Curriculum For This Course
Course Intro. and INFORMATION SECURITY GOALS4 Lectures Time 00:12:56
Security Governance4 Lectures Time 00:14:10
Compliance and Ethics5 Lectures Time 00:16:40
Security Policy2 Lectures Time 00:08:29
Business Continuity Planning3 Lectures Time 00:10:30
Risk Management5 Lectures Time 00:20:43
Data Security4 Lectures Time 00:16:24
Data Security Controls3 Lectures Time 00:11:05
Domain32 Lectures Time 02:39:33
Video tutorials list
Course Intro. and INFORMATION SECURITY GOALS
Video Name Time 1. Lecture 1 - Information Security Goals 3:29 2. Lecture 2 - Hashing 3:14 3. Lecture 3 - Digital Signatures and Digital Certificates 2:57 4. Lecture 4 - Availability 3:16
Video Name Time 1. Lecture 1 - Security Governance 3:35 2. Lecture 2 - Organizational Processes 3:30 3. Lecture 3 - Security Roles and Responsibilities 2:51 4. Lecture 4 - Control Frameworks 4:14
Compliance and Ethics
Video Name Time 1. Lecture 1 - Compliance and Ethics 3:51 2. Lecture 2 - Industry Specific Laws 4:01 3. Lecture 3 - Compure Crimes 2:43 4. Lecture 4 - Software Licensing and Export Controls 3:54 5. Lecture 5 - Data Breaches and Ethics 2:11
Video Name Time 1. Lecture 1 - Security Policy 3:39 2. Lecture 2 - Common Policies and Key Principles 4:50
Business Continuity Planning
Video Name Time 1. Lecture 1 - Business Continuity Planning 2:55 2. Lecture 2 - Business Continuity Controls and Key Technical Concepts 4:30 3. Lecture 3 - RAID Technology 3:05
Video Name Time 1. Lecture 1 - Risk Management 4:39 2. Lecture 2 - Risk Assessment Techniques 2:58 3. Lecture 3 - Quantitative Risk Factors 5:31 4. Lecture 4 - Risk Management Strategies 3:14 5. Lecture 5 - Security Controls 4:21
Video Name Time 1. Lecture 1 : Data Security 4:15 2. Lecture 2 : Data Security Policies 3:54 3. Lecture 3 : Data Security Roles 3:24 4. Lecture 4 : Data Privacy 4:51
Data Security Controls
Video Name Time 1. Lecture 1 : Developing Security Baselines 3:59 2. Lecture 3 : Customizing Security Standards 3:18 3. Lecture 4 : Data Encryption 3:48
Video Name Time 1. Introduction 1:07 2. Secure Design Principles 7:34 3. Security Models 5:52 4. Security Requirements 8:52 5. Virtualization 7:17 6. Cloud Computing Models 5:54 7. Public Cloud Tiers 5:56 8. Memory Protection 6:23 9. Interface Protection 8:04 10. High Availability and Fault Tolerance 5:51 11. OWASP Top 10 3:19 12. SQL Injection Prevention 4:06 13. Cross-Site Scripting (XSS) Prevention 3:50 14. Cross-Site Request Forgery (XSRF) 2:40 15. Understanding Encryption 3:14 16. Symmetric and Asymmetric Encryption 6:34 17. Cryptography Goals 2:18 18. Codes and Ciphers 2:57 19. Key Lifecycle Management 10:25 20. Data Encryption Standard (DES) 3:35 21. Triple DES (3DES) 3:45 22. AES, Blowfish, and Twofish 8:21 23. RC4 3:04 24. RSA Cryptography 7:24 25. Elliptic-Curve and Quantum Cryptography 3:20 26. Key Exchange 3:20 27. Diffie-Hellman Key Exchange 8:24 28. Key Escrow 4:00 29. Trust Models 2:58 30. Public Key Infrastructure (PKI) and Digital Certificates 4:05 31. Hash Functions 2:52 32. Digital Signatures and Digital Certificates 2:12
CISSP: Certified Information Systems Security Professional Certification Training Video Course Intro
Certbolt provides top-notch exam prep CISSP: Certified Information Systems Security Professional certification training video course to prepare for the exam. Additionally, we have ISC CISSP exam dumps & practice test questions and answers to prepare and study. pass your next exam confidently with our CISSP: Certified Information Systems Security Professional certification video training course which has been written by ISC experts.
