2015-06-15



<span><span><p><strong>Overview</strong></p><p>CISSP Complete Video Course is an engaging self-paced video training solution that provides learners with over 30 hours of personal, visual instruction from an expert trainer who has more than a decade of practical teaching experience. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of the CISSP exam as well as a deeper understanding of security, allowing you to master the key foundational principles for securing a network and managing risk.</p><p><strong>Description</strong></p><p>CISSP Complete Video Course contains over 30 hours of training with content divided into 9 lessons with 94 video sub-lessons. The videos consist of live trainer discussions, screencasts, animations, and live demos. The video lessons in this course review each exam objective so you can use this course as a complete study tool for taking the CISSP exam. Instruction throughout offers detailed explanations, demos, tips, and more.</p><p>Major sections are as follows:</p><p>Lesson 1: Security and Risk Management</p><p>Lesson 2: Asset Security</p><p>Lesson 3: Security Engineering</p><p>Lesson 4: Communications and Network Security</p><p>Lesson 5: Identity and Access Management</p><p>Lesson 6: Security Assessment and Testing</p><p>Lesson 7: Security Operations</p><p>Lesson 8: Software Development Security</p><p>Lesson 9: Preparing for the Exam</p><p><strong>About the Instructor</strong></p><p><strong>Sari Greene </strong>is an information security practitioner, author, and entrepreneur. She founded Sage Data Security in 2002 and has amassed thousands of hours in the field, working with a spectrum of technical, operational, and management personnel, as well as boards of directors, regulators, and service providers. Sari provided expert witness testimony in the groundbreaking PATCO v. Ocean National Bank case. From 2006 through 2010, she served as the managing director for the MEAPC, a coalition of 24 financial institutions that embrace a mission of preventing information theft and fraud through public education and awareness. Since 2010, she has served as the chair of the annual Cybercrime Symposium held in Portsmouth, New Hampshire. Sari’s first text was <em>Tools and Techniques for Securing Microsoft Networks</em>, commissioned by Microsoft to train its partner channel, followed soon after by the first edition of <em>Security Policies and Procedures: Principles and Practices</em>. She has published a number of articles and whitepapers related to information security and has been quoted in <em>The New York Times, Wall Street Journal</em>, CNN, and on CNBC. She speaks regularly at security conferences and workshops around the country and is a frequent guest lecturer. Sari has an MBA from the University of New Hampshire system and has earned an array of government and industry certifications and accreditations, including ISACA Certification in Risk and Information Systems Control (CRISC), ISACA Certification in Security Management (CISM), (ISC)2 Certification in Information Systems Security (CISSP), and Microsoft Certified Network Engineer (MCSE), and is certified by the National Security Agency to conduct NSA-IAM assessments for federal government agencies and contractors. You can contact Sari at sari@sarigreene.com or follow her on Twitter at @sari_greene.</p><p><strong>About Sneak Peek</strong></p><p>Sneak Peek videos are available to Safari Books Online subscribers offering early access to the very latest information on a given topic. Sneak Peek videos do not include post-production editing and may include further revisions before the video is complete.</p><p><strong>Skill Level</strong></p><p>Beginning to intermediate</p><p><strong>Who Should Take This Course</strong></p><p><strong>Primary audience:</strong> CISSP certification candidates</p><p><strong>Secondary audience:</strong> Anyone in an information security role looking to gain a practical understanding of computer security, including administrators, technicians, and network engineers who are responsible for securing IT infrastructure; personnel in management or sales roles who deal with information security topics; or government workers and contractors looking to work in security.