Concepts Of Cissp - Domain 1
Published 12/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 10.97 GB | Duration: 11h 33m
Published 12/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 10.97 GB | Duration: 11h 33m
The objective of this course series "Concepts of CISSP" is to cover CISSP domains in the most effective way possible.
What you'll learn
Understand domain 1 "Security and Risk Management" of CISSP
Get in depth practical insight into all topics, key definitions and concepts
Able to memorise key points and get prepared for CISSP exam
Able to get ready for Cybersecurity interviews
Requirements
Basic IT background
Description
Do you feel CISSP certification is difficult?This course will make CISSP certification fun and easy. This module of "Concepts of CISSP" series will cover domain1. We will be releasing separate domains as separate modules.Welcome to CISSP. CISSP is one of the most reputable courses in the world of information security. The CISSP covers the fundamental elements of the entire cybersecurity field – from security and risk management to communication and network security to security testing and operations. The CISSP is designed for security professionals who have spent a few years in the industry, are currently in an information security position, and want to study cybersecurity leadership and operations.We will cover CISSP syllabus here and will focus on topics to explore core concepts, looking at the wider landscape and see tips and tricks for exams questions.I will be presenting drawings and whiteboard sessions to better engage with you and make the entire journey fun. The main goal of my course is to make the material as vivid as possible.Please note that the CISSP exam outline documented on CISSP website may not appear exactly same in my video discussions. The reason is because some of the topics are already discussed in the videos and we have overlapping situations. Please comment on if there is something missing or need more explanations. I will be happy to improvise by adding new content to the module.I'm hoping you'll find this training useful and enjoyable. If you happen to have any questions and further suggestions, feel free to reach out.
Overview
Section 1: Introduction
Lecture 1 Introduction to this CISSP course
Lecture 2 How to pass CISSP?
Lecture 3 My CISSP Journey - The Exam Strategy
Lecture 4 Introduction to Domain 1: Security and Risk Management
Lecture 5 Introduction to Domain 1: Journey of domain 1
Section 2: Understand, adhere to, and promote professional ethics
Lecture 6 Organisational and (ISC)² Code of Professional Ethics
Section 3: Understand and apply security concepts
Lecture 7 One Key Idea about Principles, Policy and Governance
Lecture 8 Confidentiality, integrity, and availability, authenticity and nonrepudiation
Lecture 9 Quick Recap - CIA, DAD additional discussion
Lecture 10 What is IAAA? Auditing and Monitoring
Lecture 11 Defence in depth. What are different Protection Mechanism?
Lecture 12 Physical and Logical Security Boundaries
Lecture 13 Deep dive into Logical Boundary Concepts
Section 4: Evaluate and apply security governance principles
Lecture 14 Security Management Planning and Security Function
Lecture 15 Organizational Processes, Roles and Responsibilities
Lecture 16 Introduction to Security Models and Framework
Lecture 17 Security Control Frameworks
Lecture 18 RMF and CSF
Lecture 19 Due care/due diligence Threat Management and Supply Chain Risk Management
Lecture 20 Additional Episode: How to do Reduction Analysis
Section 5: Determine compliance and other requirements
Lecture 21 Contractual, legal, industry standards, and regulatory requirements
Lecture 22 Privacy history and requirements understanding
Section 6: Understand legal and regulatory issues that pertain to information security in a
Lecture 23 Cybercrimes and data breaches
Lecture 24 Licensing and IP requirements
Lecture 25 Software licensing
Lecture 26 Import/export controls Privacy and Transborder data flow
Section 7: Security policy, standards, procedures, and guidelines
Lecture 27 Develop, document, and implement security policy, standards, procedures, and gui
Section 8: Understand requirements for investigation types
Lecture 28 Understand requirements for investigation types (i.e., administrative, criminal,
Lecture 29 Evidences, IOCE and Computer Crimes
Section 9: Identify, analyze, and prioritize Business Continuity (BC) requirements
Lecture 30 BCP - The Big Picture
Lecture 31 BCP Steps and Business Impact Analysis (BIA)
Lecture 32 Starting the BCP and BOA
Lecture 33 BCP - Complete Cycle
Lecture 34 Additional Episode - BCP Second Review
Section 10: Contribute to and enforce personnel security policies and procedures
Lecture 35 Contribute to and enforce personnel security policies and procedures
Section 11: Understand and apply risk management concepts
Lecture 36 Risk Terminologies and Concepts
Lecture 37 NIST 800-37, 800-39, 800-30, 800-53/A and related Concepts
Lecture 38 How to manage Risk - Risk Management
Lecture 39 NIST 800-37 and CSF
Lecture 40 Types and forms of security controls and RMM
Section 12: Social Engineering and Security Awareness
Lecture 41 Social Engineering Principles and Types and Awareness methods
IT professionals, Security professionals, Computer science students