Course curriculum

    1. Welcome to the Certification Preparation Program

    2. Cyber Security Board: Get the Support You Need

    1. The Need for Information Security

    2. Key Themes in Information Security

    3. Types of Attacks and Examples

    4. Information Security Certifications

    5. The CISSP Common Body of Knowledge Domains

    1. Domain 1: Security and Risk Management

    2. Video Introduction

    3. Key Themes of Security and Risk Management

    4. What Is Information Security Governance?

    5. Policies and Procedures

    6. Types of Security Controls

    7. Security Frameworks

    8. Ethics

    9. Information Security Law

    10. International Data Security and Privacy Law

    11. Risk Management

    12. Conducting a Risk Analysis

    13. Types of Risk Strategies

    14. Risk Management Frameworks

    15. Business Continuity (BC) and Disaster Recovery (DR) Strategy

    16. Business Impact Analysis

    17. Security Education, Training, and Awareness

    18. Flash Cards

    19. Scenario-Based Application Exercise

    1. Domain 2: Asset Security

    2. Video Introduction

    3. Key Themes of Asset Security

    4. Information Life Cycle

    5. Data Ownership and Responsibility

    6. Data Governance

    7. Information and Data Classification

    8. Data Security and Media Controls

    9. Preventing Data Leakage

    10. Selecting a DLP Control

    11. Data Retention

    12. The Privacy Question

    13. Flash Cards

    14. Scenario-Based Application Exercise

    1. Domain 3: Security Architecture and Engineering

    2. Video Introduction

    3. Key Concepts of Security Architecture and Engineering

    4. System and Computer Architecture

    5. The CPU

    6. Memory

    7. Secondary Memory

    8. Memory-Based Attacks

    9. Operating Systems

    10. System Security Architecture

    11. Security Models

    12. System Assurance Evaluation

    13. Open vs. Closed Systems

    14. Distributed Systems

    15. What is Cloud Computing?

    16. Defining Cloud Environments

    17. The Cloud Reference Architecture

    18. Virtualization

    19. Cryptography

    20. Information Security Issues Specific to Cloud Computing

    21. Common Threats in Cloud Computing

    22. Trusted Cloud Services

    23. Introduction to Cryptography

    24. Cryptography Terms and Concepts

    25. A Brief History of Cryptography

    26. Types of Ciphers

    27. Link Encryption and End-to-End Encryption

    28. Symmetric Key Cryptography

    29. Block Cipher Operational Modes

    30. Asymmetric Cryptography

    31. Attacks on Cryptosystems

    32. Ensuring Message Integrity

    33. Authentication and Digital Signatures

    34. Public Key Infrastructure

    35. Key Management

    36. Physical and Environmental Security Threats

    37. Electrical Problems and Equipment Failure

    38. Site and Facility Design

    39. Fire Prevention, Detection, and Suppression

    40. Climate Control

    41. Good Physical Security Habits

    42. Flash Cards

    43. Scenario-Based Application Exercise

    1. Domain 4: Communication and Network Security

    2. Video Introduction

    3. Key Themes of Communication & Network Security

    4. Types of Networks

    5. Telecommunications & WAN Technologies

    6. Types of Transmissions

    7. Types of Cables

    8. The OSI Model

    9. The TCP/IP Model

    10. IPv4 and IPv6

    11. Network Protocols

    12. Routing Protocols

    13. Data Link Protocols

    14. Network Devices

    15. Forwarding Tables and Gateways

    16. Firewalls

    17. Firewall Attacks

    18. Additional Solutions & Concerns

    19. Firewall Architectures

    20. Wireless Networking

    21. Link Encryption and End-to-End Encryption

    22. Remote Access and VPNs

    23. Flash Cards

    24. Scenario-Based Application Exercise

About this course

  • $2,000.00
  • 201 lessons

Discover your potential, starting today