Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Concepts Of Cissp - Domain 1

Posted By: ELK1nG
Concepts Of Cissp - Domain 1

Concepts Of Cissp - Domain 1
Published 12/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 10.97 GB | Duration: 11h 33m

The objective of this course series "Concepts of CISSP" is to cover CISSP domains in the most effective way possible.

What you'll learn

Understand domain 1 "Security and Risk Management" of CISSP

Get in depth practical insight into all topics, key definitions and concepts

Able to memorise key points and get prepared for CISSP exam

Able to get ready for Cybersecurity interviews

Requirements

Basic IT background

Description

Do you feel CISSP certification is difficult?This course will make CISSP certification fun and easy. This module of "Concepts of CISSP" series will cover domain1. We will be releasing separate domains as separate modules.Welcome to CISSP. CISSP is one of the most reputable courses in the world of information security. The CISSP covers the fundamental elements of the entire cybersecurity field – from security and risk management to communication and network security to security testing and operations. The CISSP is designed for security professionals who have spent a few years in the industry, are currently in an information security position, and want to study cybersecurity leadership and operations.We will cover CISSP syllabus here and will focus on topics to explore core concepts, looking at the wider landscape and see tips and tricks for exams questions.I will be presenting drawings and whiteboard sessions to better engage with you and make the entire journey fun. The main goal of my course is to make the material as vivid as possible.Please note that the CISSP exam outline documented on CISSP website may not appear exactly same in my video discussions. The reason is because some of the topics are already discussed in the videos and we have overlapping situations. Please comment on if there is something missing or need more explanations. I will be happy to improvise by adding new content to the module.I'm hoping you'll find this training useful and enjoyable. If you happen to have any questions and further suggestions, feel free to reach out.

Overview

Section 1: Introduction

Lecture 1 Introduction to this CISSP course

Lecture 2 How to pass CISSP?

Lecture 3 My CISSP Journey - The Exam Strategy

Lecture 4 Introduction to Domain 1: Security and Risk Management

Lecture 5 Introduction to Domain 1: Journey of domain 1

Section 2: Understand, adhere to, and promote professional ethics

Lecture 6 Organisational and (ISC)² Code of Professional Ethics

Section 3: Understand and apply security concepts

Lecture 7 One Key Idea about Principles, Policy and Governance

Lecture 8 Confidentiality, integrity, and availability, authenticity and nonrepudiation

Lecture 9 Quick Recap - CIA, DAD additional discussion

Lecture 10 What is IAAA? Auditing and Monitoring

Lecture 11 Defence in depth. What are different Protection Mechanism?

Lecture 12 Physical and Logical Security Boundaries

Lecture 13 Deep dive into Logical Boundary Concepts

Section 4: Evaluate and apply security governance principles

Lecture 14 Security Management Planning and Security Function

Lecture 15 Organizational Processes, Roles and Responsibilities

Lecture 16 Introduction to Security Models and Framework

Lecture 17 Security Control Frameworks

Lecture 18 RMF and CSF

Lecture 19 Due care/due diligence Threat Management and Supply Chain Risk Management

Lecture 20 Additional Episode: How to do Reduction Analysis

Section 5: Determine compliance and other requirements

Lecture 21 Contractual, legal, industry standards, and regulatory requirements

Lecture 22 Privacy history and requirements understanding

Section 6: Understand legal and regulatory issues that pertain to information security in a

Lecture 23 Cybercrimes and data breaches

Lecture 24 Licensing and IP requirements

Lecture 25 Software licensing

Lecture 26 Import/export controls Privacy and Transborder data flow

Section 7: Security policy, standards, procedures, and guidelines

Lecture 27 Develop, document, and implement security policy, standards, procedures, and gui

Section 8: Understand requirements for investigation types

Lecture 28 Understand requirements for investigation types (i.e., administrative, criminal,

Lecture 29 Evidences, IOCE and Computer Crimes

Section 9: Identify, analyze, and prioritize Business Continuity (BC) requirements

Lecture 30 BCP - The Big Picture

Lecture 31 BCP Steps and Business Impact Analysis (BIA)

Lecture 32 Starting the BCP and BOA

Lecture 33 BCP - Complete Cycle

Lecture 34 Additional Episode - BCP Second Review

Section 10: Contribute to and enforce personnel security policies and procedures

Lecture 35 Contribute to and enforce personnel security policies and procedures

Section 11: Understand and apply risk management concepts

Lecture 36 Risk Terminologies and Concepts

Lecture 37 NIST 800-37, 800-39, 800-30, 800-53/A and related Concepts

Lecture 38 How to manage Risk - Risk Management

Lecture 39 NIST 800-37 and CSF

Lecture 40 Types and forms of security controls and RMM

Section 12: Social Engineering and Security Awareness

Lecture 41 Social Engineering Principles and Types and Awareness methods

IT professionals, Security professionals, Computer science students