Für diesen Artikel ist leider kein Bild verfügbar.

CISSP Complete Video Course and Practice Test

Sari Greene (Autor)

2020 | 2nd edition
Pearson IT Certification (Hersteller)
978-0-13-518049-5 (ISBN)
459,95 inkl. MwSt
  • Nur im Set erhältlich (Einzelband nicht lieferbar)
  • Artikel merken
Almost 26 hours of deep-dive training covering every objective in the latest (ISC)2 CISSP exam.


Overview
CISSP Complete Video Course is an engaging self-paced video training solution that provides learners with almost 26 hours of personal training from 2017 Cybersecurity Educator of the Year, Sari Greene. With each lesson, Sari fully explains the topics associated with each CISSP exam objective. To reinforce what you've learned, each lesson concludes with a 3Sec Challenge to test your knowledge and a Security-in-Action case study to demonstrate how the lesson concepts apply to real-life scenarios. This combination of teaching, testing, and application will ensure that you are prepared to take the CISSP exam.


Description
CISSP Complete Video Course contains almost 26 hours of training with content divided into 9 modules with 65 exam objective-targeted lessons and 106 related sublessons. This title covers every objective in the newly updated (ISC)2 CISSP exam and includes screencast teaching, quizzes, and applied real-world scenarios. Each module also provides one or more 10-question quizzes to solidify your understanding of the content that is covered for each CISSP domain.


The video lessons in this course review each exam objective, so you can use it as a complete study tool for taking the CISSP exam.

This course also includes
* 17 interactive exercises, with one or more aligned to each CISSP domain
* Quizzes for each CISSP domain to help you learn and retain knowledge
* A 200-question practice exam that runs in the Pearson test prep software


Major sections are as follows:
* Security and Risk Management
* Asset Security
* Security Architecture and Engineering
* Communication and Network Security
* Identity and Access Management (IAM)
* Security Assessment and Testing
* Security Operations
* Software Development Security
* Becoming a CISSP


Skill Level
Beginning


What You Will Learn
* Every objective on the (ISC)2 CISSP exam
* Tips to prepare for and pass the exam
* Real-world cybersecurity skills


Who Should Take This Course
Primary audience: Anyone preparing for the (ISC)2 CISSP examination.
Secondary audience: Anyone interested in pursuing a career in cybersecurity.


About LiveLessons Video Training
Pearson's LiveLessons video training series publishes the industry's leading video tutorials for IT pros, developers, sys admins, devops, network engineers, and certification candidates. LiveLessons feature the highest-quality professional skills training led by recognized author instructors published by Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT certification, programming, development, networking, software skills for the home, office, and business, and more. Your purchase provides you with lifetime online access to the content.

http://www.pearsonitcertification.com/livelessons

Sari Greene is an information security practitioner, author, and entrepreneur. In 2003, Sari founded one of the first dedicated cybersecurity consultancies. She is a recognized leader in the field of cybersecurity and has amassed thousands of hours in the field working with a spectrum of technical, operational, compliance, and management personnel as well as boards of directors, regulators, service providers, and law enforcement agencies. Sari's first book was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel, followed soon after by the first edition of Security Policies and Procedures: Principles and Practices. The second edition of Security Program and Policies: Principles and Practices is currently being used in undergraduate and graduate programs nationwide. She is also the author and presenter of the best-selling CompTIA Security+ (SY0-501) Complete Video Course and CISA Complete Video Course. Sari has published a number of articles related to cybersecurity; has been quoted in The New York Times, in The Wall Street Journal, on CNN, and on CNBC; speaks regularly at cybersecurity, legal, financial, and healthcare conferences and workshops around the country; and is a frequent guest lecturer. Sari serves on the Bangor Savings Bank Board of Directors and is chair of the Enterprise Risk Management Committee. She provided expert witness testimony in the groundbreaking PATCO v. Ocean National Bank case, represents industry on the Massachusetts Bankers Association Cybersecurity Task Force, and is a member of the American Bankers Association cybersecurity faculty. Sari earned her MBA from the University of New Hampshire system. She holds multiple industry accreditations, including CISSP-ISSMP, CRISC, CISM, CISA, MCSE, and NSA/IAM. She is also certified in Offshore Emergency Medicine. In 2017, she was awarded Cybersecurity Educator of the Year. Learn more at sarigreene.com.

