Certified Information Systems Security Professional (CISSP)

Training Architect
course instructor image
Ermin Kreponic
A skilled Java and C++ developer, a security researcher and an individual with an affinity for problem solving and diving head first into the unknown. Independent and highly motivated individual, requiring minimal supervision, with a good perception of time in regard to project timetable. A strong proponent of open-source technologies and passionate Linux user with a great deal of experience in dealing with code deployment and overall system administration (DevOps). On the personal side note, as part of my previous experiences I have worked with all sorts of people from different time zones, and in the process I have come to regard the need to sleep as a sort of an urban myth. Cold cup of coffee from the night before over time became my best friend. But I have no regrets, because I do what I love doing.

Course Introduction

Getting Started

Course Introduction
00:08:44
About the Training Architect
00:01:43
Course Prerequisites
00:03:15
How to Get Help
00:04:32

Security and Risk Management

Security Governance

CIA Triad: Confidentiality
00:17:13
CIA Triad: Integrity
00:06:09
CIA Triad: Availability
00:06:59
Identification, Authentication, Authorization, Auditing, and Accounting
00:03:23
Threat Modeling
00:09:12
Security Policies
00:08:10
Risk Management: Part 1
00:08:59
Risk Management: Part 2
00:08:53
Risk Management: Part 3
00:06:40

Laws, Regulations, and Ethics

Laws, Standards and Regulations
00:14:18
Professional Ethics
00:04:14

Asset Security

Data and Asset Security

Classifying Data and Assets
00:08:44
Data Ownership
00:07:23
Storing and Disposing of Data
00:07:22

Security Architecture and Engineering

Cryptography

Introduction
00:05:13
Asymmetric and Symmetric Encryption
00:03:18
Ciphers
00:03:25
Public Key Infrastructure (PKI)
00:07:00
Hashing Algorithms
00:11:45
Cryptographic Attacks
00:09:05

Security Models and Design

Security Design Principles
00:12:23
Security Models
00:04:59
System Security Requirements
00:11:12
Physical Security: Part 1
00:10:45
Physical Security: Part 2
00:08:05

Threats and Attacks

Threats vs. Attacks
00:01:23
Motives
00:05:38
Attack Vectors
00:12:08
Threat Classification
00:08:45
Attack Classification
00:03:38

Communication and Network Security

Network Architecture

OSI vs. TCP/IP
00:07:09
TCP/IP
00:07:49
Wireless Access Point
00:13:52
Wireless Network Attacks
00:05:15
Firewalls
00:16:26
Network Hardware
00:07:02
Network Topologies
00:04:23

Network Traffic

Network Security Mechanisms
00:12:01
Email Security
00:11:17
VPN and Virtualization
00:08:00
Network Address Translation (NAT)
00:02:31
Wide-Area Networks (WANs)
00:04:49
Network Attack Mitigation
00:12:22

Identity and Access Management

Identity and Authentication

Identification and Authentication: Part 1
00:07:44
Identification and Authentication: Part 2
00:03:17
Identification and Authentication: Part 3
00:08:08
Access Control
00:04:53

Security Assessments and Testing

Security Assessments

Security Assessments and Audits
00:06:42
Penetration Testing
00:17:32
Vulnerability Assessments
00:12:26
Software Testing
00:08:13

Security Operations

Disaster Prevention, Response, and Recovery

Security Operations
00:19:35
Responding to Incidents
00:03:11
Log - Monitor - Audit
00:05:40

Security in Software Development

Software Development Security Principles

The Software Development Lifecycle (SDLC)
00:06:48
Data and Information Storage
00:19:38
Malicious Code: Part 1
00:09:43
Malicious Code: Part 2
00:06:27

Course Conclusion

Final Steps

How to Prepare for the Exam
00:13:36
What's Next After Certification?
00:02:22
Live-Environment-Challenge: Security Processes, Systems and Architecture Practice Exam
04:00:00

Details

Welcome to the Certified Information Systems Security Professional (CISSP) certification course! To obtain the CISSP certification, candidates need to pass an exam that consists of mostly multiple choice questions. The purpose of this course is to prepare you for the certification exam by introducing you to the concepts and terminology you need to know to pass. This course is designed to provide you with extensive knowledge, learning strategies, and instructor support along the way. In addition to the exam, you must meet a few other requirements in order to become a Certified Information Systems Security Professional. You must demonstrate that you follow the CISSP Code of Ethics, have a minimum of five years’ full-time paid work experience in the systems security field, and hold an IS or IT degree. With that in mind, before enrolling in this course, be sure that this is the right course for you. This course is designed for people who want to become certified security professionals and are looking for jobs that require the CISSP certification. Sometimes companies also require their systems security employees to obtain this certification. The prerequisites for this course are basic knowledge in networking and some knowledge of systems operations. Throughout this course, you will learn about the basics of asset security, cryptography, security and risk management, and various threats and attacks. This is a theoretical course — not a practical one — and we will cover many regulations, laws, policies, standards, and encryption protocols. With the flash cards, interactive diagrams, video lessons, and instructor support included with this course, you should be equipped with everything you need to successfully pass the exam and earn your CISSP certification.


Download the interactive diagram here: https://interactive.linuxacademy.com/diagrams/CISSPStudyBook.html


Study Guides

Interactive Diagram

https://interactive.linuxacademy.com/diagrams/CISSPStudyBook.html

Instructor Deck

Community

certificate ribbon icon

Earn a Certificate of Completion

When you complete this course, you’ll receive a certificate of completion as proof of your accomplishment.

Looking For Team Training?

Learn More