Video description
Overview
This Learning Path includes CISSP and CISSP Exam Prep.
Prerequisites
- Five years of experience in IT networking, network storage, or data center administration
Description
CISSP Complete Video Course contains 24 hours of training with content divided into 9 lessons with 94 video sub-lessons. The videos consist of live trainer discussions, screencasts, animations, and live demos. The video lessons in this course review each exam objective so you can use this course as a complete study tool for taking the CISSP exam. Instruction throughout offers detailed explanations, demos, tips, and more.
CISSP Exam Prep LiveLessons provides 7 hours of deep-dive training on common CISSP exam traps, pitfalls, and difficulties. The goal of theCISSP Exam Prep LiveLessonsis to give you the edge you need to pass the rigorous CISSP exam and successfully gain certification. This course is designed to familiarize you with test-taking strategies, review “must know” and “challenging” concepts, practice answering exam questions, and most importantly, give you the confidence to pass your exam with flying colors. This course is NOT designed to be a comprehensive study guide. Instead we will be focusing on components of the ISC2 CBK (common body of knowledge) that fall into one of four categories.
Sari Greene, best-selling author of theCISSP Complete Video Course, will also walk you through practice questions throughout, highlighting how to answer difficult questions and reduce errors. She will end with a discussion on winning exam day strategies, so you can make the most of your time as you prepare. This is targeted exam prep training, so you can make the most of your knowledge when taking the test.
About the Instructor
Sari Greeneis an information security practitioner, author, educator, and entrepreneur. In 2003, Sari founded one of the first dedicated cybersecurity consultancies. She is a recognized leader in the field of cybersecurity and has amassed thousands of hours in the field working with a spectrum of technical, operational, compliance and management personnel as well as board of directors, regulators, service providers, and law enforcement agencies.
Sari’s first text was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel followed soon after by the first edition ofSecurity Policies and Procedures: Principles and Practices. The 2nd edition,Security Program and Policies: Principles and Practicesis currently being used in undergraduate and graduate programs nationwide. She is also the author and presenter of the best-sellingCISSP Complete Video Course. Sari has published a number of articles related to cybersecurity, has been quoted in theNew York Times,Wall Street Journal, CNN and on CNBC, speaks regularly at cybersecurity, legal, financial and healthcare conferences and workshops around the country, and is a frequent guest lecturer.
Sari serves on the Bangor Savings Bank Board of Directors and is chair of the Risk Management Committee. She provided expert witness testimony in the groundbreakingPATCO versus Ocean National Bankcase, represents industry on the Massachusetts Bankers Association Cybersecurity Task Force, and is a member of the American Bankers Association cybersecurity faculty.
Sari earned her MBA from the University of New Hampshire system. She holds multiple industry accreditations including CISSP-ISSMP, CRISC, CISM, MCSE, and NSA/IAM. She is also certified in Offshore Emergency Medicine.
You can contact Sari atsari@sarigreene.com, follow her on Twitter at @sari_greene or visit her website http://www.sarigreene.com
About LiveLessons Video Training
Pearson’s LiveLessons video training series publishes the industry’s leading video tutorials for IT pros, developers, sys admins, devops, network engineers, and certification candidates. LiveLessons feature the highest-quality professional skills training led by recognized author instructors published by Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include: IT certification, programming, development, networking, software skills for the home, office, and business, and more. Your purchase provides you with lifetime online access to the content.
http://www.pearsonitcertification.com/livelessons
Table of contents
-
CISSP Complete Video Course by Sari Greene
- Introduction
-
Lesson 1: Security and Risk Management
- Learning Objectives, Part 1
- 1.1 Examining Information Security Fundamentals
- 1.2 Applying Security Governance Concepts--Part 1
- 1.3 Applying Security Governance Concepts--Part 2
- 1.4 Designing and Implementing Governance Documents
- 1.5 Understanding Legal Systems and Related Laws--Part 1
- 1.6 Understanding Legal Systems and Related Laws--Part 2
- 1.7 Understanding Regulatory and Contractual Requirements--Part 1
- 1.8 Understanding Regulatory and Contractual Requirements--Part 2
- 1.9 Implementing Personnel Security
- 1.10 Implementing Third-Party Security
- Learning Objectives, Part 2
- 1.11 Understanding and Applying Threat Modeling
- 1.12 Understanding Implementing Risk Management Concepts
- 1.13 Exploring Risk Assessment Methodologies
- 1.14 Conducting a Quantitative Risk Assessment
- 1.15 Conducting a Qualitative Risk Assessment
- 1.16 Selecting Controls and Countermeasures
- 1.17 Managing Supply Chain Risk
- 1.18 Implementing Business Continuity Risk Management
- End of Lesson Review
- Lesson 2: Asset Security
-
Lesson 3: Security Engineering
- Learning Objectives, Part 1
- 3.1 Implementing Secure Design Principles
- 3.2 Understanding Security Models
- 3.3 Selecting Controls Based on Systems Security Evaluation Models
