Cart
Sign In

Sorry! ONLINE DELIVERY VIA EMAIL - Expert Training CISSP Certification 2019 Complete 8 Domains 12 GB Video Training Course DOWNLOAD Downloadable Content is sold out.

Compare Products
Clear All
Let's Compare!

ONLINE DELIVERY VIA EMAIL - Expert Training CISSP Certification 2019 Complete 8 Domains 12 GB Video Training Course DOWNLOAD Downloadable Content

This product has been sold out

We will let you know when in stock
notify me

Featured

Highlights

  • Disclaimer:Online Delivery via E-mail. No Physical Dispatch. Non-Cancellable Product
  • Stream:CISSP
  • Certification:Yes
  • Language:English
  • Format:Downloadable Content
  • Type:Online Fulfillment
  • Duration:32 Hours
  • For queries and concerns drop an email to learning@snapdeal.com
  • SUPC: SDL564072612

Description

Duration : 17+19 Hours Size : 14.6 GB (6 PART DOWNLOAD) Table of Contents: Introduction 7 Lessons CISSP Domain 1: Security and Risk Management 14 Lessons CISSP Domain 2: Asset Security 9 Lessons Bonus Lessons. 1 Lesson Introduction 7 Lessons CISSP Domain 3: Security Architecture and Engineering. 33 Lessons CISSP Domain 4: Communications and Network Security. 21 Lessons Bonus Lessons. 1 Lesson Introduction 7 Lessons CISSP Domain 5: Identity and Access Management (IAM). 12 Lessons CISSP Domain 6: Security Assessment and Testing. 12 Lessons Bonus Lessons. 1 Lesson Introduction 7 Lessons CISSP Domain 7: Security Operations. 33 Lessons CISSP Domain 8: Software Development Security. 15 Lessons Bonus Lessons. 1 Lesson Bonus : CISSP course 2019 Duration : 19 Hours Module 1: Welcome and Introduction 08:22 1.1 Introduction 04:31 1.2 Computer Adaptive Testing (CAT) Module 2: Information Security and Risk Management 04:19 2.1 Domain 1 Agenda 11:30 2.2 Information Security Program Part 1 08:16 2.3 Information Security Program Part 2 12:58 2.4 Roles and Responsibilities 07:35 2.5 Risk Definitions 09:14 2.6 Risk Identification 14:58 2.7 Risk Assessment and Analysis 10:21 2.8 Risk Mitigation and Response 08:14 2.9 Risk Monitoring and Reporting 09:24 2.10 Legal Considerations 05:39 2.11 Knowledge Transfer 09:16 2.12 The CISSP Mindset Part 1 11:40 2.13 The CISSP Mindset Part 2 04:08 2.14 Introduction to Business Continuity and Disaster Recovery Planning 09:28 2.15 Business Continuity Planning Part 1 07:32 2.16 Business Continuity Planning Part 2 05:06 2.17 BCP Step 1: Project Scope and Planning Part 1 05:04 2.18 BCP Step 1: Project Scope and Planning Part 2 06:44 2.19 BCP Step 2: Business Impact Assessment Part 1 07:15 2.20 BCP Step 2: Business Impact Assessment Part 2 10:58 2.21 BCP Steps 3 and 4: Community Planning, Approval and Implementation 07:11 2.22 BCP Sub Plans 46:00 2.23 Creation of BCP and DRP 04:19 2.24 Developing the Teams 08:55 2.25 Types of Tests Module 3: Asset Security 01:48 3.1 Introduction to Asset Security 05:48 3.2 Data Classification 10:17 3.3 Data Protection 08:23 3.4 System Hardening and Baselining 12:56 3.5 Threats to Data Storage 06:13 3.6 Data Redundancy 06:07 3.7 Secure Data Disposal Module 4: Security Engineering and Architecture 04:27 4.1 Cryptography Agenda 14:30 4.2 Cryptography in History 11:00 4.3 Security Services Provided by Cryptography 14:02 4.4 Algorithm 08:56 4.5 Elements of Cryptography Part 1 09:55 4.6 Elements of Cryptography Part 2 11:01 4.7 Principles of Secure Design 15:31 4.8 Security Models Part 1 10:06 4.9 Security Models Part 2 09:06 4.10 Security Models Part 3 12:41 4.11 Security Models Part 4 10:46 4.12 System Architecture 08:22 4.13 Evaluation Criteria Part 1 11:12 4.14 Evaluation Criteria Part 2 Module 5: Communications and Network Security 08:52 5.1 Introduction to Communications and Network Security 13:15 5.2 The OSI Model Part 1 09:22 5.3 The OSI Model Part 2 07:39 5.4 The OSI Model Part 3 06:17 5.5 The OSI Model Part 4 11:17 5.6 The OSI Model Part 5 08:58 5.7 The OSI Model Network Devices 08:50 5.8 The OSI Model Collision Domains 10:38 5.9 The OSI Model Layer 3 Protocols 11:22 5.10 The OSI Model Layer 4 02:44 5.11 The OSI Model Layers 5 and 6 06:53 5.12 The OSI Model Layer 7 07:26 5.13 The OSI Model Firewalls Part 1 08:35 5.14 The OSI Model Firewalls Part 2 10:12 5.15 The OSI Model Firewalls Part 3 08:43 5.16 The OSI Model NAT/PAT 02:13 5.17 Password Security 10:34 5.18 Area Networks: LAN, WAN and MAN 10:04 5.19 Remote Access 03:31 5.20 General Routing Encapsulation (GRE) 08:14 5.21 Wireless Security Part 1 05:43 5.22 Wireless Security Part 2 10:30 5.23 Wireless Security Part 3 Module 6: Identity and Access Management 10:48 6.1 Introduction to Identity and Access Management Part 1 10:54 6.2 Introduction to Identity and Access Management Part 2 04:21 6.3 Authentication Types Part 1: Something You Know 06:08 6.4 Authentication Types Part 2: Token Devices 05:02 6.5 Authentication Types Part 3: Memory Cards 03:55 6.6 Authentication Types Part 4: Something You Are 03:31 6.7 Strong Authentication 05:53 6.8 Social Media and the Introduction to Kerberos 07:59 6.9 Kerberos Components 11:29 6.10 The Kerberos Carnival Part 1 09:56 6.11 The Kerberos Carnival Part 2 Module 7: Security Assessment and Testing 01:55 7.1 The 6 Security Assessments and Testing Objectives 07:42 7.2 Vulnerability Assessments and Penetration Testing 05:57 7.3 Vulnerability Scanning 04:30 7.4 Testing Guidelines 07:43 7.5 Rules of Engagement Part 1 08:49 7.6 Rules of Engagement Part 2 11:16 7.7 Protocol Analyzers (Sniffers) and Privacy 09:55 7.8 IDS Part 1 10:31 7.9 IDS Part 2 10:42 7.10 IDS Part 3 Module 8: Security Operations 10:36 8.1 Security Incident Response 07:37 8.2 The Forensics Investigation Process Part 1 07:20 8.3 The Forensic Investigation Process Part 2 08:38 8.4 Evidence Types 10:02 8.5 Fault Management 08:36 8.6 Backups Module 9: Software Development Security 07:44 9.1 Introduction to Software Development Security 04:37 9.2 Secure Design 03:25 9.3 Requirements to Writing Secure Code 06:11 9.4 Software Development Methodologies 03:24 9.5 Cloud Application Security 10:35 9.6 OWASP (Open Web Application Security Project) 09:31 9.7 Organizational Normative Framework 07:57 9.8 Object Oriented Programming 02:55 9.9 Database Introduction Part 1 12:20 9.10 Database Introduction Part 2 07:43 9.11 Database Introduction Part 3 04:13 9.12 Database Introduction Part 4 07:46 9.13 Database Introduction Part 5 07:10 9.14 Database Introduction Part 6 (Conclusion)

Terms & Conditions

The images represent actual product though color of the image and product may slightly differ.