Course curriculum
-
-
Welcome to the Certification Preparation Program
-
Cyber Security Board: Get the Support You Need
-
-
-
The Need for Information Security
-
Key Themes in Information Security
-
Types of Attacks and Examples
-
Information Security Certifications
-
The CISSP Common Body of Knowledge Domains
-
-
-
Domain 1: Security and Risk Management
-
Video Introduction
-
Key Themes of Security and Risk Management
-
What Is Information Security Governance?
-
Policies and Procedures
-
Types of Security Controls
-
Security Frameworks
-
Ethics
-
Information Security Law
-
International Data Security and Privacy Law
-
Risk Management
-
Conducting a Risk Analysis
-
Types of Risk Strategies
-
Risk Management Frameworks
-
Business Continuity (BC) and Disaster Recovery (DR) Strategy
-
Business Impact Analysis
-
Security Education, Training, and Awareness
-
Flash Cards
-
Scenario-Based Application Exercise
-
-
-
Domain 2: Asset Security
-
Video Introduction
-
Key Themes of Asset Security
-
Information Life Cycle
-
Data Ownership and Responsibility
-
Data Governance
-
Information and Data Classification
-
Data Security and Media Controls
-
Preventing Data Leakage
-
Selecting a DLP Control
-
Data Retention
-
The Privacy Question
-
Flash Cards
-
Scenario-Based Application Exercise
-
-
-
Domain 3: Security Architecture and Engineering
-
Video Introduction
-
Key Concepts of Security Architecture and Engineering
-
System and Computer Architecture
-
The CPU
-
Memory
-
Secondary Memory
-
Memory-Based Attacks
-
Operating Systems
-
System Security Architecture
-
Security Models
-
System Assurance Evaluation
-
Open vs. Closed Systems
-
Distributed Systems
-
What is Cloud Computing?
-
Defining Cloud Environments
-
The Cloud Reference Architecture
-
Virtualization
-
Cryptography
-
Information Security Issues Specific to Cloud Computing
-
Common Threats in Cloud Computing
-
Trusted Cloud Services
-
Introduction to Cryptography
-
Cryptography Terms and Concepts
-
A Brief History of Cryptography
-
Types of Ciphers
-
Link Encryption and End-to-End Encryption
-
Symmetric Key Cryptography
-
Block Cipher Operational Modes
-
Asymmetric Cryptography
-
Attacks on Cryptosystems
-
Ensuring Message Integrity
-
Authentication and Digital Signatures
-
Public Key Infrastructure
-
Key Management
-
Physical and Environmental Security Threats
-
Electrical Problems and Equipment Failure
-
Site and Facility Design
-
Fire Prevention, Detection, and Suppression
-
Climate Control
-
Good Physical Security Habits
-
Flash Cards
-
Scenario-Based Application Exercise
-
-
-
Domain 4: Communication and Network Security
-
Video Introduction
-
Key Themes of Communication & Network Security
-
Types of Networks
-
Telecommunications & WAN Technologies
-
Types of Transmissions
-
Types of Cables
-
The OSI Model
-
The TCP/IP Model
-
IPv4 and IPv6
-
Network Protocols
-
Routing Protocols
-
Data Link Protocols
-
Network Devices
-
Forwarding Tables and Gateways
-
Firewalls
-
Firewall Attacks
-
Additional Solutions & Concerns
-
Firewall Architectures
-
Wireless Networking
-
Link Encryption and End-to-End Encryption
-
Remote Access and VPNs
-
Flash Cards
-
Scenario-Based Application Exercise
-
.png)
About this course
- $2,000.00
- 201 lessons