Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CISSP Certified Information Systems Security Professional 2024
Course Overview
Course Overview (8:59)
Security Risk and Management
Five Pillars of Information Security (7:30)
Security Concepts for Organizations (15:15)
Security Governance Principles (17:56)
Security Control Frameworks Foundation (5:06)
ISO and NIST Security Control Frameworks (9:01)
Other Security Control Frameworks (17:53)
Legal Systems (9:38)
United States Laws and Regulations (13:19)
International Laws and Regulations (6:59)
Legal, Regulatory, and Compliance Issues (16:27)
Investigation Types (12:02)
Compliance (21:06)
Security Documentation (17:56)
Personnel Policies and Ethics (20:35)
Security Awareness (11:11)
Business Continuity Concepts (12:54)
Business Impact Analysis (BIA) (12:37)
Business Continuity Process (12:53)
Risk Management Concepts (17:44)
Threat and Vulnerability Identification (18:10)
Risk Analysis (21:32)
Risk Response-Treatment (6:34)
Control Implementation (16:13)
Risk Reporting and Continuous Monitoring (8:17)
Risk Frameworks (14:30)
Threat Modeling (19:36)
Supply Chain Risk Management (13:18)
Asset Security
Asset Classification (16:54)
Data Classification (13:06)
Information and Asset Handling (17:31)
Provisioning Information and Assets (16:49)
Data Roles (15:12)
Data Lifecycle Phases (18:17)
Asset Retention (11:03)
Data States (12:56)
Scoping and Tailoring (7:20)
Standards Selection (14:51)
Data Protection Methods (9:51)
Security Architecture and Engineering
Using Secure Design Principles (24:35)
Security Model Basics (21:38)
Security Modes (9:14)
Security Model Types (17:58)
Bell-LePadula (16:59)
Biba (9:31)
Clark-Wilson (12:20)
Other Security Models (9:16)
Choosing Security Controls (15:04)
Memory Protection (16:11)
Trusted Platform Module (8:48)
Encryption and Decryption (21:33)
Client Vulnerabilities (18:29)
Server Vulnerabilities (26:57)
Database Vulnerabilities (16:46)
Cloud Vulnerabilities (25:02)
Industrial Control System Vulnerabilities (22:38)
IoT Embedded and Edge Computing Vulnerabilities (25:03)
Virtualization and Container Vulnerabilities (23:51)
Distributed Microservices and Serverless Vulnerabilities (21:33)
High Performance Computing Vulnerabilities (19:22)
Cryptography Basics (25:44)
PKI (20:21)
Digital Signatures (20:28)
Classic Cryptanalyic Attacks (22:58)
Side Channel Attacks (17:37)
Other Cryptanalytic Attacks (13:11)
Secure Site and Facility Design Basics (17:22)
Utilizing Natural Access Controls (12:25)
Planning for Physical Security (15:17)
Common Types of Facilities and Sites (18:33)
Facilities and Sites Security Controls (23:50)
Information System Life Cycle Management (17:43)
Communication and Network Security
Video, Voice and Collaboration Technologies (7:59)
OSI and TCP-IP Models (13:01)
Network Transmission Media (12:18)
Transport Architecture (20:00)
Multilayer and Converged Protocols (18:40)
Network Performance Metrics and Traffic Flows (16:16)
Data and Third-party Communications (12:04)
Endpoint Security (17:33)
Monitoring and Management Technologies (14:16)
IPv4 Addressing Protocol (13:42)
Remote Access Technologies (16:04)
Virtual Private Clouds (14:21)
Wireless Network Security (16:29)
Cellular and Satellite Communications (17:19)
Micro-segmentation (10:17)
Edge Networks and CDNs (11:41)
Wireless Network Architecture (16:33)
Operations of Infrastructure (21:22)
Software Defined Networking (11:30)
Secure Protocol Implementations (15:38)
Physical and Logical Network Segmentation (19:50)
IPv6 Addressing Protocol (15:09)
Network Access Control Systems (12:58)
Identity and Access Management (IAM)
Control Physical and Logical Access (9:57)
Type of Access Controls (21:39)
Groups and Roles (12:07)
AAA (11:20)
Session Management (7:46)
Registration and Proofing (8:13)
FIM (10:27)
Credential Management (10:15)
SSO and Just-in-TIme (11:50)
Role-Rule Based Access Control (11:16)
MAC-DAC (10:53)
Other Access Control Methods (6:12)
Access Policy Enforcement (6:44)
Account Access Review (9:33)
Provisioning-Deprovisioning (13:52)
Role Definition - Privilege Escalation (8:06)
Service Accounts Management (9:36)
OAuth-OIDC (8:59)
SAML-Kerberos (9:03)
RADIUS-TACACS+ (7:15)
Security Assessment Testing
Designing Security Tests (13:19)
Vulnerability Assessments (11:20)
Penetration Testing (13:41)
Other Common Tests (15:31)
Collecting Security Process Data (10:46)
Analyzing Test Output (6:31)
Conducting Security Audits (8:37)
Security Operations
Understand and Comply with Investigations (19:26)
Logging and Monitoring Activities (19:20)
Configuration Management (13:23)
Foundational Security Operations Concepts (13:47)
Apply Resource and Media Protection (20:28)
Conduct Incident Management (15:35)
Detection and Preventative Measures (21:18)
Implement Patch and Vulnerability Management (10:23)
Change Management Processes (10:04)
Implement Recovery Strategies (18:43)
Implement Disaster Recovery Processes (17:06)
Test Disaster Recovery Plan (10:49)
Business Continuity Planning (11:15)
Implement and Manage Physical Security (22:25)
Personnel Safety and Security (16:53)
Secure Software Development
Introducing software development security (22:06)
Choosing a software development methodology (11:36)
Considering process driven methodologies (21:03)
Considering agile based methodologies (23:44)
Integrating the capability maturity model in the SDLC (15:41)
Adopting SAMM Into your software development (10:16)
Improving product with an integrated product team (7:51)
Managing post-deployment product expectations (18:45)
Introducing security controls in software development (17:47)
Minimizing programming language risks in the sdlc (18:16)
Developing, deploying, and maintaining secure software (15:32)
Integrating software configuration management (13:11)
Incorporating application security testing (13:18)
Implementing auditing and logging of software changes (14:02)
Focusing on risk analysis and mitigation in the SDLC (16:09)
Evaluating COTS and third-party software security (16:09)
Evaluating managed service and open source software security (15:51)
Evaluating cloud services security (15:29)
Introducing coding languages and tools (21:11)
Identifying security flaws at source-code level (18:26)
Securing APIs (10:43)
Integrating sdn and sdsec (17:57)
Implement Disaster Recovery Processes
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock