Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Information Systems Security Professional (CISSP)
Course Introduction
Introduction to the course (0:18)
The CISSP Exam
Introduction (0:15)
CISSP Certification Goals (1:25)
Security Professional Certification Value (1:25)
Exam Common Body of Knowledge (0:49)
Becoming a CISSP (2:25)
Cryptography
Introduction (0:18)
Cryptography Concepts Part1 (6:19)
Cryptography Concepts Part2 (2:53)
History of Cryptography (6:47)
Cryptosystem Features (2:13)
Encryption Systems Part1 (6:23)
Encryption Systems Part2 (3:04)
Substitution Ciphers (1:58)
Symmetric Algorithms Part1 (7:19)
Symmetric Algorithms Part2 (5:11)
Asymmetric Algorithms (5:06)
Message Integrity (7:52)
Digital Signatures (1:28)
Public Key Infrastructure Part1 (6:19)
Public Key Infrastructure Part2 (2:04)
Trusted Platform Module (2:41)
Encryption Communication Levels (1:56)
E-Mail Security (1:47)
Internet Security (5:35)
Cryptography Attacks (5:48)
Physical (Environmental) Security
Introduction (0:18)
Threat Mitigation Techniques (1:04)
Geographical-Man Made and Political Threats (6:09)
Site and Facility Design (4:35)
Perimeter Security (5:27)
Building and Internal Security (4:18)
Secure Data Centers and Fire Detection Systems (3:53)
Types of Power Issues (3:36)
HVAC Guidelines (0:54)
Equipment Security and Personal Security (1:42)
Security Architecture and Design
Introduction (0:23)
Security Model Concepts (0:57)
System Architecture (3:43)
Computing Platforms (1:56)
Virtual Computing and Security Services (2:27)
System Components (3:54)
Memory Concepts (4:08)
Enforcing Process Security and Multitasking (2:08)
System Security Architecture (5:05)
Security Models and Modes Part1 (4:58)
Security Models and Modes Part2 (4:28)
System Evaluation and Assurance Levels (3:36)
Certification and Accreditation (1:28)
Security Architecture Threats (2:47)
Database Security and Distributed Systems Security (3:40)
Access Control
Introduction (0:19)
Access Control Concepts (2:41)
Identification and Authentication (2:30)
Password Types and Management (4:39)
Ownership-Character-Physiological-Behavioral Factors (4:10)
Biometric Considerations (3:08)
Authorization Concepts Part1 (3:28)
Authorization Concepts Part2 (3:59)
User Accountability (3:10)
Vulnerability Assessment (0:49)
Penetration Testing and Threat Modeling (3:36)
Access Control Categories-Types-Models and Administration (6:38)
Provisioning Life Cycle and Access Control Monitoring (3:48)
Access Control Threats (5:12)
Software Development Security
Introduction (0:21)
System Development Life Cycle (1:23)
Software Testing and Validation (1:48)
Software Development Security Best Practices (0:57)
Software Development Methods (6:54)
Programming Languages (5:02)
Database Architecture and Models (1:28)
Database Interface Languages (0:52)
Data Warehouse-Mining and Threats (1:05)
Database and Application Access Control (1:49)
Monitoring for Problems (1:28)
Software Threats and Security (6:45)
Information Security Governance and Risk Management
Introduction (0:14)
Principles and Terms (3:47)
Security Frameworks & Methodologies Part1 (5:37)
Security Frameworks & Methodologies Part2 (5:15)
Risk Assessment (1:51)
Asset Values-Vulnerabilities and Threats (2:20)
Quantitative Risk Analysis (5:59)
Safeguard Selection (2:37)
Risk Management (4:39)
Security Governance Components (1:51)
Security Policies (4:21)
Classification Life Cycle (2:20)
Responsibilities and Roles (2:11)
Personnel Security (1:44)
Security Awareness Training (2:27)
Telecommunications and Network Security
Introduction (0:16)
OSI and TCIP Models Part1 (7:11)
OSI and TCIP Models Part2 (1:52)
IP Addressing (2:53)
Transmission Methods (3:10)
Types of Cabling (2:55)
Network Topologies (6:19)
Network Protocols and Services (3:59)
Network Routing and Devices (7:22)
Network Connection Types Part1 (4:01)
Network Connection Types Part2 (4:40)
Network Authentication (2:47)
Wireless Technologies (2:29)
WLAN Security Methods (1:54)
Network Threats and Cabling Behaviors (6:02)
Operation Security
Introduction (0:16)
Operation Security Concepts (1:48)
Protecting Tangible and Intangible Assets (1:28)
Asset and Media Management (2:55)
Storage Options (2:05)
Network and Resource Management (0:50)
Incident Response and Change Management (1:12)
Patch Management-Audit and Review (0:44)
Threats and Preventative Measures (0:53)
Trusted Paths-Trusted Recovery and System Hardening (1:03)
Monitoring and Reporting (1:00)
Business Continuity and Disaster Recovery
Introduction (0:17)
Business Continuity and Disaster Recovery Concepts Part1 (6:02)
Business Continuity and Disaster Recovery Concepts Part2 (2:04)
BIA Development (6:32)
Business Continuity Planning (2:26)
Preventive Controls (2:54)
Recovery Strategies Part1 (7:22)
Recovery Strategies Part2 (6:13)
Data Backup Types (5:14)
Data Recovery Terms (3:38)
Critical Teams and Duties (2:12)
BCP Testing (2:48)
Legal, Regulations and Investigations and Compliance
Introduction (0:16)
Digital Crime (2:31)
Computer Crime Concepts (2:45)
Major Legal Systems (3:15)
Intellectual Property Law (3:47)
Privacy Part1 (4:39)
Privacy Part2 (7:20)
Liability (3:17)
Incident Response (3:58)
Forensic and Digital Investigations Part1 (5:53)
Forensic and Digital Investigations Part2 (2:56)
Evidence Part1 (6:06)
Evidence Part2 (1:26)
Security Professional Ethics (4:04)
Course Outro (0:07)
Privacy Part1
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock