Categories

There are currently no items in your shopping cart.

User Panel

Forgot your password?.

Oreilly Learning Path: Preparation for CISSP Certification, Domains 1-4

Video Introducing this tutorial


CISSP Course Introduction :
CISSP Course Introduction
CISSP Certification
CISSP Certification Requirements

Security Concepts :
Information Assets - Part 1
Information Assets - Part 2
The CIA Triad - Part 1
The CIA Triad - Part 2
Risk - Part 1
Risk - Part 2
Threats To Data
Threat Of Litigation
Countermeasures
Roles And Responsibilities

Security Governance :
Security Governance
The Security Program - Part 1
The Security Program - Part 2
Policies - Part 1
Policies - Part 2
Policies - Part 3
Control Frameworks
Compliance
Privacy And Legal Systems
Common Legal System And Export Controls
Trans-Border Information Flow
Intellectual Property Protection
DRM, IRM, And Licensing
Piracy And PCI DSS
Auditing, Reporting, And Metrics
Ethics
Cybercrime
Cybercrime Attackers
Prosecuting Cybercrime And Third Party Governance

Risk Management :
Risk Management Project Initiation
Risk Management Framework NIST SP800-37
Assets
Quantitative Qualitative Value
Asset Classification
Threat Analysis
ALE
Countermeasures - Part 1
Countermeasures - Part 2
Cost Justification
Dealing With Risk
Approvals
Completing The Risk Management Project
BCP And DRP
BCP, DRP, BIA, And MTD
RPO And RTO

Personnel Security :
Personnel Security
Separation Of Duties
Fraud Prevention And Detection
Monitoring And Enforcement
Pre-Hire Screening And Agreements
Onboarding
Account Provisioning
Monitoring And Termination
Termination

Security Awareness Training :
Security Awareness Training
Security Awareness Training Topics - Part 1
Security Awareness Training Topics - Part 2
Privileged Users
Enforcement

Wrap Up :
Wrap Up

Asset Security - Introduction :
Introduction

The Information Lifecycle :
Information Lifecycle
Information Assets
Location Of Information Assets
Access Control And CIA
CIA

Roles And Responsibilities :
Senior Management
Security Professional
Data Owner, System Custodian, And User
Third Party Service Providers

Data Classification :
Data Classification - Part 1
Data Classification - Part 2
The Data Classification Process
Inventory
Asset Value And Criteria
Protections
Labeling
Technologies
Monitoring And Training

Data Retention :
Data Retention - Part 1
Data Retention - Part 2

Security Controls :
ATP - Part 1
ATP - Part 2
ATP - Part 3
Baselines - Part 1
Baselines - Part 2
Baselines - Part 3
Configuration Management - Part 1
Configuration Management - Part 2
Configuration Management - Part 3
Data And Media Handling
Data Remanence
Secure Deletion - Part 1
Secure Deletion - Part 2

Wrap Up :
Conclusion

Security Engineering - Introduction :
Introduction

Security Models :
Introduction To Security Models
Bell-Lapadula
Biba
Applying The Models
Clark-Wilson
Clark-Wilson Brewer-Nash
TCB
TCSEC
ITSEC
Common Criteria

Computer Hardware Architecture :
Overview
CPU
Motherboard
Memory
Virtual Memory
Memory
TPM

Operating System Architecture :
Overview
Four Ring Architecture
Kernel Mode
Features
Processes Threads And Buffers
Process And Memory Management
Reference Monitor
System Self Protection
Hardened Server

Virtualization :
Virtualization Overview - Part 1
Virtualization Overview - Part 2

Information Systems And Application Architecture :
Architecture - Part 1
Architecture - Part 2
Architecture - Part 3
Cloud Computing - Part 1
Cloud Computing - Part 2
IoT And Industrial Controls
Application Architecture
Databases - Part 1
Databases - Part 2
Database Issues - Part 1
Database Issues - Part 2
Middleware
Mining Databases
Web Applications
Mobile Code Cookies
Mobile Code XSS
Mobile Code Java ActiveX
Web Applications Browser Email
Web Applications Input Validation
Web Applications OWASP

Introduction To Cryptography :
Cryptography - Part 1
Cryptography - Part 2
Cryptographic Algorithms
Strong Cryptography
Cryptographic Keys
Key Management

Hashing Algorithms :
Introduction To Hashing Algorithms
How Hashing Works
Hashing Algorithms
Strong Hashing Algorithms
Hashing Services