The Certified Information Systems Security Professional (CISSP) video course unravels all key aspects involved in a cybersecurity program. It points out the important security domains that you need to master as a cybersecurity professional. After completing this course, you are more than ready to pull off your CISSP certification exam as well as your security profession.
The CISSP video course serves as your training guide in learning the vital security domains. This course, in particular, goes into great detail to provide you with a thorough presentation of the important topics to nail your (ISC)2 assessment. It commences with an outline of information security goals, hashing, availability, along with digital signatures and certificates. Right after, there will be a more all-inclusive discussion of security governance, security policy, and compliance & ethics. It will also delve into areas such as business continuity planning, risk management, data security, and data security controls. In addition to these, thereâ€™s a particular video curriculum that expounds on the features of the security domain. At this point, you will understand further the security design principles, models, and requirements. Finally, it also strikes up your familiarity in Cloud Computing Models, Cryptography, Public Key Infrastructure, Encryption, High Availability, and so much more. Clearly, this training material aids you in mastering all eight CISSP cybersecurity domains.
Knowledge and skills students develop:
- Security policies & principles;
- Security compliance as well as ethics;
- Security governance alongside roles;
- Protection and prevention;
- Security evaluation in addition to testing;
- Business continuity planning;
- Risk management and its techniques;
- Data security & controls;
- Various cryptography features.
Requirements for this course:
- Individuals taking this video course must be adept in at least two of the eight CISSP CBK domains.
- As also required by (ISC)2, itâ€™s a must to have a paid and cumulative work experience for 5 years or more.
- Use the official CISSP exam outline while completing this course to keep track of the main topics.
- You should complete all provided lectures so there will be no knowledge gaps.
Examination paper design for the CISSP in English:
- 180 minutes of exam duration;
- 100-150 questions to be attended;
- Multiple-choice questions & advanced innovative items;
- Exam cost: $699.
Examination paper design for the CISSP in other languages like German, Korean, French, Brazilian, etc:
- The CISSP lasts for 360 minutes;
- 250 tasks to be solved;
- Multiple-choice questions & advanced innovative items;
- Exam cost: $699.
Audience to target:
- Candidates who want to earn one of the best cybersecurity certifications in the market;
- Individuals who want to be part of the premier cybersecurity organization, (ISC)2;
- Experienced specialists such as security managers, executives, and practitioners;
- Those who want to be experts in all security domains.
The CISSP video course ensures your readiness to take your (ISC)2 CISSP certification exam. That is why it details out not just the general security domains but also the key aspects of each area. Truly, this will impart you with a profound cybersecurity knowledge that you can apply to your exam and your technical role.
- Security Analyst;
- Security Auditor;
- Security Consultant;
- Security Architect;
- Security Manager;
- Security Systems Engineer;
- Network Architect;
- Chief Information Officer;
- Chief Information Security Officer;
- Director of Security;
- IT Manager.
Based on the PayScale record, CISSP certification holders have an annual salary of $113,939 or an average hourly rate of $47.83. More so, this amount could vary depending on your role in the company youâ€™re working for.
Certbolt's total training solution includes CISSP: Certified Information Systems Security Professional certification video training course, ISC CISSP practice test questions and answers & exam dumps which provide the complete exam prep resource and provide you with practice skills to pass the exam. CISSP: Certified Information Systems Security Professional certification video training course provides a structured approach easy to understand, structured approach which is divided into sections in order to study in shortest time possible.