</p><p><strong>Course Requirements</strong></p><p>Five years of experience in IT networking, network storage, or data center administration</p><p><strong>Table of Contents</strong></p><p><strong>Lesson 1: Security and Risk Management</strong></p><p><strong>Introduction to Lesson 1: Section 1</strong></p><p><strong>1.1</strong><strong>: </strong>Examining Information Security Fundamentals</p><p><strong>1.2:</strong> Applying Security Governance Concepts Part 1</p><p><strong>1.3:</strong> Applying Security Governance Concepts Part 2</p><p><strong>1.4:</strong> Designing and Implementing Governance Documents</p><p><strong>1.5: </strong>Understanding Legal Systems and Related Laws Part 1</p><p><strong>1.6: </strong>Understanding Legal Systems and Related Laws Part 2</p><p><strong>1.7: </strong>Understanding Regulatory and Contractual Requirements Part 1</p><p><strong>1.8: </strong>Understanding Regulatory and Contractual Requirements Part 2</p><p><strong>1.9: </strong>Implementing Personnel Security</p><p><strong>1.10+:</strong> Implementing Third-Party Security</p><p>Mid-Lesson Review</p><p>Mid-Lesson Exam Prep</p><p><strong>1.11: </strong>Understanding and Applying Threat Modeling</p><p><strong>1.12: </strong>Understanding & Implementing Risk Management Concepts</p><p><strong>1.13: </strong>Exploring Risk Assessment Methodologies</p><p><strong>1.14: </strong>Conducting a Quantitative Risk Assessment</p><p><strong>1.15: </strong>Conducting a Qualitative Risk Assessment</p><p><strong>1.16: </strong>Selecting Controls and Countermeasures</p><p><strong>1.17: </strong>Managing Supply Chain Risk</p><p><strong>1.18: </strong>Implementing Business Continuity Risk Management</p><p>Lesson Summary</p><p>Exam Prep</p><p><strong>Lesson 2: Asset Security</strong></p><p><strong>Introduction to Lesson 2</strong></p><p><strong>2.1: </strong>Classifying Assets</p><p><strong>2.2: </strong>Managing Assets</p><p><strong>2.3: </strong>Protecting Data Privacy</p><p><strong>2.4: </strong>Ensuring Appropriate Retention and Destruction</p><p><strong>2.5:</strong> Determining Data Security Controls</p><p>Summary</p><p>Exam Prep</p><p><strong>Lesson 3: Security Engineering</strong></p><p><strong>Introduction to Lesson 3</strong></p><p><strong>3.1:</strong> Implementing Secure Design Principles</p><p><strong>3.2: </strong>Understanding Security Models</p><p><strong>3.3: </strong>Selecting Controls Based on Systems Security Evaluation Models</p><p><strong>3.4:</strong> Recognizing Information Systems Security Capabilities</p><p><strong>3.5:</strong> Assessing and Mitigating Security Architecture Vulnerabilities</p><p><strong>3.6:</strong> Assessing and Mitigating Cloud Vulnerabilities</p><p><strong>3.7:</strong> Assessing and Mitigating Web Vulnerabilities</p><p><strong>3.8:</strong> Assessing and Mitigating Mobile and Remote Computing Vulnerabilities</p><p><strong>3.9:</strong> Introducing Cryptography</p><p><strong>3.10:</strong> Applying Cryptography Encryption Part 1</p><p><strong>3.11:</strong> Applying Cryptography Encryption Part 2</p><p><strong>3.12:</strong> Applying Cryptography Public Key Infrastructure</p><p><strong>3.13:</strong> Applying Cryptography Hashing and Digital Signature</p><p><strong>3.14:</strong> Applying Cryptography Cryptographic Protocols</p><p><strong>3.15:</strong> Applying Cryptography Crypto Attacks</p><p><strong>3.16:</strong> Applying Secure Principles to Site and Facility Design</p><p><strong>3.17:</strong> Securing Information Processing Facilities and Equipment</p><p>Summary</p><p>Exam Prep</p><p><strong>Lesson 4: Communications and Network Security</strong></p><p><strong>Introduction to Lesson 4</strong></p><p><strong>4.1:</strong> Reviewing OSI and TCP/IP Models</p><p><strong>4.2:</strong> Understanding IP Convergence and Extensibility</p><p><strong>4.3:</strong> Securing Wireless Networks</p><p><strong>4.4:</strong> Using Cryptography to Maintain Communication Security</p><p><strong>4.5:</strong> Securing Network Access</p><p><strong>4.6:</strong> Securing Data Transmissions</p><p><strong>4.7:</strong> Securing Multimedia Collaboration</p><p><strong>4.8:</strong> Securing Virtual Private Networks</p><p><strong>4.9:</strong> Securing Endpoints</p><p><strong>4.10~:</strong> Preventing and Mitigating Network Attacks</p><p>Summary</p><p>Exam Prep</p><p><strong>Lesson 5: Identity and Access Management</strong></p><p><strong>Introduction to Lesson 5</strong></p><p><strong>5.1:</strong> Understanding Access Control