Home| All soft| Last soft| Your Orders| Customers opinion| Helpdesk| Cart

Program Search:


Shopping Cart:




*Note: Minimum order price: €20
We Recommend:
CBT Nuggets - (ISC)2 Security CISSP €20 buy download

CBT Nuggets - (ISC)2 Security CISSP
English | 02.2014 | flv | H264 1280x720 | AAC 1 ch | 12 hrs | 2.79 GB
eLearning

This video training with Michael Shannon covers information security, including topics such as access control, cryptography, and more.

Recommended skills:
At least 5 years experience in two of the following areas: access control, telecommunications and network security, information security governance and risk management, software development security, cryptography, security architecture and design, operations security, business continuity and disaster recovery planning, legal, regulations, investigations and compliance, and physical security

Recommended equipment:
None

Related certifications:
CISSPĀ® - Certified Information Systems Security Professional


Related job functions:
- Security consultant
- Security analyst
- Security manager
- Security systems engineer
- IT director
- Chief information security officer
- Security auditor
- Security architect
- Network architect

CISSP certification one of the most respected certifications available, and is currently in great demand by organizations of all types. From banking and financial institutions to government and public utilities as well as high-tech and hospitality, the skills of a CISSP are needed by nearly every industry.

In this training, you'll learn how to develop security policies for a computer network. It also covers security of physical assets and facilities, ethics, cyber crime and business practices. It's great overview of everything security related without getting deep into the technical.

Contents

Introduction to (ISC)2 Security CISSP
00:14:24
This introductory Nugget to the CISSP series covers an exam and certification overview, exam objectives, and best practices for the getting the most out of this CISSP CBT Nugget.



Information Security Governance and Risk Management (part 1)
00:40:51
This nugget covers security management and security administration. The organizational security model is explored along with Information Risk Management (IRM)



Information Security Governance and Risk Management (part 2)
00:48:48
In part two we continue our discussion of information risk management. Other topics include security program development and risk analysis.



Information Security Governance and Risk Management (part 3)
00:38:23
In this continuation of this CISSP CBK domain we cover security policy and practice; data classification; responsibility of roles; and security awareness and training.



Access Control (part 1)
00:38:55
This module begins with an introduction to access control fundamentals. Next you will learn about identity management. Other topics involve directories and web access, password management, and biometrics.



Access Control (part 2)
00:40:30
Here is an excellent look at authorization concepts; SSO, Kerberos, and SESAME; security domains; access control models; and access control techniques and methodologies.



Access Control (part 3)
00:34:16
This nugget covers access control administration, accounting, auditing, monitoring, and an overview of common threats to access controls.



Security Architecture and Design (part 1)
00:29:26
In this exploration security architecture we will explore CPU architecture, processor and process management, memory management, CPU modes, and protection rings.



Security Architecture and Design (part 2)
00:31:01
We go deeper with topics like storage architecture, system architecture, security models, and security modes of system operation.



Security Architecture and Design (part 3)
00:27:02
Here is an excellent exploration systems evaluation types, certification, accreditation, open vs. closed systems, and a survey of common threats to system architectures.



Physical (Environmental) Security (part 1)
00:27:08
Its time to take a look at an introduction to physical security, planning physical security, and physical security program design.



Physical (Environmental) Security (part 2)
00:27:45
This design nugget covers asset protection, internal support, and environmental systems.



Physical (Environmental) Security (part 3)
00:28:03
This final installment of physical and environmental security focuses exclusively on perimeter security. Topics include: facility access control, personnel access controls, and external boundary mechanisms.



Telecommunications and Network Security (part 1)
00:33:55
This nugget explores the ISO OSI seven-layer model and TCP/IP model. Other topics include TCP, UDP, IP and well-known port numbers for network applications and services.



Telecommunications and Network Security (part 2)
00:45:31
Let's take a look at transmission types, topologies, media access, LAN protocols, routing protocols, and network devices.



Telecommunications and Network Security (part 3)
00:47:31
Let's take a look at transmission types, topologies, media access, LAN protocols, routing protocols, and network devices.



Cryptography (part 1)
00:30:31
The first cryptography nugget covers definitions, symmetric vs. asymmetric algorithms, block vs. stream ciphers, an overview of encryption methods, cryptographic hashes, and keys.



Cryptography (part 2)
00:26:42
We will dig a lot deeper into symmetric key cryptosystems in this second nugget of this domain. You will also learn about authentication hashes and digital signatures.



