Zenler Player
Your course is loading. Hang tight.
CISSP® Certification Preparation Training Course 2024
Back to curriculum
0% Complete
0% Complete
1. Introduction
2. What is CISSP Certificate
3. Course Outline
4. Latest CISSP Curriculum
5. Course Materials and Resources 2
6. Course flow and follow up
7. Important communication channel
8. Introduction to Security and Risk Management
9. Important Definitions
10. Important Definitions 2
11. Governance Requirements
12. Due Care and Due Diligence
13. Question
14. Compliance
15. Important Document
16. Ethics
18. Security Document 2
19.Security Document Types
20. Policy Sample
21. The Relationship Between Security Document Types
22. Risk Management
23. Risk Management Part 2
24. Asset Evaluation
25. Exam Question
26. Rsa Archer
27. ARIS GRC
28. Business Continuity Plans
29. Business Continuity Plans - BCP
30. Business Impact Analysis- BIA
31. MTD - RTO- RPO
32. Disaster Recovery Plan -DRP
33. Alternatives Sites
34. Exam Quiz
35. The Need of Personnel Security
36. Employment Policies
37. Employment Policies -Part 2
38. Termination
39. Security Awareness
Domain Evaluation 2
40. Introduction to Asset Security
41. Asset Management
42. Information Asset List
43. Classification
44. Labeling
45. DLP
46. DLP - Data Classification
47. Klassify - Data Labeling 2
48. Privacy
49. Retention
50. Data Security Control
Domain Evaluation 2
51. Introduction to Security Architecture and Engineering
52. Security Engineering Lifecycle
53. NISP SP 14-27
54. Trusted Computing Base
54.1 TCB Vulnerability
55. Security Models
56. TCSEC
57. ITSEC
58. Security Architecture Questions
59. Enterprise Security Architecture
60. Virtualization
61. Fault Tolerance
62. Server Fault Tolerance Techniques
63. New Technology
64. Spoofing Number
65. Spoofing Email
66. Cryptography
67. Alternative Ciphers
68. Symmetric Encryption
69. Asymmetric Encryption
70. Hash
71. Physical Security
72. Physical Access barriers
73. Power Issue
74. Fire
Domain Evaluation 2
75. The OSI Model
76. TCP-IP Model
77. Network Architecture Components
78. Firewall
79. Network Types and Topolgies
80. Remote Access Technology
81. Wireless Network
82. Network Attacks
83. Remote Access Security Mechanisms
84. RAID
85. Backup
86. Network Questions
87. Access Control
88. Authorization
89. Authentication
90. Single Sign on SSO
91. Central Administration (RADUIS)
92. Access Control Attack
93. Instrusion Detection System (IDS)
94. Access Control Inportant exam area
95. Access Control Questions
Domain Evaluation 2
96. Introduction to Cloud Security
97. NIST 800-145
98. IaaS vs PaaS vs SaaS
99. SaaS
100. PaaS
101. IaaS
102. Storage Architecture
103. Data Life Cycle Security
104. Hypervisor
105. Virtualization Security
106. Perimeter Security
Domain Evaluation 2
107. Introduction Security Assessment and Testing
108. Test Output
109. Vulnerability asessment - Part 1
110. Vulnerability asessment -Part 2
112. Nessus VA
113. Nessus VA- Part 2
114. Nessus VA Report
115. OWASP ZAP - VA
116. Nexpose VA
117. Penetration testing
118. Reconnaissance Demo -Maltego 2
119. Scanning Demo -Zenmap
120. Exploitation Demo -MetaSploit 2
121. Event Log Review 2
122. NIST 800-92
123. SIEM Solution
124. SIEM Solution Demo - Qradar
125. Code Review
126. Security KPI's
Domain Evaluation 2
127. Introduction to Security Operation 2
128. Security Operation 2
Domain Evaluation 2
129. The System Life Cycle
130. Software development Methods
132. Change Control Process
133. Security Consideration
134. Software Control
135. Introduction to SQL Injection 2
136. What is SQL Injection
Domain Evaluation 2
Domain Evaluation 2
Introduction
1. Introduction
Preview
2. What is CISSP Certificate
Preview
3. Course Outline
Preview
4. Latest CISSP Curriculum
5. Course Materials and Resources 2
6. Course flow and follow up
7. Important communication channel