Symmetric Key Algorithms :
Symmetric Key Cryptography
Symmetric Key Services
Symmetric Key Algorithms
Cracking Symmetric Key Algorithms
Vigenere Symmetric Key Algorithm
Boolean Logic XOR
Kerckhoffs And Gilbert Vernam
Hebern, Enigma, Feistel, S And T
Block Ciphers And Stream Ciphers
DES And 3DES
AES, Block Ciphers And Variables
Block Cipher Modes - ECB And CBC
Block Cipher Modes - OFB And CFB
Block Cipher Modes - CTR
Message Authentication Code
MAC And HMAC
CBC-MAC And Symmetric Summary

Asymmetric Key Algorithms :
Asymmetric Key Cryptography
Asymmetric Key Services
Asymmetric Key Management
Key Distribution And Digital Signature
Digital Signature
Confidentiality And Digital Signature
Multiple Recipients
SSL And TLS
Asymmetric Key Algorithms - Diffie Hellman Merkle
RSA, ELGamal, ECC And DSS
Asymmetric Key Cryptography Review

Cryptography In Use :
Link End-To-End PKI
PKI - Part 1
PKI - Part 2
PGP And S/MIME
Set
VPN, SSL, TLS And Protocols

Attacks On Cryptography :
Introduction To Attacks On Cryptography
Brute Force, Dictionary, Hybrid And Rainbow
Plaintext, Ciphertext And Adaptive

Physical Security :
Introduction To Physical Security
Goals And Facility
Perimeter Defense And Access Control
Security Zones And Environment
Electrical Issues
Fire Safety
Fire Detectors
Fire Extinguishers And Sprinklers
Gas Suppressants And Fire Training

Conclusion :
Wrap Up

Introduction :
CISSP Introduction

The Open Systems Interconnection Model :
Introduction To The OSI Model
OSI Layers 7 And 6
OSI Layer 5
OSI Layer 4
OSI Layer 4 - TCP And UDP
OSI Layer 4 - Port Numbers
OSI Layer 3
OSI Layer 3 IPv4 Header And Addressing
OSI Layer 3 IPv4 Addressing
OSI Layer 3 IPv6 Addressing
OSI Layer 3 IPv6 IPconfig RIRs
OSI Layer 3 Routing Decision
OSI Layer 2 - Part 1
OSI Layer 2 - Part 2
OSI Layer 2 MAC Addresses And ARP
OSI Layer 2 ARP Cache Poisoning And Error Detection
OSI Layer 1 And IEEE 802

Transmission Media And Technologies :
Transmission Media And Technologies
Media And Fiber Optic Cable
Media Coax UTP STP
Media UTP STP
Media Wireless
Modulation And Encoding
Modulation Encoding And Multiplexing
Network Topologies
Network Types And Sizes
Transmission Types
Circuit Switching
Packet Switching
Media Access Polling
Media Access Token Passing
Media Access CSMA CA
Media Access CSMA CD

Network Infrastructures And Application Architecture :
Network Infrastructure And App Architecture
Mainframes
Endpoint Systems
Network Services
Segments Subnets And Domains - Part 1
Segments Subnets And Domains - Part 2
Layer 1 Devices
Layer 2 Devices - Part 1
Layer 2 Devices - Part 2
Layer 3 Devices - Introduction
Layer 3 Dynamic Routing Protocols
Firewalls - Generations 1 And 2
Firewalls - Generations 3, 4, And 5
Firewall Security
DHCP
Name Resolution Services
DNS - Part 1
DNS - Part 2
DNS - Part 3
Authentication Services
SAN And SDN
Network Access Control

Wireless Networking :
Wireless Networking - Part 1
Wireless Networking - Part 2
Wireless Security
Wireless Security - 802.11i
Wireless Security - Review
MIMO And Attacks On Wireless Networks
Cellular Networks

Protocols :
IGMP
ICMP
NAT And PAT
Telnet, SSH, FTP, And SNMP
Email Protocols
IM, HTTP, And HTTPS
File And Print And QoS
VPN, SSH, And PPTP
IPsec VPN
IPsec VPN - IKE, SA, SPI, And DH
IPsec VPN - AH, ESP, Transport Tunnel
VPN - L2TP, SSTP, SSL, TLS
SCADA DNP3 Ports

Network Technologies :
PAN And LAN
MAN
MAN, SONET, And WAN
WAN - ISDN, PBX, X.25, FR
WAN - ATM, MPLS, VOIP
WAN - VoIP Satellite

Attacks On Networks :
Untargeted And Targeted
Vectors And DoS
DoS And DDoS
APT
Info Theft And Cellular

Wrap Up :
Wrap Up

You Have Got Gift 25% OFF

Use this Coupon Code “J3JKN396