O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CISSP Certification Training: Domain 1

Video Description

In this CISSP Certification Training: Domain 1 training course, expert author David Miller will teach you everything you need to know to prepare for and pass domain 1 of the Certified Information Systems Security Professional Certification. This course is designed for anyone who is looking to prepare for the new CISSP certification exam.

You will start by learning about the CISSP Domain 1 security concepts and governance, including policies, compliance, and ethics. From there, David will teach you about risk management and personal security, including fraud prevention and detection, monitoring and enforcement, and termination. This video tutorial will also cover security awareness training.

Once you have completed this computer based training course, you will be fully capable of successfully completing the Security and Risk Management domain of the CISSP certification exam.

Table of Contents

  1. CISSP Course Introduction
    1. CISSP 2018 Update Overview 00:14:33
    2. CISSP Course Introduction 00:01:24
    3. CISSP Certification 00:08:27
    4. CISSP Certification Requirements 00:03:40
  2. Security Concepts
    1. CISSP 2018 Domain 1 Update: Security and Risk Management 00:08:58
    2. CISSP 2018 Domain 1 Update: Expanded Topics Part 1 00:11:09
    3. CISSP 2018 Domain 1 Update: Expanded Topics Part 2 00:09:36
    4. CISSP 2018 Domain 1 Update: Expanded Topics Part 3 00:09:22
    5. Information Assets - Part 1 00:06:03
    6. Information Assets - Part 2 00:03:30
    7. The CIA Triad - Part 1 00:08:56
    8. The CIA Triad - Part 2 00:07:11
    9. Risk - Part 1 00:05:15
    10. Risk - Part 2 00:08:27
    11. Threats To Data 00:06:26
    12. Threat Of Litigation 00:07:34
    13. Countermeasures 00:05:57
    14. Roles And Responsibilities 00:05:45
  3. Security Governance
    1. Security Governance 00:06:31
    2. The Security Program - Part 1 00:08:50
    3. The Security Program - Part 2 00:06:37
    4. Policies - Part 1 00:05:14
    5. Policies - Part 2 00:06:21
    6. Policies - Part 3 00:06:48
    7. Control Frameworks 00:06:21
    8. Compliance 00:07:30
    9. Privacy And Legal Systems 00:05:42
    10. Common Legal System And Export Controls 00:06:39
    11. Trans-Border Information Flow 00:05:54
    12. Intellectual Property Protection 00:04:45
    13. DRM, IRM, And Licensing 00:06:19
    14. Piracy And PCI DSS 00:08:40
    15. Auditing, Reporting, And Metrics 00:07:38
    16. Ethics 00:07:09
    17. Cybercrime 00:08:45
    18. Cybercrime Attackers 00:07:24
    19. Prosecuting Cybercrime And Third Party Governance 00:08:31
  4. Risk Management
    1. Risk Management Project Initiation 00:08:00
    2. Risk Management Framework NIST SP800-37 00:07:46
    3. Assets 00:07:20
    4. Quantitative Qualitative Value 00:07:41
    5. Asset Classification 00:08:25
    6. Threat Analysis 00:06:24
    7. ALE 00:05:03
    8. Countermeasures - Part 1 00:06:39
    9. Countermeasures - Part 2 00:08:19
    10. Cost Justification 00:07:22
    11. Dealing With Risk 00:07:20
    12. Approvals 00:06:08
    13. Completing The Risk Management Project 00:07:00
    14. BCP And DRP 00:07:54
    15. BCP, DRP, BIA, And MTD 00:08:07
    16. RPO And RTO 00:07:22
  5. Personnel Security
    1. Personnel Security 00:06:47
    2. Separation Of Duties 00:07:37
    3. Fraud Prevention And Detection 00:08:57
    4. Monitoring And Enforcement 00:07:14
    5. Pre-Hire Screening And Agreements 00:07:38
    6. Onboarding 00:06:45
    7. Account Provisioning 00:07:40
    8. Monitoring And Termination 00:07:34
    9. Termination 00:04:39
  6. Security Awareness Training
    1. Security Awareness Training 00:05:58
    2. Security Awareness Training Topics - Part 1 00:08:44
    3. Security Awareness Training Topics - Part 2 00:06:17
    4. Privileged Users 00:08:15
    5. Enforcement 00:03:45
  7. Wrap Up
    1. Wrap Up 00:03:49