Security and Risk Management
8. Introduction to Security and Risk Management
9. Important Definitions
10. Important Definitions 2
11. Governance Requirements
12. Due Care and Due Diligence
13. Question
14. Compliance
15. Important Document
16. Ethics
18. Security Document 2
19.Security Document Types
20. Policy Sample
21. The Relationship Between Security Document Types
22. Risk Management
23. Risk Management Part 2
24. Asset Evaluation
25. Exam Question
26. Rsa Archer
27. ARIS GRC
28. Business Continuity Plans
29. Business Continuity Plans - BCP
30. Business Impact Analysis- BIA
31. MTD - RTO- RPO
32. Disaster Recovery Plan -DRP
33. Alternatives Sites
34. Exam Quiz
35. The Need of Personnel Security
36. Employment Policies
37. Employment Policies -Part 2
38. Termination
39. Security Awareness
Domain Evaluation 2
Asset Security
40. Introduction to Asset Security
41. Asset Management
42. Information Asset List
43. Classification
44. Labeling
45. DLP
46. DLP - Data Classification
47. Klassify - Data Labeling 2
48. Privacy
49. Retention
50. Data Security Control
Domain Evaluation 2
Security Architecture and Engineering
51. Introduction to Security Architecture and Engineering
52. Security Engineering Lifecycle
53. NISP SP 14-27
54. Trusted Computing Base
54.1 TCB Vulnerability
55. Security Models
56. TCSEC
57. ITSEC
58. Security Architecture Questions
59. Enterprise Security Architecture
60. Virtualization
61. Fault Tolerance
62. Server Fault Tolerance Techniques
63. New Technology
64. Spoofing Number
65. Spoofing Email
66. Cryptography
67. Alternative Ciphers
68. Symmetric Encryption
69. Asymmetric Encryption
70. Hash
71. Physical Security
72. Physical Access barriers
73. Power Issue
74. Fire
Domain Evaluation 2
Communications and Network Security
75. The OSI Model
76. TCP-IP Model
77. Network Architecture Components
78. Firewall
79. Network Types and Topolgies
80. Remote Access Technology
81. Wireless Network
82. Network Attacks
83. Remote Access Security Mechanisms
84. RAID
85. Backup
86. Network Questions
Identity and Access Management
87. Access Control
88. Authorization
89. Authentication
90. Single Sign on SSO
91. Central Administration (RADUIS)
92. Access Control Attack
93. Instrusion Detection System (IDS)
94. Access Control Inportant exam area
95. Access Control Questions
Domain Evaluation 2
Cloud Security
96. Introduction to Cloud Security
97. NIST 800-145
98. IaaS vs PaaS vs SaaS
99. SaaS
100. PaaS
101. IaaS
102. Storage Architecture
103. Data Life Cycle Security
104. Hypervisor
105. Virtualization Security
106. Perimeter Security
Domain Evaluation 2
Security Assessment and Testing
107. Introduction Security Assessment and Testing
108. Test Output
109. Vulnerability asessment - Part 1
110. Vulnerability asessment -Part 2
112. Nessus VA
113. Nessus VA- Part 2
114. Nessus VA Report
115. OWASP ZAP - VA
116. Nexpose VA
117. Penetration testing
118. Reconnaissance Demo -Maltego 2
119. Scanning Demo -Zenmap
120. Exploitation Demo -MetaSploit 2
121. Event Log Review 2
122. NIST 800-92
123. SIEM Solution
124. SIEM Solution Demo - Qradar
125. Code Review
126. Security KPI's
Domain Evaluation 2
Security Operations
127. Introduction to Security Operation 2
128. Security Operation 2
Domain Evaluation 2
Software Development Security
129. The System Life Cycle
130. Software development Methods
132. Change Control Process
133. Security Consideration
134. Software Control
135. Introduction to SQL Injection 2
136. What is SQL Injection
Domain Evaluation 2
Domain Evaluation 2
×
This is an unpublished lesson. This lesson will not be shown for students unless you set it as Public.
Back to Dashboard
No contents are available in this lesson!
No lessons available !
Back to Dashboard
Lesson contents locked
Enroll to unlock this lesson.
Enroll to unlock
Next Lesson