CISSP Certification: Complete Video Boot Camp 2020 | Udemy


CISSP Certification: Complete Video Boot Camp 2020 | Udemy
English | Size: 4.91 GB
Genre: eLearning

Start your CISSP certification journey today with help from Thor Pedersen, the “Best Selling” and “Highest Rated” CISSP instructor on Udemy.

The CISSP certification is the gold standard for IT Security certifications, with over 80,000 open CISSP jobs in the US.

Prepare for the 2018 version of the Certified Information Systems Security Professional (CISSP) Certification Exam (next CISSP update is in 2021).

In Domain 1 we will cover:

Introduction to domain 1.

The CIA Triad.

IAAA.

Governance, Management, standards, and frameworks.

Laws and regulations.

Intellectual property.

US laws, European laws and international treaties.

Ethics.

Policies, procedures, guidelines, and frameworks.

Access control.

Risk analysis, attackers and attacks.

What we covered in domain 1.

In Domain 2 we will cover:

Introduction to domain 2.

Data classification and clearance.

Sensitive information and media security.

Mission, data, and system owners and data custodians.

Memory and data remanence.

Data remanence and destruction.

Data security frameworks.

Introduction to domain 2.

In Domain 3 we will cover:

Introduction to domain 3.

Security models and concepts

Security evaluation models

Secure system design concepts

Hardware architecture

Secure operating systems and software architecture

Virtualization

IOT (Internet Of Things)

System vulnerabilities threats and countermeasures

Web architecture and attacks

Database security

Mobile device security

Industrial Control Systems

Introduction to Cryptography

The history of cryptography

Symmetric encryption

Asymmetric encryption

Hashing

Attacks on our cryptography

Digital signatures

IPSec and PGP

MAC, HMAC, SSL, and TLS

Physical security part 1

Physical security part 2

Physical security part 3

Site selection

Media storage

Electricity

Fire suppression and hot and cold aisles

Personnel safety

The fire triangle and fire suppression

What we covered in domain 3.

In Domain 4 we will cover:

Introduction to domain 4.

Networking basics and definitions

The OSI model

The TCP-IP model

IP addresses and port numbers part 1

IP addresses and port numbers part 2

IP support protocols

Cable types

LAN topologies

WAN protocols

SAN and VoIP protocols

WIFI

Bluetooth

Layer 1 to 3 networking devices

Layer 3 routing protocols

Firewalls

Modems

Network authentication protocols

Secure communications

What we covered in domain 4.

In Domain 5 we will cover:

Introduction to domain 5

Introduction to Access Control

Type 1 authentication – “Something you know” or “Knowledge factors”

Type 2 authentication – “Something you have” or “Possession factors”

Type 3 authentication – “Something you are” or “Biometrics”

Authorization

Accountability

Access control systems

Identity and access provisioning

Authentication protocols

What we covered in domain 5

In Domain 6 we will cover:

Introduction to domain 6

Domain 6 key concepts

Security Assessments

Security Audits

Security Audit Logs

Vulnerability scanners

Penetration testing

Social Engineering attacks

Penetration testing tools

Software testing

What we covered in domain 6

In Domain 7 we will cover:

Domain 7 – What we will be covering

Domain 7 key concepts

Administrative personnel controls

Digital forensics

Spinning disk forensics

Network and Software forensics

Incident Management definitions

Incident Management

Intrusion detection and prevention systems

SIEM (Security Information and Event Management

Application white-listing

Honeynets and Honeypots

Configuration Management

Patch Management

Change management

0-day attacks

Backups

RAID (Redundant Array of Independent Disks)

Redundancy

BCP and DRP part 1

Warfare, terrorism, sabotage, and ransomware

Personnel

DRP basics

Developing our BCP and DRP

BIA (Business Impact Analysis)

Supply and infrastructure redundancy

Disaster Recovery sites

Other BCP sub plans

Employee redundancy

Testing the plans

After a disruption

What we covered in Domain 7

In Domain 8 we will cover:

Domain 8 – What we will be covering

Designing security into our software

Programming concepts

Software development methodologies part 1

Software development methodologies part 2

Databases part 1

Databases part 2

OWASP part 1

OWASP part 2

Software vulnerabilities and Attacks

Capability Maturity Model (CMM)

Buying software from other companies

Artificial intelligence (AI)

What we covered in Domain 8

nitroflare.com/view/AC3477D0A1258D9/UD.CISSPCertificationBootCamp2020.1.4.part01.rar
nitroflare.com/view/E3E019584A0C963/UD.CISSPCertificationBootCamp2020.1.4.part02.rar
nitroflare.com/view/70E93B30BB0BB14/UD.CISSPCertificationBootCamp2020.1.4.part03.rar
nitroflare.com/view/F147C36D9B12F21/UD.CISSPCertificationBootCamp2020.1.4.part04.rar
nitroflare.com/view/7496CF31F2A1F9C/UD.CISSPCertificationBootCamp2020.1.4.part05.rar

rapidgator.net/file/91174563743e1cfb4f22cdc5a66b821d/UD.CISSPCertificationBootCamp2020.1.4.part01.rar.html
rapidgator.net/file/d39d5f0d3cc1186f306b08d13cd975fd/UD.CISSPCertificationBootCamp2020.1.4.part02.rar.html
rapidgator.net/file/adbb5e6b4ab873b7d0ae979cba9a7333/UD.CISSPCertificationBootCamp2020.1.4.part03.rar.html
rapidgator.net/file/ba57ec6fc8a5db8e85e39dab0185f034/UD.CISSPCertificationBootCamp2020.1.4.part04.rar.html
rapidgator.net/file/f6f747257c0c0e9714e89463fccd12fc/UD.CISSPCertificationBootCamp2020.1.4.part05.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.