Learning Path: CISSP

Video description

Overview

This Learning Path includes CISSP and CISSP Exam Prep.

Prerequisites

  • Five years of experience in IT networking, network storage, or data center administration

Description

CISSP Complete Video Course contains 24 hours of training with content divided into 9 lessons with 94 video sub-lessons. The videos consist of live trainer discussions, screencasts, animations, and live demos. The video lessons in this course review each exam objective so you can use this course as a complete study tool for taking the CISSP exam. Instruction throughout offers detailed explanations, demos, tips, and more.

CISSP Exam Prep LiveLessons provides 7 hours of deep-dive training on common CISSP exam traps, pitfalls, and difficulties. The goal of theCISSP Exam Prep LiveLessonsis to give you the edge you need to pass the rigorous CISSP exam and successfully gain certification. This course is designed to familiarize you with test-taking strategies, review “must know” and “challenging” concepts, practice answering exam questions, and most importantly, give you the confidence to pass your exam with flying colors. This course is NOT designed to be a comprehensive study guide. Instead we will be focusing on components of the ISC2 CBK (common body of knowledge) that fall into one of four categories.

Sari Greene, best-selling author of theCISSP Complete Video Course, will also walk you through practice questions throughout, highlighting how to answer difficult questions and reduce errors. She will end with a discussion on winning exam day strategies, so you can make the most of your time as you prepare. This is targeted exam prep training, so you can make the most of your knowledge when taking the test.

About the Instructor

Sari Greeneis an information security practitioner, author, educator, and entrepreneur. In 2003, Sari founded one of the first dedicated cybersecurity consultancies. She is a recognized leader in the field of cybersecurity and has amassed thousands of hours in the field working with a spectrum of technical, operational, compliance and management personnel as well as board of directors, regulators, service providers, and law enforcement agencies.

Sari’s first text was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel followed soon after by the first edition ofSecurity Policies and Procedures: Principles and Practices. The 2nd edition,Security Program and Policies: Principles and Practicesis currently being used in undergraduate and graduate programs nationwide. She is also the author and presenter of the best-sellingCISSP Complete Video Course. Sari has published a number of articles related to cybersecurity, has been quoted in theNew York Times,Wall Street Journal, CNN and on CNBC, speaks regularly at cybersecurity, legal, financial and healthcare conferences and workshops around the country, and is a frequent guest lecturer.

Sari serves on the Bangor Savings Bank Board of Directors and is chair of the Risk Management Committee. She provided expert witness testimony in the groundbreakingPATCO versus Ocean National Bankcase, represents industry on the Massachusetts Bankers Association Cybersecurity Task Force, and is a member of the American Bankers Association cybersecurity faculty.

Sari earned her MBA from the University of New Hampshire system. She holds multiple industry accreditations including CISSP-ISSMP, CRISC, CISM, MCSE, and NSA/IAM. She is also certified in Offshore Emergency Medicine.

You can contact Sari atsari@sarigreene.com, follow her on Twitter at @sari_greene or visit her website http://www.sarigreene.com

About LiveLessons Video Training

Pearson’s LiveLessons video training series publishes the industry’s leading video tutorials for IT pros, developers, sys admins, devops, network engineers, and certification candidates. LiveLessons feature the highest-quality professional skills training led by recognized author instructors published by Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include: IT certification, programming, development, networking, software skills for the home, office, and business, and more. Your purchase provides you with lifetime online access to the content.

http://www.pearsonitcertification.com/livelessons

Table of contents

  1. CISSP Complete Video Course by Sari Greene
    1. Introduction
      1. CISSP Complete Video Course: Introduction
    2. Lesson 1: Security and Risk Management
      1. Learning Objectives, Part 1
      2. 1.1 Examining Information Security Fundamentals
      3. 1.2 Applying Security Governance Concepts--Part 1
      4. 1.3 Applying Security Governance Concepts--Part 2
      5. 1.4 Designing and Implementing Governance Documents
      6. 1.5 Understanding Legal Systems and Related Laws--Part 1
      7. 1.6 Understanding Legal Systems and Related Laws--Part 2
      8. 1.7 Understanding Regulatory and Contractual Requirements--Part 1
      9. 1.8 Understanding Regulatory and Contractual Requirements--Part 2
      10. 1.9 Implementing Personnel Security
      11. 1.10 Implementing Third-Party Security
      12. Learning Objectives, Part 2
      13. 1.11 Understanding and Applying Threat Modeling
      14. 1.12 Understanding Implementing Risk Management Concepts
      15. 1.13 Exploring Risk Assessment Methodologies
      16. 1.14 Conducting a Quantitative Risk Assessment
      17. 1.15 Conducting a Qualitative Risk Assessment
      18. 1.16 Selecting Controls and Countermeasures
      19. 1.17 Managing Supply Chain Risk
      20. 1.18 Implementing Business Continuity Risk Management
      21. End of Lesson Review
    3. Lesson 2: Asset Security
      1. Learning Objectives
      2. 2.1 Classifying Assets
      3. 2.2 Managing Assets
      4. 2.3 Protecting Data Privacy
      5. 2.4 Ensuring Appropriate Retention and Destruction
      6. 2.5 Determining Data Security Controls
      7. End of Lesson Review
    4. Lesson 3: Security Engineering
      1. Learning Objectives, Part 1
      2. 3.1 Implementing Secure Design Principles
      3. 3.2 Understanding Security Models
      4. 3.3 Selecting Controls Based on Systems Security Evaluation Models
      5. 3.4 Recognizing Information Systems Security Capabilities
      6. 3.5 Assessing and Mitigating Security Architecture Vulnerabilities
      7. 3.6 Assessing and Mitigating Cloud Vulnerabilities
      8. 3.7 Assessing and Mitigating Web Vulnerabilities
      9. 3.8 Assessing and Mitigating Mobile and Remote Computing Vulnerabilities
      10. Mid-Lesson Review
      11. Learning Objectives, Part 2
      12. 3.9 Introducing Cryptography
      13. 3.10 Applying Cryptography--Encryption Part 1
      14. 3.11 Applying Cryptography--Encryption Part 2
      15. 3.12 Applying Cryptography--Public Key Infrastructure
      16. 3.13 Applying Cryptography--Hashing and Digital Signature
      17. 3.14 Applying Cryptography--Cryptographic Protocols
      18. 3.15 Applying Cryptography--Crypto Attacks
      19. 3.16 Applying Secure Principles to Site and Facility Design
      20. 3.17 Securing Information Processing Facilities and Equipment
      21. End of Lesson Review
    5. Lesson 4: Communications and Network Security
      1. Learning Objectives
      2. 4.1 Reviewing OSI and TCP/IP Models
      3. 4.2 Understanding IP Convergence and Extensibility
      4. 4.3 Securing Wireless Networks
      5. 4.4 Using Cryptography to Maintain Communication Security
      6. 4.5 Securing Network Access
      7. 4.6 Securing Data Transmissions
      8. 4.7 Securing Multimedia Collaboration
      9. 4.8 Securing Virtual Private Networks
      10. 4.9 Securing Endpoints
      11. 4.10 Preventing and Mitigating Network Attacks
      12. End of Lesson Review
    6. Lesson 5: Identity and Access Management
      1. Learning Objectives
      2. 5.1 Understanding Access Control Fundamentals
      3. 5.2 Examining Identification Schemas
      4. 5.3 Understanding Authentication Options
      5. 5.4 Understanding Authentication Systems
      6. 5.5 Implementing Access and Authorization Criteria
      7. 5.6 Implementing Access Control Models
      8. 5.7 Implementing Access Control Techniques and Technologies
      9. 5.8 Identity and Access Provisioning
      10. End of Lesson Review
    7. Lesson 6: Security Assessment and Testing
      1. Learning Objectives
      2. 6.1 Testing and Examination T Overview
      3. 6.2 Security Assessment Planning
      4. 6.3 Conducting Security Examinations
      5. 6.4 Conducting Security Testing--Target Identificaton
      6. 6.5 Conducting Security Testing--Password Cracking
      7. 6.6 Conducting Security Testing--Penetration Testing
      8. 6.7 Understanding Log Analysis
      9. 6.8 Implementing Information Security Continuous Monitoring (ISCM)
      10. 6.9 Understanding Third-Party Audits and Examinations
      11. End of Lesson Review
    8. Lesson 7: Security Operations
      1. Learning Objectives, Part 1
      2. 7.1 Managing Privileged Accounts
      3. 7.2 Operating and Maintaining Firewalls and IDS/IPS
      4. 7.3 Conducting Logging and Monitoring Activities
      5. 7.4 Implementing and Supporting Vulnerability and Patch Management
      6. 7.5 Implementing and Supporting Malware Management
      7. 7.6 Implementing and Supporting Media Management
      8. 7.7 Participating in the Configuration Management Process
      9. Mid-Lesson Review
      10. Learning Objectives, Part 2
      11. 7.8 Managing System Resilience and Fault Tolerance
