Cissp - Security Architecture And Engineering - Domain 3
Last updated 2/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 978.57 MB | Duration: 2h 7m
Last updated 2/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 978.57 MB | Duration: 2h 7m
Free Flash Cards & Practice Exam Included. To Master IT, Learn IT from the Masters! Over 90% pass rate.
What you'll learn
Engineering processes using secure design principles
Fundamental concepts of security models
Security capabilities of information systems
Assessing and mitigating vulnerabilities in systems
Cryptography and Designing and implementing physical security
Free Practice Exam
Free Flash Cards
Requirements
Candidates must have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP CBK.
Description
Certcop (A division of Secbay Inc.)Secbay and its partners have provided successful training to many top-edge companies worldwide. They have successfully delivered instructor-led classroom as well as virtual-live training and certification for many industry leaders such as DoD, DHS, US Army, US Navy, US Airforce, Unisys, ICE, BAH, Booz Allen Hamilton, Freddie Mac, Guidewell Source, Disney, Navarro, Apple, Amazon, Deloitte, Seagate and many more.OverviewEarning the CISSP validates your ability to plan, execute, and manage a best-in-class cybersecurity program. With a CISSP, you certify your knowledge and become an (ISC)2 member, gaining access to a wealth of special resources, instructional tools, and peer-to-peer networking possibilities.The CISSP curriculum divides the subject into domains, which are different types of information security subjects. [11] The CISSP test is based on the Common Body of Knowledge, as defined by (ISC)2 (or CBK). (ISC)2 states that "The CISSP CBK is a taxonomy — a list of subjects that information security professionals all around the globe should be aware of. The CISSP CBK creates a standard framework of information security words and principles, allowing information security experts throughout the world to discuss, debate, and resolve issues in the field with a shared understanding."Program Objectives:Certcop IntroductionIntroduction to CISSPResearch, implement and manage engineering processes using secure design principles (e.g., Biba, Star Model, Bell-LaPadula) Understand the fundamental concepts of security modelsSelect controls based upon systems security requirementsUnderstand security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)Assess and mitigate the vulnerabilities of security architectures, designs, and solution elementsSelect and determine cryptographic solutionsUnderstand methods of cryptanalytic attacksApply security principles to site and facility designDesign site and facility security controlsDownloadable Free Flash CardsFree Practice Questions (Coming Soon for the same price)
Overview
Section 1: Company Introduction
Lecture 1 Introduction to certcop
Section 2: Introduction to CISSP
Lecture 2 Details about CISSP
Section 3: Security Architecture and Engineering
Lecture 3 Security Architecture and Engineering Part 1
Lecture 4 Security Architecture and Engineering Part 2
Lecture 5 Security Architecture and Engineering Part 3
Section 4: Flash Cards and Exam Certtips
Lecture 6 Downloadable Flash Cards and Certtips
The CISSP is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles.