BESTSELLER | 200$ | 17 Hours | 1920x1080 | MP4 | aac, 44100 Hz, 2 channels | 4.91 GB | 637 kb/s
Start your CISSP certification journey today with help from Thor Pedersen, the "Best Selling" and "Highest Rated" CISSP instructor on Udemy.
The CISSP certification is the gold standard for IT Security certifications, with over 80,000 open CISSP jobs in the US.
Prepare for the 2018 version of the Certified Information Systems Security Professional (CISSP) Certification Exam (next CISSP update is in 2021).
In Domain 1 we will cover:
Introduction to domain 1.
The CIA Triad.
IAAA.
Governance, Management, standards, and frameworks.
Laws and regulations.
Intellectual property.
US laws, European laws and international treaties.
Ethics.
Policies, procedures, guidelines, and frameworks.
Access control.
Risk analysis, attackers and attacks.
What we covered in domain 1.
In Domain 2 we will cover:
Introduction to domain 2.
Data classification and clearance.
Sensitive information and media security.
Mission, data, and system owners and data custodians.
Memory and data remanence.
Data remanence and destruction.
Data security frameworks.
Introduction to domain 2.
In Domain 3 we will cover:
Introduction to domain 3.
Security models and concepts
Security evaluation models
Secure system design concepts
Hardware architecture
Secure operating systems and software architecture
Virtualization
IOT (Internet Of Things)
System vulnerabilities threats and countermeasures
Web architecture and attacks
Database security
Mobile device security
Industrial Control Systems
Introduction to Cryptography
The history of cryptography
Symmetric encryption
Asymmetric encryption
Hashing
Attacks on our cryptography
Digital signatures
IPSec and PGP
MAC, HMAC, SSL, and TLS
Physical security part 1
Physical security part 2
Physical security part 3
Site selection
Media storage
Electricity
Fire suppression and hot and cold aisles
Personnel safety
The fire triangle and fire suppression
What we covered in domain 3.
In Domain 4 we will cover:
Introduction to domain 4.
Networking basics and definitions
The OSI model
The TCP-IP model
IP addresses and port numbers part 1
IP addresses and port numbers part 2
IP support protocols
Cable types
LAN topologies
WAN protocols
SAN and VoIP protocols
WIFI
Bluetooth
Layer 1 to 3 networking devices
Layer 3 routing protocols
Firewalls
Modems
Network authentication protocols
Secure communications
What we covered in domain 4.
In Domain 5 we will cover:
Introduction to domain 5
Introduction to Access Control
Type 1 authentication - "Something you know" or "Knowledge factors"
Type 2 authentication - "Something you have" or "Possession factors"
Type 3 authentication - "Something you are" or "Biometrics"
Authorization
Accountability
Access control systems
Identity and access provisioning
Authentication protocols
What we covered in domain 5
In Domain 6 we will cover:
Introduction to domain 6
Domain 6 key concepts
Security Assessments
Security Audits
Security Audit Logs
Vulnerability scanners
Penetration testing
Social Engineering attacks
Penetration testing tools
Software testing
What we covered in domain 6
In Domain 7 we will cover:
Domain 7 - What we will be covering
Domain 7 key concepts
Administrative personnel controls
Digital forensics
Spinning disk forensics
Network and Software forensics
Incident Management definitions
Incident Management
Intrusion detection and prevention systems
SIEM (Security Information and Event Management
Application white-listing
Honeynets and Honeypots
Configuration Management
Patch Management
Change management
0-day attacks
Backups
RAID (Redundant Array of Independent Disks)
Redundancy
BCP and DRP part 1
Warfare, terrorism, sabotage, and ransomware
Personnel
DRP basics
Developing our BCP and DRP
BIA (Business Impact Analysis)
Supply and infrastructure redundancy
Disaster Recovery sites
Other BCP sub plans
Employee redundancy
Testing the plans
After a disruption
What we covered in Domain 7
In Domain 8 we will cover:
Domain 8 - What we will be covering
Designing security into our software
Programming concepts
Software development methodologies part 1
Software development methodologies part 2
Databases part 1
Databases part 2
OWASP part 1
OWASP part 2
Software vulnerabilities and Attacks
Capability Maturity Model (CMM)
Buying software from other companies
Artificial intelligence (AI)
What we covered in Domain 8
发布日期: 2020-04-02