Fundamentals</p><p><strong>5.2:</strong> Examining Identification Schemas</p><p><strong>5.3:</strong> Identifying Authentication Options</p><p><strong>5.4:</strong> Understanding Authentication Systems</p><p><strong>5.5:</strong> Implementing Access and Authorization Criteria</p><p><strong>5.6:</strong> Implementing Access Control Models</p><p><strong>5.7:</strong> Implementing Access Control Techniques and Technologies</p><p><strong>5.8:</strong> Identifying and Accessing Provisioning</p><p>Summary</p><p>Exam Prep</p><p><strong>Lesson 6: Security Assessment and Testing</strong></p><p><strong>Introduction to Lesson 6</strong></p><p><strong>6.1:</strong> Testing and Examination (T&E) Overview</p><p><strong>6.2:</strong> Security Assessment Planning</p><p><strong>6.3:</strong> Conducting Security Examinations</p><p><strong>6.4:</strong> Security Assessment Testing Target Identificaton</p><p><strong>6.5:</strong> Security Assessment Testing Password Cracking</p><p><strong>6.6:</strong> Security Assessment Testing Penetration Testing</p><p><strong>6.7:</strong> Using Log Data As Predictors and Indicators of Compromise</p><p><strong>6.8:</strong> Implementing Information Security Continuous Monitoring (ISCM)</p><p><strong>6.9:</strong> Understanding Third-Party Audits and Examinations</p><p>Summary</p><p>Exam Prep</p><p><strong>Lesson 7: Security Operations</strong></p><p><strong>Introduction to Lesson 7</strong></p><p><strong>7.1:</strong> Managing Privileged Accounts</p><p><strong>7.2:</strong> Operating and Maintaining Firewalls and IDS/IPS</p><p><strong>7.3:</strong> Conducting Logging and Monitoring Activities</p><p><strong>7.4:</strong> Implementing and Supporting Vulnerability and Patch Management</p><p><strong>7.5:</strong> Implementing and Supporting Malware Management</p><p><strong>7.6:</strong> Implementing and Supporting Media Management</p><p><strong>7.7:</strong> Participating in the Configuration Management Process</p><p><strong>7.8:</strong> Managing System Resilience and Fault Tolerance</p><p><strong>7.9:</strong> Implementing Disaster Recovery Processes</p><p><strong>7.10~</strong>: Managing DR Plan Maintenance</p><p><strong>7.11:</strong> Understanding and Supporting Investigations</p><p><strong>7.12:</strong> Understanding Digital Forensics</p><p><strong>7.13:</strong> Supporting Incident Management</p><p><strong>7.14:</strong> Securing People and Places</p><p>Summary</p><p>Exam Prep</p><p><strong>Lesson 8: Software Development Security</strong></p><p><strong>Introduction to Lesson 8</strong></p><p><strong>8.1:</strong> Managing the Software Development Cycle</p><p><strong>8.2:</strong> Understanding Software Development Approaches, Models, and Tools</p><p><strong>8.3:</strong> Understanding Source Code Security Issues</p><p><strong>8.4:</strong> Managing Database Security</p><p><strong>8.5:</strong> Managing Mobile Code and Malware</p><p><strong>8.6:</strong> Assessing the Security Impact of Acquired Software</p><p>Summary</p><p>Exam Prep</p><p><strong>Lesson 9: Preparing for the Exam</strong></p><p><strong>Introduction to Lesson 9</strong></p><p><strong>9.1:</strong> Preparing for the Exam</p><p><strong>9.2:</strong> Security and Risk Management Exam Prep</p><p><strong>9.3:</strong> Asset Security Exam Prep</p><p><strong>9.4:</strong> Security Engineering Exam Prep</p><p><strong>9.5:</strong> Communications and Network Exam Prep</p><p><strong>9.6:</strong> Identity and Access Management Exam Prep</p><p><strong>9.7:</strong> Security Assessment and Testing Exam Prep</p><p><strong>9.8:</strong> Security Operations Exam Prep</p><p><strong>9.9:</strong> Software Development Security Test Prep</p><p><strong>About LiveLessons Video Training</strong></p><p>LiveLessons Video Training series publishes hundreds of hands-on, expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. This professional and personal technology video series features world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, IBM Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include: IT Certification, Programming, Web Development, Mobile Development, Home and Office Technologies, Business and Management, and more. View all LiveLessons on InformIT at <a href="http://www.pearsonitcertification.com/livelessons" target="_blank">http://www.pearsonitcertification.com/livelessons</a>.</p></span></span>

Show more