Home > Store

CISSP (Video Course), 4th Edition

Online Video

Register your product to gain access to bonus material or receive a coupon.

Description

  • Copyright 2024
  • Edition: 4th
  • Online Video
  • ISBN-10: 0-13-532868-3
  • ISBN-13: 978-0-13-532868-2

32+ hours of video instruction

Get the edge you need to ace the CISSP exam!

 

  • Understand the objectives and topics of every CISSP exam domain
  • Enhance your test-taking skills with Deep Dive quizzes and 3-second challenges throughout.
  • Get real-world perspective and skills through Security-in-Action case studies offered in every lesson.

The CISSP, 4th Edition video course is your complete study tool to successfully prepare for the latest version of the CISSP exam. This engaging video course, with 32+ hours of personal training from cybersecurity-recognized leader Sari Greene, explores every exam objective and provides deep-dive training on the most challenging and difficult to understand topics in the exam. This course was built to fully explore each exam domain and objective.

The lessons include full concept discussions and explanation, 3-second challenges so you can test your skills as you work through the course, and Security in Action segments, which are real-world security application case studies so you can apply your knowledge to your work. Also included are deep dive quizzes throughout so you can explore practice questions with the author and learn techniques for best approaching and answering questions on the exam.

 

Related Learning:

Skill Level:

  • Beginning to Intermediate

Course Requirement:

  • Experience in two or more of the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK) is helpful.

Sample Content

Table of Contents

Module 1:       Domain 1 Security and Risk Management

Lesson 1:         Understand, Adhere to, and Promote Professional Ethics

Lesson 2:         Understand and Apply Security Concepts

Lesson 3:         Evaluate, Apply, and Sustain Security Governance Principles

Lesson 4:         Understand Legal, Regulatory, and Compliance Issues that Pertain to Information Security in a Holistic Context

Lesson 5:         Understand Requirements for Investigation Types

Lesson 6:         Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines

Lesson 7:         Identify, Analyze, Assess, Prioritize, and Implement Business Continuity (BC) Requirements

Lesson 8:         Contribute to and Enforce Personnel Security Policies and Procedures

Lesson 9:         Understand and Apply Risk Management Concepts

Lesson 10:      Understand and Apply Threat Modeling Concepts and Methodologies

Lesson 11:      Apply Supply Chain Risk Management (SCRM) Concepts

Lesson 12:      Establish and Maintain a Security Awareness, Education, and Training Program

Module 2:       Domain 2 Asset Security

Lesson 13:      Identify and Classify Information and Assets

Lesson 14:      Establish Information and Asset Handling Requirements

Lesson 15:      Provision Information and Assets Securely

Lesson 16:      Manage Data Lifecycle

Lesson 17:      Ensure Appropriate Asset Retention

Lesson 18:      Determine Data Security Controls and Compliance Requirements

Module 3:       Domain 3 Security Architecture and Engineering

Lesson 19:      Research, Implement, and Manage Engineering Processes using Secure Design Principles

Lesson 20:      Understand the Fundamental Concepts of Security Models

Lesson 21:      Select Controls Based Upon Systems Security Requirements

Lesson 22:      Understand Security Capabilities of Information Systems

Lesson 23:      Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements

Lesson 24:      Select and Determine Cryptographic Solutions

Lesson 25:      Understand Methods of Cryptanalytic Attacks

Lesson 26:      Apply Security Principles to Site and Facility Design

Lesson 27:      Design Site and Facility Security Controls

Lesson 28:      Manage the Information System Lifecycle

Module 4:       Domain 4 Communication and Network Security

Lesson 29:      Apply Secure Design Principles in Network Architecture

Lesson 30:      Secure Network Components

Lesson 31:      Implement Secure Communication Channels According to Design

Module 5:       Domain 5 Identity and Access Management (IAM)

Lesson 32:      Control Physical and Logical Access to Assets

Lesson 33:      Design Identification and Authentication Strategy

Lesson 34:      Federated Identity with a Third-party Service

Lesson 35:      Implement and Manage Authorization Mechanisms

Lesson 36:      Manage the Identity and Access Provisioning Lifecycle

Lesson 37:      Implement Authentication Systems

Module 6:       Domain 6 Security Assessment and Testing

Lesson 38:      Design and Validate Assessment, Test, and Audit Strategies

Lesson 39:      Conduct Security Controls Testing

Lesson 40:      Collect Security Process Data

Lesson 41:      Analyze Test Output and Generate Report

Lesson 42:      Conduct or Facilitate Security Audits

Module 7:       Domain 7 Security Operations

Lesson 43:      Understand and Comply with Investigations

Lesson 44:      Conduct Logging and Monitoring Activities

Lesson 45:      Perform Configuration Management (CM)

Lesson 46:      Apply Foundational Security Operations Concepts

Lesson 47:      Apply Resource Protection

Lesson 48:      Conduct Incident Management

Lesson 49:      Operate and Maintain Detection and Preventative Measures

Lesson 50:      Implement and Support Patch and Vulnerability Management

Lesson 51:      Understand and Participate in Change Management Processes

Lesson 52:      Implement Recovery Strategies

Lesson 53:      Implement Disaster Recovery (DR) Processes

Lesson 54:      Test Disaster Recovery Plan (DRP)

