Course curriculum
- 
                
- 
                        
                          
                        
                        
                        
Welcome to the Certification Preparation Program
 - 
                        
                          
                        
                        
                        
Cyber Security Board: Get the Support You Need
 
 - 
                        
                          
                        
                        
                        
 - 
                
- 
                        
                          
                        
                        
                        
The Need for Information Security
 - 
                        
                          
                        
                        
                        
Key Themes in Information Security
 - 
                        
                          
                        
                        
                        
Types of Attacks and Examples
 - 
                        
                          
                        
                        
                        
Information Security Certifications
 - 
                        
                          
                        
                        
                        
The CISSP Common Body of Knowledge Domains
 
 - 
                        
                          
                        
                        
                        
 - 
                
- 
                        
                          
                        
                        
                        
Domain 1: Security and Risk Management
 - 
                        
                          
                        
                        
                        
Video Introduction
 - 
                        
                          
                        
                        
                        
Key Themes of Security and Risk Management
 - 
                        
                          
                        
                        
                        
What Is Information Security Governance?
 - 
                        
                          
                        
                        
                        
Policies and Procedures
 - 
                        
                          
                        
                        
                        
Types of Security Controls
 - 
                        
                          
                        
                        
                        
Security Frameworks
 - 
                        
                          
                        
                        
                        
Ethics
 - 
                        
                          
                        
                        
                        
Information Security Law
 - 
                        
                          
                        
                        
                        
International Data Security and Privacy Law
 - 
                        
                          
                        
                        
                        
Risk Management
 - 
                        
                          
                        
                        
                        
Conducting a Risk Analysis
 - 
                        
                          
                        
                        
                        
Types of Risk Strategies
 - 
                        
                          
                        
                        
                        
Risk Management Frameworks
 - 
                        
                          
                        
                        
                        
Business Continuity (BC) and Disaster Recovery (DR) Strategy
 - 
                        
                          
                        
                        
                        
Business Impact Analysis
 - 
                        
                          
                        
                        
                        
Security Education, Training, and Awareness
 - 
                        
                          
                        
                        
                        
Flash Cards
 - 
                        
                          
                        
                        
                        
Scenario-Based Application Exercise
 
 - 
                        
                          
                        
                        
                        
 - 
                
- 
                        
                          
                        
                        
                        
Domain 2: Asset Security
 - 
                        
                          
                        
                        
                        
Video Introduction
 - 
                        
                          
                        
                        
                        
Key Themes of Asset Security
 - 
                        
                          
                        
                        
                        
Information Life Cycle
 - 
                        
                          
                        
                        
                        
Data Ownership and Responsibility
 - 
                        
                          
                        
                        
                        
Data Governance
 - 
                        
                          
                        
                        
                        
Information and Data Classification
 - 
                        
                          
                        
                        
                        
Data Security and Media Controls
 - 
                        
                          
                        
                        
                        
Preventing Data Leakage
 - 
                        
                          
                        
                        
                        
Selecting a DLP Control
 - 
                        
                          
                        
                        
                        
Data Retention
 - 
                        
                          
                        
                        
                        
The Privacy Question
 - 
                        
                          
                        
                        
                        
Flash Cards
 - 
                        
                          
                        
                        
                        
Scenario-Based Application Exercise
 
 - 
                        
                          
                        
                        
                        
 - 
                
- 
                        
                          
                        
                        
                        
Domain 3: Security Architecture and Engineering
 - 
                        
                          
                        
                        
                        
Video Introduction
 - 
                        
                          
                        
                        
                        
Key Concepts of Security Architecture and Engineering
 - 
                        
                          
                        
                        
                        
System and Computer Architecture
 - 
                        
                          
                        
                        
                        
The CPU
 - 
                        
                          
                        
                        
                        
Memory
 - 
                        
                          
                        
                        
                        
Secondary Memory
 - 
                        
                          
                        
                        
                        
Memory-Based Attacks
 - 
                        
                          
                        
                        
                        
Operating Systems
 - 
                        
                          
                        
                        
                        
System Security Architecture
 - 
                        
                          
                        
                        
                        
Security Models
 - 
                        
                          
                        
                        
                        
System Assurance Evaluation
 - 
                        
                          
                        
                        
                        
Open vs. Closed Systems
 - 
                        
                          
                        
                        
                        
Distributed Systems
 - 
                        
                          
                        
                        
                        
What is Cloud Computing?
 - 
                        
                          
                        
                        
                        
Defining Cloud Environments
 - 
                        
                          
                        
                        
                        
The Cloud Reference Architecture
 - 
                        
                          
                        
                        
                        
Virtualization
 - 
                        
                          
                        
                        
                        
Cryptography
 - 
                        
                          
                        
                        
                        
Information Security Issues Specific to Cloud Computing
 - 
                        
                          
                        
                        
                        
Common Threats in Cloud Computing
 - 
                        
                          
                        
                        
                        
Trusted Cloud Services
 - 
                        
                          
                        
                        
                        
Introduction to Cryptography
 - 
                        
                          
                        
                        
                        
Cryptography Terms and Concepts
 - 
                        
                          
                        
                        
                        
A Brief History of Cryptography
 - 
                        
                          
                        
                        
                        
Types of Ciphers
 - 
                        
                          
                        
                        
                        
Link Encryption and End-to-End Encryption
 - 
                        
                          
                        
                        
                        
Symmetric Key Cryptography
 - 
                        
                          
                        
                        
                        
Block Cipher Operational Modes
 - 
                        
                          
                        
                        
                        
Asymmetric Cryptography
 - 
                        
                          
                        
                        
                        
Attacks on Cryptosystems
 - 
                        
                          
                        
                        
                        
Ensuring Message Integrity
 - 
                        
                          
                        
                        
                        
Authentication and Digital Signatures
 - 
                        
                          
                        
                        
                        
Public Key Infrastructure
 - 
                        
                          
                        
                        
                        
Key Management
 - 
                        
                          
                        
                        
                        
Physical and Environmental Security Threats
 - 
                        
                          
                        
                        
                        
Electrical Problems and Equipment Failure
 - 
                        
                          
                        
                        
                        
Site and Facility Design
 - 
                        
                          
                        
                        
                        
Fire Prevention, Detection, and Suppression
 - 
                        
                          
                        
                        
                        
Climate Control
 - 
                        
                          
                        
                        
                        
Good Physical Security Habits
 - 
                        
                          
                        
                        
                        
Flash Cards
 - 
                        
                          
                        
                        
                        
Scenario-Based Application Exercise
 
 - 
                        
                          
                        
                        
                        
 - 
                
- 
                        
                          
                        
                        
                        
Domain 4: Communication and Network Security
 - 
                        
                          
                        
                        
                        
Video Introduction
 - 
                        
                          
                        
                        
                        
Key Themes of Communication & Network Security
 - 
                        
                          
                        
                        
                        
Types of Networks
 - 
                        
                          
                        
                        
                        
Telecommunications & WAN Technologies
 - 
                        
                          
                        
                        
                        
Types of Transmissions
 - 
                        
                          
                        
                        
                        
Types of Cables
 - 
                        
                          
                        
                        
                        
The OSI Model
 - 
                        
                          
                        
                        
                        
The TCP/IP Model
 - 
                        
                          
                        
                        
                        
IPv4 and IPv6
 - 
                        
                          
                        
                        
                        
Network Protocols
 - 
                        
                          
                        
                        
                        
Routing Protocols
 - 
                        
                          
                        
                        
                        
Data Link Protocols
 - 
                        
                          
                        
                        
                        
Network Devices
 - 
                        
                          
                        
                        
                        
Forwarding Tables and Gateways
 - 
                        
                          
                        
                        
                        
Firewalls
 - 
                        
                          
                        
                        
                        
Firewall Attacks
 - 
                        
                          
                        
                        
                        
Additional Solutions & Concerns
 - 
                        
                          
                        
                        
                        
Firewall Architectures
 - 
                        
                          
                        
                        
                        
Wireless Networking
 - 
                        
                          
                        
                        
                        
Link Encryption and End-to-End Encryption
 - 
                        
                          
                        
                        
                        
Remote Access and VPNs
 - 
                        
                          
                        
                        
                        
Flash Cards
 - 
                        
                          
                        
                        
                        
Scenario-Based Application Exercise
 
 - 
                        
                          
                        
                        
                        
 
  About this course
- $2,000.00
 - 201 lessons