      12. 7.9 Implementing Disaster Recovery Processes
      13. 7.10 Managing DR Plan Maintenance
      14. 7.11 Understanding and Supporting Investigations
      15. 7.12 Understanding Digital Forensics
      16. 7.13 Supporting Incident Management
      17. 7.14 Securing People and Places
      18. End of Lesson Review
    9. Lesson 8: Software Development Security
      1. Learning Objectives
      2. 8.1 Managing the Software Development Lifecycle
      3. 8.2 Understanding Software Development Approaches, Models, and Tools
      4. 8.3 Understanding Source Code Security Issues
      5. 8.4 Managing Database Security
      6. 8.5 Assessing the Security Impact of Acquired Software
      7. End of Lesson Review
    10. Lesson 9: Preparing for the Exam
      1. Learning Objectives
      2. 9.1 Security and Risk Management Domain: Review and Study Roadmap
      3. 9.2 Asset Security Domain: Review and Study Roadmap
      4. 9.3 Security Engineering Domain: Review and Study Roadmap
      5. 9.4 Communications and Network Security Domain: Review and Study Roadmap
      6. 9.5 Identity and Access Domain: Review and Study Roadmap
      7. 9.6 Security Assessment and Testing Domain: Review and Study Roadmap
      8. 9.7 Security Operations Domain: Review and Study Roadmap
      9. 9.8 Software Development Security Domain: Review and Study Roadmap
      10. 9.9 Taking the CISSP Examination
    11. Summary
      1. CISSP Complete Video Course: Summary
    12. CISSP Exam Prep Livelessons: Introduction
      1. Course Intro
    13. Module 1: Preparing for the Exam
      1. Module Intro
    14. Lesson 1: The CISSP Exam
      1. Learning objectives
      2. 1.1 About this Course
      3. 1.2 Understanding the CISSP Exam Structure
      4. 1.3 Preparing for the Types of Questions You Will Encounter on the Exam
    15. Lesson 2: Test Taking Strategies
      1. Learning objectives
      2. 2.1 Test Taking Rules of Thumb
      3. 2.2 The Zen of Test Taking
    16. Module 2: Challenging Topics and Concepts
      1. Module Intro
    17. Lesson 3: Domain 1--Security and Risk Management
      1. Learning objectives
      2. 3.1 Understanding Quantitative Risk Assessments
      3. 3.2 Exploring Business Impact Analysis
      4. 3.3 Exam Practice Questions
    18. Lesson 4: Domain 2--Asset Security
      1. Learning objectives
      2. 4.1 Grasping Privacy Concepts
      3. 4.2 Understanding Information Lifecycle
      4. 4.3 Exam Practice Questions
    19. Lesson 5: Domain 3--Security Engineering
      1. Learning objectives
      2. 5.1 Applying the Star and Simple Properties
      3. 5.2 Deciphering Ciphers and Algorithms
      4. 5.3 Demystifying Symmetric and Asymmetric Encryption
      5. 5.4 Applying Asymmetric Encryption
      6. 5.5 Understanding Hashing
      7. 5.6 Examining Digital Signatures
      8. 5.7 Deconstructing the Digital Certificate Lifecycle
      9. 5.8 Understanding Cryptographic Protocols
      10. 5.9 Assessing Cryptographic Attacks
      11. 5.10 Understanding Database Security
      12. 5.11 Exam Practice Questions
    20. Lesson 6: Domain 4--Communication and Network Security
      1. Learning objectives
      2. 6.1 Analyzing OSI TCP/IP Model Relevance
      3. 6.2 Understanding Decision Engines
      4. 6.3 Surveying Non-IP Network Protocols
      5. 6.4 Exploring VoIP
      6. 6.5 Securing 802.1x Wireless Networks
      7. 6.6 Assessing Network Attacks
      8. 6.7 Exam Practice Questions
    21. Lesson 7: Domain--5 Identity and Access Management
      1. Learning objectives
      2. 7.1 Understanding Mutual Authentication
      3. 7.2 Investigating Federated Identity
      4. 7.3 Surveying Access Control Models
      5. 7.4 Exam Practice Questions
    22. Lesson 8: Domain 6--Security Assessment and Testing
      1. Learning objectives
      2. 8.1 Defining the Penetration Testing Rules of Engagement
      3. 8.2 Interpreting SSAE16 SOC Reports
      4. 8.3 Understanding Information Security Continuous Monitoring (ISCM)
      5. 8.4 Exam Practice Questions
    23. Lesson 9: Domain 7--Security Operations
      1. Learning objectives
      2. 9.1 Evaluating Vulnerability, Change, and Configuration Management
      3. 9.2 Assessing Resiliency and Fault Tolerance
      4. 9.3 Deciphering Digital Forensics and Evidence Handling
      5. 9.4 Protecting People and Places
      6. 9.5 Exam Questions
    24. Lesson 10: Domain 8--Software Development Security
      1. Learning objectives
      2. 10.1 Evaluating Source Code Flaws
      3. 10.2 Understanding the Software Development Processes
      4. 10.3 Surveying Software Testing
      5. 10.4 Deconstructing the Product Development Lifecycle
      6. 10.5 Exam Practice Questions
    25. Module 3: CISSP Exam and Beyond
      1. Module Intro
    26. Lesson 11: Taking Your Exam
      1. Learning objectives
      2. 11.1 The Week Leading Up to the Exam
      3. 11.2 What to Do on Test Day
      4. 11.3 What to Expect at the Testing Center
      5. 11.4 Attaining and Maintaining Your CISSP Certification
    27. Summary
      1. Course Summary

Product information

  • Title: Learning Path: CISSP
  • Author(s): Sari Greene
  • Release date: November 2016
  • Publisher(s): Pearson IT Certification
  • ISBN: 0134643836