It & Software Online Course by Udemy, On Sale Here
Invest in the CISSP Certification (Domain 1, 2, 3 & 4) Training Course: Video, downloadable slides & practice questions
An excellent training about It Certification
CISSP Certification: Domains 1, 2, 3 & 4 Video Training-2020
In this CISSP Domain 1, 2, 3, and 4 video training course, I will provide you the knowledge, experience and practical skills you need to pass the CISSP certification. In addition, you will get my years of experience (Over 18 years) as I translate CISSP training requirements into real-world examples. Included in this course: CISSP Domain 1 Videos13 Sections – 31 VideosSlides available to download for Domain 110 CISSP practice questionsCISSP Domain 2 Videos5 Sections – 9 VideosSlides available to download for Domain 210 CISSP practice questionsCISSP Domain 3 Videos11 Sections – 16 VideosSlides available to download for Domain 310 CISSP practice questionsCISSP Domain 4 Videos3 Sections – 7 VideosSlides available to download for Domain 410 CISSP practice questionsThe curriculum in this course covers the content that will be on the most current CISSP exam (April 2018). Each objective that is required for the CISSP exam will be covered in varying degrees of complexity and competency. The next upgrade to the CISSP curriculum/exam will occur in 2021.In Domain 1 we will cover: IntroductionIntroductionPurposeISC2Understand and apply concepts of confidentiality, integrity and availabilityConfidentialityIntegrityAvailabilityEvaluate and apply security governance principlesAlignment of security function to business strategy, goals, mission, and objectivesOrganizational processes (e.g, acquisitions, divestitures, governance committeesOrganizational roles and responsibilitiesSecurity control frameworksDue care/due diligenceDetermine compliance requirementsContractual, legal, industry standards, and regulatory requirementsPrivacy requirementsUnderstand legal and regulatory issues that pertain to information security in a global contextCyber crimes and data breachesLicensing and intellectual property requirementsImport/export controlsTrans-border data flowPrivacyUnderstand, adhere to, and promote professional ethics(ISC) Code of Professional EthicsOrganizational code of ethicsDevelop, document, and implement security policy, standards, procedures, and guidelinesIdentify, analyze, and prioritize Business Continuity (BC) requirementDevelop and document scope and planBusiness Impact Analysis (BIA)Contribute to and enforce personnel security policies and proceduresCandidate screening and hiringEmployment agreements and policiesOnboarding and termination processesVendor, consultant, and contractor agreements and controlsCompliance policy requirementsPrivacy policy requirementsUnderstand and apply risk management conceptsIdentify threats and vulnerabilitiesRisk assessment/analysisRisk responseCountermeasure selection and implementationApplicable types of controls (e.g, preventive, detective, corrective)Security Control Assessment (SCA)Monitoring and measurementAsset valuationReportingContinuous improvementRisk frameworksUnderstand and apply threat modeling concepts and methodologiesThreat modeling methodologiesThreat modeling conceptsApply risk-based management concepts to the supply chainRisks associated with hardware, software, and servicesThird-party assessment and monitoringMinimum security requirementsService-level requirementsEstablish and maintain a security awareness, education, and training programMethods and techniques to present awareness and trainingPeriodic content reviewsProgram effectiveness evaluationIn Domain 2 we will cover: Identify and classify information and assetsData ClassificationAsset ClassificationDetermine and maintain information and asset ownershipProtect privacyData ownersData processorsData remanenceCollection limitationEnsure appropriate asset retentionDetermine data security controlsUnderstand data statesScoping and tailoringStandards selectionData protection methodsEstablish information and asset handling requirementsIn Domain 3 we will cover: Implementation and management of engineering processes using secure design principlesAsset RetentionConfinementUnderstanding of the fundamental concepts of security modelsSelection of controls based upon systems security requirementsSecurity capabilities of information systemsAssessment and mitigation of vulnerabilities within a security architectureClient-based systemsServer-based systemsDatabase systemsCryptographic systemsIndustrial Control Systems (ICS)Cloud-based systemsDistributed systemsInternet of Things (IoT)Assessment and mitigation in web-based systemsAssessment and mitigation in mobile-based systemsAssessment and mitigation in embedded devicesApply cryptographic methodsCryptographic life-cycleCryptographic methodsPublic Key InfrastructureKey management practicesDigital SignaturesNon-repudiationIntegrity (e.g. Hashing)Cryptographic attacksDigital Rights Management (DRM)Application of security principles to sites and facility designImplementation of site and facility security controlsWiring closets/intermediate distribution facilitiesServer rooms/data centersMedia storage facilitiesEvidence storageRestricted and work area securityUtilities and Heating, Ventilation, and Air Conditioning (HVAC)Environmental issuesFire
Udemy is the leading global marketplace for learning and instruction
By connecting students all over the world to the best instructors, Udemy is helping individuals reach their goals and pursue their dreams.
Study anytime, anywhere.
Reviews
There are no reviews yet.