Cryptography (part 3)
00:32:43
The topics of part three include: asymmetric key algorithms in-depth, RSA, Diffie-Helman (DH), PKI, SSL VPNs and IPSec VPNs.



Business Continuity and Disaster Recovery Planning (part 1)
00:29:38
This nugget covers definitions, business continuity steps, security policy integration, project initiation, BCP requirements, BIA steps, and BCP responsibilities.



Business Continuity and Disaster Recovery Planning (part 2)
00:33:36
Topics in this second domain nugget include: preventative controls, recovery strategies, hardware and software backups, and documentation.



Business Continuity and Disaster Recovery Planning (part 3)
00:29:07
In this continuation of business continuity and disaster recovery you will learn about the importance of insurance, recovery, restoration, and testing strategies.



Legal, Regulations, Investigations and Compliance (part 1)
00:28:26
Its time to learn about cyberlaw and cybercrime. You will also explore the types of law, intellectual property, privacy issues, mandates, and regulations.



Legal, Regulations, Investigations and Compliance (part 2)
00:38:27
Here is a great discussion of liability, investigations, incident response, computer forensics, evidence, and ethics.



Software Development Security (part 1)
00:41:30
This Nugget begins with an introduction to application security. Other topics include: database terminology, database models, RDBMS models, data mining, and data warehousing.



Software Development Security (part 2)
00:30:27
In this exploration application security you will learn about software system development, application development techniques, and distributed computing.



Software Development Security (part 3)
00:38:45
We go deeper in part three as we look at expert systems, knowledge-based systems, application threat agents, and application security countermeasures.



Security Operations (part 1)
00:40:10
Here is an excellent exploration of a wide variety mission-critical security concepts. Topics include: the role of operations security, clipping and assurance levels, Trusted Computing Base (TCB), I/O controls, system hardening, and configuration management.



Security Operations (part 2)
00:31:30
Its time to take a tour of media controls and data leakage; MTBR and MTTR; RAID, MAID, RAIT, and SANs; grid and cloud computing; and HSM.



Security Operations (part 3)
00:30:40
This final Nugget of the CISSP series email vulnerabilities and security, MIME, S/MIME, PGP technology, and SSL/ VPN solutions for operations security.


Screenshots:









Download File Size:1.96 GB


CBT Nuggets - (ISC)2 Security CISSP
€20
Customers who bought this program also bought:
  • CISSP Video Mentor Exam (1 dvd) €15
  • Offensive Security Penetration Testing with BackTrack €10
  • OReilly Media Infinite Skills CISSP Certification Training Domain 2 Training Video €15
  • CBT NUGGETS Microsoft SharePoint Server 2013 70-332 Video €20
  • CBT NUGGETS IIS 8.5 Administration of Internet Information Services Video €20
  • CBT Nuggets - Cisco CCNP Data Center 642-035 DCUCT Video €20
  • Cybersecurity Managing Systems, Conducting Testing, and Investigating Intrusions PDF eBook €10
  • CISSP Practice 2,250 Questions, Answers, and Explanations for Passing the Test EPUB eBook €10
  • CBT Nuggets Check Point CCSE Certified Security Expert R70 €25
  • Cyber Security Deterrence and IT Protection for Critical Infrastructures PDF eBook €10
  • Career Academy Security Certified Network Specialist SCNS Tactical Perimeter Defense Training (3 dvds) €50
  • EC-Council Certified Ethical Hacker CEH 8 Tools DVDs (6 dvd) €40
  • InfiniteSkills Learning Android App Programming Training Video Teaches Core Android Development Skills €20
  • EC Council Certified Security Analyst And Licensed Penetration Tester (6 dvds) €10
  • WireShark University Training Course Bootcamp 02 TCPIP Network Analysis (1 dvd) €25
  • CISSP All-in-One Exam Guide 5th Edition (1 cd) €10
  • TestOut CISSP Certification Training Suite (2 cds) €15

  • Home| All Programs| Today added Progs| Your Orders| Helpdesk| Shopping cart      





    Autodesk Revit 2023 €140

                 

    Autodesk Product Design Suite Ultimate €252






    Intuit QuickBooks Enterprise Solutions 2021 €40


    Mindjet MindManager 2022 €22


    Chief Architect Premier X13 €50






    DxO PhotoLab 5 ELITE €25


    SketchUp Pro 2022 €30


    Corel Painter 2023 €40