Integrity Training – Certified Information Systems Security Professional (CISSP)
**More information:
Get Integrity Training – Certified Information Systems Security Professional (CISSP) at Salaedu.com
Description
The CISSP Certified Information Systems Security Professional Certification certification training package covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge.
The new eight domains are:
- Security and Risk Management
- Asset Security
- Security Engineering
- Communications and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
The CISSP Certification is administered by the International Information Systems Security Certification Consortium or (ISC)². (ISC)² promotes the CISSP exam as an aid to evaluating personnel performing information security functions. Candidates for this exam are typically network security professionals and system administrators with at least four years of direct work experience in two or more of the ten test domains. As the first ANSI ISO accredited credential in the field of information security, the Certified Information Systems Security Professional (CISSP) certification provides information security professionals with not only an objective measure of competence, but a globally recognized standard of achievement.
Course Curriculum
Course Introduction
StartIntroduction to the course (0:18)
The CISSP Exam
StartIntroduction (0:15)
StartCISSP Certification Goals (1:25)
StartSecurity Professional Certification Value (1:25)
StartExam Common Body of Knowledge (0:49)
StartBecoming a CISSP (2:25)
Cryptography
StartIntroduction (0:18)
StartCryptography Concepts Part1 (6:19)
StartCryptography Concepts Part2 (2:53)
StartHistory of Cryptography (6:47)
StartCryptosystem Features (2:13)
StartEncryption Systems Part1 (6:23)
StartEncryption Systems Part2 (3:04)
StartSubstitution Ciphers (1:58)
StartSymmetric Algorithms Part1 (7:19)
StartSymmetric Algorithms Part2 (5:11)
StartAsymmetric Algorithms (5:06)
StartMessage Integrity (7:52)
StartDigital Signatures (1:28)
StartPublic Key Infrastructure Part1 (6:19)
StartPublic Key Infrastructure Part2 (2:04)
StartTrusted Platform Module (2:41)
StartEncryption Communication Levels (1:56)
StartE-Mail Security (1:47)
StartInternet Security (5:35)
StartCryptography Attacks (5:48)
Physical (Environmental) Security
StartIntroduction (0:18)
StartThreat Mitigation Techniques (1:04)
StartGeographical-Man Made and Political Threats (6:09)
StartSite and Facility Design (4:35)
StartPerimeter Security (5:27)
StartBuilding and Internal Security (4:18)
StartSecure Data Centers and Fire Detection Systems (3:53)
StartTypes of Power Issues (3:36)
StartHVAC Guidelines (0:54)
StartEquipment Security and Personal Security (1:42)
Security Architecture and Design
StartIntroduction (0:23)
StartSecurity Model Concepts (0:57)
StartSystem Architecture (3:43)
StartComputing Platforms (1:56)
StartVirtual Computing and Security Services (2:27)
StartSystem Components (3:54)
StartMemory Concepts (4:08)
StartEnforcing Process Security and Multitasking (2:08)
StartSystem Security Architecture (5:05)
StartSecurity Models and Modes Part1 (4:58)
StartSecurity Models and Modes Part2 (4:28)
StartSystem Evaluation and Assurance Levels (3:36)
StartCertification and Accreditation (1:28)
StartSecurity Architecture Threats (2:47)
StartDatabase Security and Distributed Systems Security (3:40)
Access Control
StartIntroduction (0:19)
StartAccess Control Concepts (2:41)
StartIdentification and Authentication (2:30)
StartPassword Types and Management (4:39)
StartOwnership-Character-Physiological-Behavioral Factors (4:10)
StartBiometric Considerations (3:08)
StartAuthorization Concepts Part1 (3:28)
StartAuthorization Concepts Part2 (3:59)
StartUser Accountability (3:10)
StartVulnerability Assessment (0:49)
StartPenetration Testing and Threat Modeling (3:36)
StartAccess Control Categories-Types-Models and Administration (6:38)
StartProvisioning Life Cycle and Access Control Monitoring (3:48)
StartAccess Control Threats (5:12)
Software Development Security
StartIntroduction (0:21)
StartSystem Development Life Cycle (1:23)
