Domain 3 – Security Architecture and Engineering

Lecture 557 Domain 3 – Security Architecture and Engineering

Lecture 558 Domain 4 – Communication and Network Security

Lecture 559 Domain 4 – Communication and Network Security

Lecture 560 Domain 4 – Communication and Network Security

Lecture 561 Domain 4 – Communication and Network Security

Lecture 562 Domain 5 – Identity and Access Management

Lecture 563 Domain 5 – Identity and Access Management

Lecture 564 Domain 5 – Identity and Access Management

Lecture 565 Domain 5 – Identity and Access Management

Lecture 566 Domain 5 – Identity and Access Management

Lecture 567 Domain 6 – Security Assessment and Testing

Lecture 568 Domain 6 – Security Assessment and Testing

Lecture 569 Domain 6 – Security Assessment and Testing

Lecture 570 Domain 7 – Security Operations

Lecture 571 Domain 7 – Security Operations

Lecture 572 Domain 7 – Security Operations

Lecture 573 Domain 7 – Security Operations

Lecture 574 Domain 7 – Security Operations

Lecture 575 Domain 8 – Software Development Security

Lecture 576 Domain 8 – Software Development Security

Lecture 577 Domain 8 – Software Development Security

Lecture 578 Domain 8 – Software Development Security

Lecture 579 EXAM TIPS

Lecture 580 EXAM TIPS

The course is intended for the candidates looking to be certified as a CISSP. In addition to this, candidates looking to establish their careers in the field of IT security are also encouraged to enroll in this course.

Course Information:

Udemy | English | 12h 33m | 2.12 GB
Created by: Stone River eLearning

You Can See More Courses in the IT & Software >> Greetings from CourseDown.com

New Courses

Scroll to Top