/> CISSP® Exam Preparation Training Course | WeGeek

CISSP® Exam Preparation Training Course

CISSP Certification Course – Certified Information Systems Security Professional

 

What you’ll learn?

 

  • Prepare for the 2018 version of the Certified Information Systems Security Professional (CISSP) Certification Exam (next CISSP update is in 2021).
  • Clear understanding of CISSP Domain 1 (Security and Risk Management).
  • Clear understanding of CISSP Domain 2 (Asset Security).
  • Where to start on your CISSP certification journey.
  • (496 Reviews)

Curiculum

Introduction to the course

Get your course goals

Instructors

Admin bar avatar
HQ Traing

Developer

He has a Master of Science in Network Systems and a Bachelor of Science in Software Engineering. He is also a Microsoft Certified Application Developer, Technology Specialist (Web Applications) and Professional. Outside the software world, he is a photographer, a pianist and a passionate Latin dancer.
User Rating

4.1 average based on 254 reviews.


5 star
150
4 star
63
3 star
15
2 star
6
1 star
20

Benefits

Industry-Recognized Certification

After completion of each course, you will be entitled with valid certification that will recognize your efforts of particular field. Share your achievement with your friends, family and organization for your career growth.

certificate.1

Description

Be ready to pass the CISSP exam from the first attempt– Understand the different Information Security domains– Security and Risk Management– Identity and Access Management– Security Assessment and Testing–
CISSP® preparation training course, focuses solely on the 8 domains of knowledge as determined by (ISC)2. Each domain of knowledge is dissected into its critical components, and those components are then discussed in terms of their relationship with one another and with other areas of information security.
CISSP® preparation training course will:guide you step by step on how to implement Information Security Management System in any organization from scratch using a set of templates that is used in real life implementation and will qualify you to pass the CISSP exam from the first attempt and get certified.
 

Class Curriculum

    Introduction

  • Start 1. Introduction (1:51)
  • Start 2. What is CISSP Certificate (5:47)
  • Start 3. Course Outline (5:18)
  • Start 4. Latest CISSP Curriculum (4:33)
  • Start 6. Course flow and follow up (7:22)
  • Start 7. Important communication channel (2:49)
  • Security and Risk Management

  • Start 8. Introduction to Security and Risk Management (4:11)
  • Start 9. Important Definitions (12:28)
  • Start 10. Important Definitions 2 (4:42)
  • Start 11. Governance Requirements (5:22)
  • Start 12. Due Care and Due Diligence (8:42)
  • Start 13. Question (3:09)
  • Start 14. Compliance (8:50)
  • Start 15. Important Document (6:47)
  • Start 16. Ethics (9:12)
  • Start 17. Question (3:00)
  • Start 18. Security Document 2 (15:35)
  • Start 19.Security Document Types (5:18)
  • Start 20. Policy Sample (3:14)
  • Start 21. The Relationship Between Security Document Types (3:09)
  • Start 22. Risk Management (7:51)
  • Start 23. Risk Management Part 2 (11:09)
  • Start 24. Asset Evaluation (18:33)
  • Start 25. Exam Question (4:03)
  • Start 26. Rsa Archer (4:41)
  • Start 27. ARIS GRC (1:41)
  • Start 28. Business Continuity Plans (1:16)
  • Start 29. Business Continuity Plans - BCP (14:21)
  • Start 30. Business Impact Analysis- BIA (10:15)
  • Start 31. MTD - RTO- RPO (11:44)
  • Start 32. Disaster Recovery Plan -DRP (3:34)
  • Start 33. Alternatives Sites (8:10)
  • Start 34. Exam Quiz (8:12)
  • Start 35. The Need of Personnel Security (8:39)
  • Start 36. Employment Policies (2:20)
  • Start 37. Employment Policies -Part 2 (10:29)
  • Start 38. Termination (1:40)
  • Start 39. Security Awareness (7:02)
  • Start Domain Evaluation 2 (5:34)
  • Asset Security

  • Start 40. Introduction to Asset Security (5:34)
  • Start 41. Asset Management (10:38)
  • Start 42. Information Asset List (12:40)
  • Start 43. Classification (8:10)
  • Start 44. Labeling (4:44)
  • Start 45. DLP (2:55)
  • Start 46. DLP - Data Classification (3:37)
  • Start 47. Klassify - Data Labeling 2 (2:50)
  • Start 48. Privacy (13:02)
  • Start 49. Retention (12:12)
  • Start 50. Data Security Control (8:01)
  • Security Architecture and Engineering