- 3.4 Recognizing Information Systems Security Capabilities
- 3.5 Assessing and Mitigating Security Architecture Vulnerabilities
- 3.6 Assessing and Mitigating Cloud Vulnerabilities
- 3.7 Assessing and Mitigating Web Vulnerabilities
- 3.8 Assessing and Mitigating Mobile and Remote Computing Vulnerabilities
- Mid-Lesson Review
- Learning Objectives, Part 2
- 3.9 Introducing Cryptography
- 3.10 Applying Cryptography--Encryption Part 1
- 3.11 Applying Cryptography--Encryption Part 2
- 3.12 Applying Cryptography--Public Key Infrastructure
- 3.13 Applying Cryptography--Hashing and Digital Signature
- 3.14 Applying Cryptography--Cryptographic Protocols
- 3.15 Applying Cryptography--Crypto Attacks
- 3.16 Applying Secure Principles to Site and Facility Design
- 3.17 Securing Information Processing Facilities and Equipment
- End of Lesson Review
-
Lesson 4: Communications and Network Security
- Learning Objectives
- 4.1 Reviewing OSI and TCP/IP Models
- 4.2 Understanding IP Convergence and Extensibility
- 4.3 Securing Wireless Networks
- 4.4 Using Cryptography to Maintain Communication Security
- 4.5 Securing Network Access
- 4.6 Securing Data Transmissions
- 4.7 Securing Multimedia Collaboration
- 4.8 Securing Virtual Private Networks
- 4.9 Securing Endpoints
- 4.10 Preventing and Mitigating Network Attacks
- End of Lesson Review
-
Lesson 5: Identity and Access Management
- Learning Objectives
- 5.1 Understanding Access Control Fundamentals
- 5.2 Examining Identification Schemas
- 5.3 Understanding Authentication Options
- 5.4 Understanding Authentication Systems
- 5.5 Implementing Access and Authorization Criteria
- 5.6 Implementing Access Control Models
- 5.7 Implementing Access Control Techniques and Technologies
- 5.8 Identity and Access Provisioning
- End of Lesson Review
-
Lesson 6: Security Assessment and Testing
- Learning Objectives
- 6.1 Testing and Examination T Overview
- 6.2 Security Assessment Planning
- 6.3 Conducting Security Examinations
- 6.4 Conducting Security Testing--Target Identificaton
- 6.5 Conducting Security Testing--Password Cracking
- 6.6 Conducting Security Testing--Penetration Testing
- 6.7 Understanding Log Analysis
- 6.8 Implementing Information Security Continuous Monitoring (ISCM)
- 6.9 Understanding Third-Party Audits and Examinations
- End of Lesson Review
-
Lesson 7: Security Operations
- Learning Objectives, Part 1
- 7.1 Managing Privileged Accounts
- 7.2 Operating and Maintaining Firewalls and IDS/IPS
- 7.3 Conducting Logging and Monitoring Activities
- 7.4 Implementing and Supporting Vulnerability and Patch Management
- 7.5 Implementing and Supporting Malware Management
- 7.6 Implementing and Supporting Media Management
- 7.7 Participating in the Configuration Management Process
- Mid-Lesson Review
- Learning Objectives, Part 2
- 7.8 Managing System Resilience and Fault Tolerance
- 7.9 Implementing Disaster Recovery Processes
- 7.10 Managing DR Plan Maintenance
- 7.11 Understanding and Supporting Investigations
- 7.12 Understanding Digital Forensics
- 7.13 Supporting Incident Management
- 7.14 Securing People and Places
- End of Lesson Review
- Lesson 8: Software Development Security
-
Lesson 9: Preparing for the Exam
- Learning Objectives
- 9.1 Security and Risk Management Domain: Review and Study Roadmap
- 9.2 Asset Security Domain: Review and Study Roadmap
- 9.3 Security Engineering Domain: Review and Study Roadmap
- 9.4 Communications and Network Security Domain: Review and Study Roadmap
- 9.5 Identity and Access Domain: Review and Study Roadmap
- 9.6 Security Assessment and Testing Domain: Review and Study Roadmap
- 9.7 Security Operations Domain: Review and Study Roadmap
- 9.8 Software Development Security Domain: Review and Study Roadmap
- 9.9 Taking the CISSP Examination
- Summary
- CISSP Exam Prep Livelessons: Introduction
- Module 1: Preparing for the Exam
- Lesson 1: The CISSP Exam
- Lesson 2: Test Taking Strategies
- Module 2: Challenging Topics and Concepts
- Lesson 3: Domain 1--Security and Risk Management
- Lesson 4: Domain 2--Asset Security
-
Lesson 5: Domain 3--Security Engineering
- Learning objectives
- 5.1 Applying the Star and Simple Properties
- 5.2 Deciphering Ciphers and Algorithms
- 5.3 Demystifying Symmetric and Asymmetric Encryption
- 5.4 Applying Asymmetric Encryption
- 5.5 Understanding Hashing
- 5.6 Examining Digital Signatures
- 5.7 Deconstructing the Digital Certificate Lifecycle
- 5.8 Understanding Cryptographic Protocols
- 5.9 Assessing Cryptographic Attacks
- 5.10 Understanding Database Security
- 5.11 Exam Practice Questions
- Lesson 6: Domain 4--Communication and Network Security
- Lesson 7: Domain--5 Identity and Access Management
- Lesson 8: Domain 6--Security Assessment and Testing
- Lesson 9: Domain 7--Security Operations
- Lesson 10: Domain 8--Software Development Security
- Module 3: CISSP Exam and Beyond
- Lesson 11: Taking Your Exam
- Summary
Product information
- Title: Learning Path: CISSP
- Author(s):
- Release date: November 2016
- Publisher(s): Pearson IT Certification
- ISBN: 0134643836
You might also like
video
Learning Splunk
Maybe you've heard about Splunk, but don't know how to use it to take control of …
video
CISSP 8 Domains
The complete CISSP video course with deliberate practice activities by Dean Bushmiller
video
Learning Path: Certified Ethical Hacker CEH Complete Video Course
Duration More Than 10 Hours of Video Instruction Overview Learn everything you need to know to …
book
Learning DevOps - Second Edition
Implement modern DevOps techniques to increase business productivity, agility, reliability, security, and scalability Key Features Learn …