Home| All soft| Last soft| Your Orders| Customers opinion| Helpdesk| Cart

Program Search:


Shopping Cart:




*Note: Minimum order price: €20
We Recommend:
CBT Nuggets ISC 2 CISSP 2015 €15 buy download

2015
CBT Nuggets
Keith Barker
10h
English

This (ISC)2 CISSP training with Keith Barker is designed for those who are preparing for a CISSP certification in information security, including topics from eight security domains (based on the 2015 blueprint), that will be tested in the CISSP certification exam.
Related Area of Expertise:
IT Security
Recommended skills:
At least 5 years of experience in two of the following domains, and exposure to the others: Security and Risk Management, Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software Development Security

Recommended equipment:
None
Related certifications:
CISSPĀ® - Certified Information Systems Security Professional

Related job functions:
Security consultant
Security analyst
Security manager
Security systems engineer
IT director
Chief information security officer
Security auditor
Security architect
Network architect
CISSP certification one of the most respected certifications available, and is currently in great demand by a wide variety organizations. From banking and financial institutions to government and public utilities, as well as high-tech and hospitality, the skills of a CISSP are needed by nearly every industry.
In this new CISSP 2015 training, you'll focus on the eight security domains that will be tested in the CISSP certification exam, based on the 2015 blueprint from ISC(2). Benefits of being a CISSP include:
Demonstrated working knowledge of information security
Confirmed commitment to profession
A career differentiator, with enhanced credibility and marketability
All trademarks and copyrights are the property of their respective holders.

1. Welcome to CISSP (16 min)
2. CIA Concepts (4 min)
3. Policies (13 min)
4. Risk (13 min)
5. Control Types (17 min)
6. Security Awareness Training (6 min)
7. Ethical Hacking (13 min)
8. Symmetric Cryptography (19 min)
9. Asymmetric Cryptography (24 min)
10. Fire (16 min)
11. Physical Security (13 min)
12. Electric Power (12 min)
13. OSI Lower Layers (29 min)
14. OSI Upper Layers (24 min)
15. Firewalls (21 min)
16. VPNs (27 min)
17. Attacks (21 min)
18. Authentication Concepts (9 min)
19. Multifactor Authentication (15 min)
20. Centralized Management (17 min)
21. SSO and Security Threats (25 min)
22. Computing System Evaluations (15 min)
23. Security Model Details (11 min)
24. Availability and Integrity Design (14 min)
25. IDS and IPS (17 min)
26. Controls for Operational Security (19 min)
27. Separation of Duties (18 min)
28. Backups and Media (16 min)
29. DR and BC (20 min)
30. Malware (14 min)
31. Evidence (12 min)
32. Laws and Liability (10 min)
33. Incident Response (15 min)
34. System and Software Security (16 min)
35. Virtualization and Cloud (13 min)
36. 2700x (6 min)
37. Federated Identities (11 min)
38. EPA (16 min)
39. Monitoring and More (12 min)


ing and financial institutions to government and public utilities, as well as high-tech and hospitality, the skills of a CISSP are needed by nearly every industry.
In this new CISSP 2015 training, you'll focus on the eight security domains that will be tested in the CISSP certification exam, based on the 2015 blueprint from ISC(2). Benefits of being a CISSP include:
Demonstrated working knowledge of information security
Confirmed commitment to profession
A career differentiator, with enhanced credibility and marketability
All trademarks and copyrights are the property of their respective holders.

1. Welcome to CISSP (16 min)
2. CIA Concepts (4 min)
3. Policies (13 min)
4. Risk (13 min)
5. Control Types (17 min)
6. Security Awareness Training (6 min)
7. Ethical Hacking (13 min)
8. Symmetric Cryptography (19 min)
9. Asymmetric Cryptography (24 min)
10. Fire (16 min)
11. Physical Security (13 min)
12. Electric Power (12 min)
13. OSI Lower Layers (29 min)
14. OSI Upper Layers (24 min)
15. Firewalls (21 min)
16. VPNs (27 min)
17. Attacks (21 min)
18. Authentication Concepts (9 min)
19. Multifactor Authentication (15 min)
20. Centralized Management (17 min)
21. SSO and Security Threats (25 min)
22. Computing System Evaluations (15 min)
23. Security Model Details (11 min)
24. Availability and Integrity Design (14 min)
25. IDS and IPS (17 min)
26. Controls for Operational Security (19 min)
27. Separation of Duties (18 min)
28. Backups and Media (16 min)
29. DR and BC (20 min)
30. Malware (14 min)
31. Evidence (12 min)
32. Laws and Liability (10 min)
33. Incident Response (15 min)
34. System and Software Security (16 min)
35. Virtualization and Cloud (13 min)
36. 2700x (6 min)
37. Federated Identities (11 min)
38. EPA (16 min)
39. Monitoring and More (12 min)

www.cbtnuggets.com/it-training/isc2-cissp-2015



Download File Size:961.76 MB


CBT Nuggets ISC 2 CISSP 2015
€15
Customers who bought this program also bought:
  • TestOut CISSP Certification Training Suite (2 cds) €15
  • The Best Jokes - A Man Walks Into a Bar by Billy Brownless PDF eBook €1
  • Dirty Jokes and Beer by Drew Carey PDF eBook €1
  • Ask Video Native Instruments 214 DJing With Traktor Pro Tutorial €15
  • McGraw Hill Osborne Media CISSP All in One Exam Guide 6th Edition 2012 PDF eBook €1
  • SonicCouture Electro-Acoustic KONTAKT €25
  • Udemy Certified Information Systems Security Professional CISSP €1

  • Home| All Programs| Today added Progs| Your Orders| Helpdesk| Shopping cart      





    Windows 11 With Office 2021 €168


    Adobe Master Collection 2022 €265


    CineSamples CineStrings €55






    Intuit QuickBooks Enterprise Solutions 2021 €40


    Mindjet MindManager 2022 €22


    Chief Architect Premier X13 €50






    DxO PhotoLab 5 ELITE €25


    SketchUp Pro 2022 €30


    Corel Painter 2023 €40