  • Start 51. Introduction to Security Architecture and Engineering (3:52)
  • Start 52. Security Engineering Lifecycle (4:14)
  • Start 53. NISP SP 14-27 (11:36)
  • Start 54. Trusted Computing Base (9:22)
  • Start 54.1 TCB Vulnerability (9:48)
  • Start 55. Security Models (17:08)
  • Start 56. TCSEC (5:51)
  • Start 57. ITSEC (6:14)
  • Start 58. Security Architecture Questions (3:18)
  • Start 59. Enterprise Security Architecture (5:06)
  • Start 60. Virtualization (9:51)
  • Start 61. Fault Tolerance (6:31)
  • Start 62. Server Fault Tolerance Techniques (2:06)
  • Start 63. New Technology (6:28)
  • Start 64. Spoofing Number (5:52)
  • Start 65. Spoofing Email (7:04)
  • Start 66. Cryptography (16:31)
  • Start 67. Alternative Ciphers (7:56)
  • Start 68. Symmetric Encryption (12:43)
  • Start 69. Asymmetric Encryption (13:52)
  • Start 70. Hash (6:10)
  • Start 71. Physical Security (7:44)
  • Start 72. Physical Access barriers (9:49)
  • Start 73. Power Issue (3:15)
  • Start 74. Fire (5:33)
  • Communications and Network Security

  • Start 75. The OSI Model (17:27)
  • Start 76. TCP-IP Model (2:50)
  • Start 77. Network Architecture Components (17:09)
  • Start 78. Firewall (10:43)
  • Start 79. Network Types and Topolgies (8:42)
  • Start 80. Remote Access Technology (18:34)
  • Start 81. Wireless Network (7:20)
  • Start 82. Network Attacks (9:03)
  • Start 83. Remote Access Security Mechanisms (2:17)
  • Start 84. RAID (7:00)
  • Start 85. Backup (6:00)
  • Start 86. Network Questions (1:21)
  • Identity and Access Management

  • Start 87. Access Control (6:50)
  • Start 88. Authorization (19:23)
  • Start 89. Authentication (18:50)
  • Start 90. Single Sign on SSO (13:10)
  • Start 91. Central Administration (RADUIS)
  • (4:16)
  • Start 92. Access Control Attack (17:15)
  • Start 93. Instrusion Detection System (IDS)
  • (6:58)
  • Start 94. Access Control Inportant exam area (4:15)
  • Start 95. Access Control Questions (8:02)
  • Cloud Security
  • Start 96. Introduction to Cloud Security (2:50)
  • Start 97. NIST 800-145 (1:55)
  • Start 98. IaaS vs PaaS vs SaaS (2:25)
  • Start 99. SaaS (4:25)
  • Start 100. PaaS (2:04)
  • Start 101. IaaS (1:59)
  • Start 102. Storage Architecture (1:25)
  • Start 103. Data Life Cycle Security (4:27)
  • Start 104. Hypervisor (4:49)
  • Start 105. Virtualization Security (5:26)
  • Start 106. Perimeter Security (6:05)
  • Security Assessment and Testing

  • Start 107. Introduction Security Assessment and Testing (11:20)
  • Start 108. Test Output (4:33)
  • Start 109. Vulnerability asessment - Part 1 (2:16)
  • Start 110. Vulnerability asessment -Part 2 (3:16)
  • Start 112. Nessus VA (13:24)
  • Start 113. Nessus VA- Part 2 (14:05)
  • Start 114. Nessus VA Report (5:20)
  • Start 115. OWASP ZAP - VA (5:06)
  • Start 116. Nexpose VA (5:05)
  • Start 117. Penetration testing (8:33)
  • Start 118. Reconnaissance Demo -Maltego 2 (7:58)
  • Start 119. Scanning Demo -Zenmap (5:06)
  • Start 120. Exploitation Demo -MetaSploit 2 (14:33)
  • Start 121. Event Log Review 2 (7:18)
  • Start 122. NIST 800-92 (2:56)
  • Start 123. SIEM Solution (6:16)
  • Start 124. SIEM Solution Demo - Qradar (3:09)
  • Start 125. Code Review (5:20)
  • Start 126. Security KPI's (6:57)
  • Security Operations
  • Start 127. Introduction to Security Operation 2 (1:40)
  • Start 128. Security Operation 2 (9:53)
  • Software Development Security

  • Start 129. The System Life Cycle (6:45)
  • Start 130. Software development Methods (6:42)
  • Start 132. Change Control Process (3:07)
  • Start 133. Security Consideration (1:54)
  • Start 134. Software Control (2:50)
  • Start 135. Introduction to SQL Injection 2 (11:26)
  • Start 136. What is SQL Injection (11:26)
User Rating

4.7 average based on 261 reviews.


5 star
150
4 star
63
3 star
15
2 star
6
1 star
20

Student Reviews

Dont Miss Out Offer Ends In

  • Days
  • Hours
  • Minutes
  • Seconds
$12

Course Features

  • 30-Day Money-Back Guarantee
  • Lessons With Examples
  • 14 Hours of Learning
  • Lifetime 24/7 Access
  • Completion Certificate