StartSoftware Testing and Validation (1:48)
StartSoftware Development Security Best Practices (0:57)
StartSoftware Development Methods (6:54)
StartProgramming Languages (5:02)
StartDatabase Architecture and Models (1:28)
StartDatabase Interface Languages (0:52)
StartData Warehouse-Mining and Threats (1:05)
StartDatabase and Application Access Control (1:49)
StartMonitoring for Problems (1:28)
StartSoftware Threats and Security (6:45)
Information Security Governance and Risk Management
StartIntroduction (0:14)
StartPrinciples and Terms (3:47)
StartSecurity Frameworks & Methodologies Part1 (5:37)
StartSecurity Frameworks & Methodologies Part2 (5:15)
StartRisk Assessment (1:51)
StartAsset Values-Vulnerabilities and Threats (2:20)
StartQuantitative Risk Analysis (5:59)
StartSafeguard Selection (2:37)
StartRisk Management (4:39)
StartSecurity Governance Components (1:51)
StartSecurity Policies (4:21)
StartClassification Life Cycle (2:20)
StartResponsibilities and Roles (2:11)
StartPersonnel Security (1:44)
StartSecurity Awareness Training (2:27)
Telecommunications and Network Security
StartIntroduction (0:16)
StartOSI and TCIP Models Part1 (7:11)
StartOSI and TCIP Models Part2 (1:52)
StartIP Addressing (2:53)
StartTransmission Methods (3:10)
StartTypes of Cabling (2:55)
StartNetwork Topologies (6:19)
StartNetwork Protocols and Services (3:59)
StartNetwork Routing and Devices (7:22)
StartNetwork Connection Types Part1 (4:01)
StartNetwork Connection Types Part2 (4:40)
StartNetwork Authentication (2:47)
StartWireless Technologies (2:29)
StartWLAN Security Methods (1:54)
StartNetwork Threats and Cabling Behaviors (6:02)
Operation Security
StartIntroduction (0:16)
StartOperation Security Concepts (1:48)
StartProtecting Tangible and Intangible Assets (1:28)
StartAsset and Media Management (2:55)
StartStorage Options (2:05)
StartNetwork and Resource Management (0:50)
StartIncident Response and Change Management (1:12)
StartPatch Management-Audit and Review (0:44)
StartThreats and Preventative Measures (0:53)
StartTrusted Paths-Trusted Recovery and System Hardening (1:03)
StartMonitoring and Reporting (1:00)
Business Continuity and Disaster Recovery
StartIntroduction (0:17)
StartBusiness Continuity and Disaster Recovery Concepts Part1 (6:02)
StartBusiness Continuity and Disaster Recovery Concepts Part2 (2:04)
StartBIA Development (6:32)
StartBusiness Continuity Planning (2:26)
StartPreventive Controls (2:54)
StartRecovery Strategies Part1 (7:22)
StartRecovery Strategies Part2 (6:13)
StartData Backup Types (5:14)
StartData Recovery Terms (3:38)
StartCritical Teams and Duties (2:12)
StartBCP Testing (2:48)
Legal, Regulations and Investigations and Compliance
StartIntroduction (0:16)
StartDigital Crime (2:31)
StartComputer Crime Concepts (2:45)
StartMajor Legal Systems (3:15)
StartIntellectual Property Law (3:47)
StartPrivacy Part1 (4:39)
StartPrivacy Part2 (7:20)
StartLiability (3:17)
StartIncident Response (3:58)
StartForensic and Digital Investigations Part1 (5:53)
StartForensic and Digital Investigations Part2 (2:56)
StartEvidence Part1 (6:06)
StartEvidence Part2 (1:26)
StartSecurity Professional Ethics (4:04)
StartCourse Outro (0:07)
Forex Trading – Foreign Exchange Course
Want to learn about Forex?
Foreign exchange, or forex, is the conversion of one country’s currency into another.
In a free economy, a country’s currency is valued according to the laws of supply and demand.
In other words, a currency’s value can be pegged to another country’s currency, such as the U.S. dollar, or even to a basket of currencies.
A country’s currency value may also be set by the country’s government.
However, most countries float their currencies freely against those of other countries, which keeps them in constant fluctuation.
king –
We encourage you to check Content Proof carefully before paying.“Excepted” these contents: “Online coaching, Software, Facebook group, Skype and Email support from Author.”If you have enough money and feel good. We encourage you to buy this product from the original Author to get full other “Excepted” contents from them.Thank you!