Introduction
Module 1 Domain 1 Security and Risk Management
Lesson 1: Understand and Apply Concepts of Confidentiality, Integrity and Availability
Lesson 2: Evaluate and Apply Security Governance Principles
Lesson 3: Determine Compliance Requirements
Lesson 4: Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context
Lesson 5: Understand, Adhere to and Promote Professional Ethics
Lesson 6: Develop, Document and Implement Security Policy, Standards, Procedures and Guidelines
Lesson 7: Identify, Analyze, and Prioritize Business Continuity (BC) Requirements
Lesson 8: Contribute to and Enforce Personnel Security Policies and Procedures
Lesson 9: Understand and Apply Risk Management Concepts
Lesson 10: Understand and Apply Threat Modeling Concepts and Methodologies
Lesson 11: Apply Risk Management Concepts to the Supply Chain
Lesson 12: Establish and Maintain a Security Awareness, Education, and Training Program
Module 2 Domain 2 Asset Security
Lesson 13: Identify and Classify Information and Assets
Lesson 14: Determine and Maintain Information and Asset Ownership
Lesson 15: Protect Privacy
Lesson 16: Ensure Appropriate Asset Retention
Lesson 17: Determine Data Security Controls
Lesson 18: Establish Information and Asset Handling Requirements
Module 3 Domain 3 Security Architecture and Engineering
Lesson 19: Implement and Manage Engineering Processes Using Secure Design Principles
Lesson 20: Understand the Fundamental Concepts of Security Models
Lesson 21: Select Controls Based Upon Systems Security Requirements
Lesson 22: Understand Security Capabilities of Information Systems
Lesson 23: Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Lesson 24: Assess and Mitigate Vulnerabilities in Web-based Systems
Lesson 25: Assess and Mitigate Vulnerabilities in Mobile Systems
Lesson 26: Assess and Mitigate Vulnerabilities in Embedded Systems
Lesson 27: Apply Cryptography
Lesson 28: Apply Security Principles to Site and Facility Design
Lesson 29: Implement Site and Facility Security Controls
Module 4 Domain 4 Communication and Network Security
Lesson 30: Implement Secure Design Principles in Network Architectures
Lesson 31: Secure Network Components
Lesson 32: Implement Secure Communication Channels According to Design
Module 5 Domain 5 Identity and Access Management (IAM)
Lesson 33: Control Physical and Logical Access to Assets
Lesson 34: Manage Identification and Authentication of People, Devices, and Services
Lesson 35: Integrate Identify as a Third-party Service
Lesson 36: Implement and Manage Authorization Mechanisms
Lesson 37: Manage the Identity and Access Provisioning Lifecycle
Module 6 Domain 6 Security Assessment and Testing
Lesson 38: Design and Validate Assessment, Test, and Audit Strategies
Lesson 39: Conduct Security Control Testing
Lesson 40: Collect Security Process Data
Lesson 41: Analyze Test Output and Generate Report
Lesson 42: Conduct or Facilitate Security Audits
Module 7 Domain 7 Security Operations
Lesson 43: Understand and Support Investigations
Lesson 44: Understand Requirements for Investigation Types
Lesson 45: Conduct Logging and Monitoring Activities
Lesson 46: Securely Provisioning Resources
Lesson 47: Understand and Apply Foundational Security Operations Concepts
Lesson 48: Apply Resource Protection Techniques
Lesson 49: Conduct Incident Management
Lesson 50: Operate and Maintain Detective and Preventative Measures
Lesson 51: Implement and Support Patch and Vulnerability Management
Lesson 52: Understand and Participate in Change Management Processes
Lesson 53: Implement Recovery Strategies
Lesson 54: Implement Disaster Recovery (DR) Processes
Lesson 55: Test Disaster Recovery Plans (DRP)
Lesson 56: Participate in Business Continuity (BC) Planning and Exercises
Lesson 57: Implement and Manage Physical Security
Lesson 58: Address Personnel Safety and Security Concerns
Module 8 Domain 8 Software Development Security
Lesson 59: Understand and Integrate Security in the Software Development Life Cycle (SDLC)
Lesson 60: Identify and Apply Security Controls in Development Environments
Lesson 61: Assess the Effectiveness of Software Security
Lesson 62: Assess Security Impact of Acquired Software
Lesson 63: Define and Apply Secure Coding Guidelines and Standards
Module 9 Becoming a CISSP
Lesson 64: Acing Your Exam
Lesson 65: Certification Process
Summary

Erscheint lt. Verlag 5.11.2020
Reihe/Serie LiveLessons
Verlagsort Upper Saddle River
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Netzwerke
Informatik Weitere Themen Zertifizierung
ISBN-10 0-13-518049-X / 013518049X
ISBN-13 978-0-13-518049-5 / 9780135180495
Zustand Neuware
Haben Sie eine Frage zum Produkt?