Lesson 55:      Participate in Business Continuity (BC) Planning and Exercises

Lesson 56:      Implement and Manage Physical Security

Lesson 57:      Address Personnel Safety and Security Concerns

Module 8:       Domain 8 Software Development Security

Lesson 58:      Understand and Integrate Security in the Software Development Life Cycle (SDLC)

Lesson 59:      Identify and Apply Security Controls in Software Development Ecosystems

Lesson 60:      Assess the Effectiveness of Software Security

Lesson 61:      Assess the Security Impact of Acquired Software

Lesson 62:      Define and Apply Secure Coding Guidelines and Standards

Module 9:       Attaining Your CISSP Certification

Lesson 63:      The Examination

Lesson 64:      The Certification Process

Updates

Submit Errata

More Information

vceplus-200-125    | boson-200-125    | training-cissp    | actualtests-cissp    | techexams-cissp    | gratisexams-300-075    | pearsonitcertification-210-260    | examsboost-210-260    | examsforall-210-260    | dumps4free-210-260    | reddit-210-260    | cisexams-352-001    | itexamfox-352-001    | passguaranteed-352-001    | passeasily-352-001    | freeccnastudyguide-200-120    | gocertify-200-120    | passcerty-200-120    | certifyguide-70-980    | dumpscollection-70-980    | examcollection-70-534    | cbtnuggets-210-065    | examfiles-400-051    | passitdump-400-051    | pearsonitcertification-70-462    | anderseide-70-347    | thomas-70-533    | research-1V0-605    | topix-102-400    | certdepot-EX200    | pearsonit-640-916    | itproguru-70-533    | reddit-100-105    | channel9-70-346    | anderseide-70-346    | theiia-IIA-CIA-PART3    | certificationHP-hp0-s41    | pearsonitcertification-640-916    | anderMicrosoft-70-534    | cathMicrosoft-70-462    | examcollection-cca-500    | techexams-gcih    | mslearn-70-346    | measureup-70-486    | pass4sure-hp0-s41    | iiba-640-916    | itsecurity-sscp    | cbtnuggets-300-320    | blogged-70-486    | pass4sure-IIA-CIA-PART1    | cbtnuggets-100-101    | developerhandbook-70-486    | lpicisco-101    | mylearn-1V0-605    | tomsitpro-cism    | gnosis-101    | channel9Mic-70-534    | ipass-IIA-CIA-PART1    | forcerts-70-417    | tests-sy0-401    | ipasstheciaexam-IIA-CIA-PART3    | mostcisco-300-135    | buildazure-70-533    | cloudera-cca-500    | pdf4cert-2v0-621    | f5cisco-101    | gocertify-1z0-062    | quora-640-916    | micrcosoft-70-480    | brain2pass-70-417    | examcompass-sy0-401    | global-EX200    | iassc-ICGB    | vceplus-300-115    | quizlet-810-403    | cbtnuggets-70-697    | educationOracle-1Z0-434    | channel9-70-534    | officialcerts-400-051    | examsboost-IIA-CIA-PART1    | networktut-300-135    | teststarter-300-206    | pluralsight-70-486    | coding-70-486    | freeccna-100-101    | digitaltut-300-101    | iiba-CBAP    | virtuallymikebrown-640-916    | isaca-cism    | whizlabs-pmp    | techexams-70-980    | ciscopress-300-115    | techtarget-cism    | pearsonitcertification-300-070    | testking-2v0-621    | isacaNew-cism    | simplilearn-pmi-rmp    | simplilearn-pmp    | educationOracle-1z0-809    | education-1z0-809    | teachertube-1Z0-434    | villanovau-CBAP    | quora-300-206    | certifyguide-300-208    | cbtnuggets-100-105    | flydumps-70-417    | gratisexams-1V0-605    | ituonline-1z0-062    | techexams-cas-002    | simplilearn-70-534    | pluralsight-70-697    | theiia-IIA-CIA-PART1    | itexamtips-400-051    | pearsonitcertification-EX200    | pluralsight-70-480    | learn-hp0-s42    | giac-gpen    | mindhub-102-400    | coursesmsu-CBAP    | examsforall-2v0-621    | developerhandbook-70-487    | root-EX200    | coderanch-1z0-809    | getfreedumps-1z0-062    | comptia-cas-002    | quora-1z0-809    | boson-300-135    | killtest-2v0-621    | learncia-IIA-CIA-PART3    | computer-gcih    | universitycloudera-cca-500    | itexamrun-70-410    | certificationHPv2-hp0-s41    | certskills-100-105    | skipitnow-70-417    | gocertify-sy0-401    | prep4sure-70-417    | simplilearn-cisa    |
http://www.pmsas.pr.gov.br/wp-content/    | http://www.pmsas.pr.gov.br/wp-content/    |