Сообщение

[Pearson IT Certification, LiveLessons] CISSP Complete Video Course [2015, ENG]

Сообщение Солнышко » 26 фев 2017, 13:38

CISSP Complete Video Course


Год выпуска: 2015
Производитель: Pearson IT Certification, LiveLessons
Сайт производителя: pearsonitcertification.com/store/cissp-complete-video-course-9780789755414
Автор: Sari Greene
Продолжительность: 23:13:10
Тип раздаваемого материала: Видеоурок
Язык: Английский

Описание: CISSP Полный Видео курс содержит 24 часов обучения с содержанием, разделенном на 9 уроков с 94 видео подразделам уроков. Видео состоит из живых дискуссий тренер, видеоролики, анимации и живых демонстраций. Видео уроки этого курса обзор каждой цели экзамена, так что вы можете использовать этот курс как полный инструмент исследования для сдачи экзамена CISSP. Инструкция по всему предлагает подробные объяснения, демонстрации, советы и многое другое. Также включает в связи с прекращением урока викторины и полный экзамен практике.
CISSP Complete Video Course contains 24 hours of training with content divided into 9 lessons with 94 video sub-lessons. The videos consist of live trainer discussions, screencasts, animations, and live demos. The video lessons in this course review each exam objective so you can use this course as a complete study tool for taking the CISSP exam. Instruction throughout offers detailed explanations, demos, tips, and more. Also includes end-of-lesson quizzes and a full practice exam.
Major sections are as follows:
Lesson 1: Security and Risk Management

Learning Objectives, Part 1

1.1: Examining Information Security Fundamentals

1.2: Applying Security Governance Concepts–Part 1

1.3: Applying Security Governance Concepts–Part 2

1.4: Designing and Implementing Governance Documents

1.5: Understanding Legal Systems and Related Laws–Part 1

1.6: Understanding Legal Systems and Related Laws–Part 2

1.7: Understanding Regulatory and Contractual Requirements–Part 1

1.8: Understanding Regulatory and Contractual Requirements–Part 2

1.9: Implementing Personnel Security

1.10: Implementing Third-Party Security

Mid-Lesson Exam Review

Learning Objectives, Part 2

1.11: Understanding and Applying Threat Modeling

1.12: Understanding & Implementing Risk Management Concepts

1.13: Exploring Risk Assessment Methodologies

1.14: Conducting a Quantitative Risk Assessment

1.15: Conducting a Qualitative Risk Assessment

1.16: Selecting Controls and Countermeasures

1.17: Managing Supply Chain Risk

1.18: Implementing Business Continuity Risk Management

End of Lesson Review

Lesson 2: Asset Security

Learning Objectives

2.1: Classifying Assets

2.2: Managing Assets

2.3: Protecting Data Privacy

2.4: Ensuring Appropriate Retention and Destruction

2.5: Determining Data Security Controls

End of Lesson Review

Lesson 3: Security Engineering

Learning Objectives, Part 1

3.1: Implementing Secure Design Principles

3.2: Understanding Security Models

3.3: Selecting Controls Based on Systems Security Evaluation Models

3.4: Recognizing Information Systems Security Capabilities

3.5: Assessing and Mitigating Security Architecture Vulnerabilities

3.6: Assessing and Mitigating Cloud Vulnerabilities

3.7: Assessing and Mitigating Web Vulnerabilities

3.8: Assessing and Mitigating Mobile and Remote Computing Vulnerabilities

Mid-Lesson Exam Review

Learning Objectives, Part 2

3.9: Introducing Cryptography

3.10: Applying Cryptography–Encryption Part 1

3.11: Applying Cryptography–Encryption Part 2

3.12: Applying Cryptography–Public Key Infrastructure

3.13: Applying Cryptography–Hashing and Digital Signature

3.14: Applying Cryptography–Cryptographic Protocols

3.15: Applying Cryptography–Crypto Attacks

3.16: Applying Secure Principles to Site and Facility Design

3.17: Securing Information Processing Facilities and Equipment

End of Lesson Review

Lesson 4: Communications and Network Security

Learning Objectives

4.1: Reviewing OSI and TCP/IP Models

4.2: Understanding IP Convergence and Extensibility

4.3: Securing Wireless Networks

4.4: Using Cryptography to Maintain Communication Security

4.5: Securing Network Access

4.6: Securing Data Transmissions

4.7: Securing Multimedia Collaboration

4.8: Securing Virtual Private Networks

4.9: Securing Endpoints

4.10: Preventing and Mitigating Network Attacks

End of Lesson Review

Lesson 5: Identity and Access Management

Learning Objectives

5.1: Understanding Access Control Fundamentals

5.2: Examining Identification Schemas

5.3: Understanding Authentication Options

5.4: Understanding Authentication Systems

5.5: Implementing Access and Authorization Criteria

5.6: Implementing Access Control Models

5.7: Implementing Access Control Techniques and Technologies

5.8: Identity and Access Provisioning

End of Lesson Review

Lesson 6: Security Assessment and Testing

Learning Objectives

6.1: Testing and Examination (T&E) Overview

6.2: Security Assessment Planning

6.3: Conducting Security Examinations

6.4: Security Assessment Testing–Target Identification

6.5: Security Assessment Testing–Password Cracking

6.6: Conducting Security Assessments–Penetration Testing

6.7: Understanding Log Analysis

6.8: Implementing Information Security Continuous Monitoring (ISCM)

6.9: Understanding Third-Party Audits and Examinations

End of Lesson Review

Lesson 7: Security Operations

Learning Objectives, Part 1

7.1: Managing Privileged Accounts

7.2: Operating and Maintaining Firewalls and IDS/IPS

7.3: Conducting Logging and Monitoring Activities

7.4: Implementing and Supporting Vulnerability and Patch Management

7.5: Implementing and Supporting Malware Management

7.6: Implementing and Supporting Media Management

7.7: Participating in the Configuration Management Process

Mid-Lesson Exam Review

Learning Objectives, Part 2

7.8: Managing System Resilience and Fault Tolerance

7.9: Implementing Disaster Recovery Processes

7.10: Managing DR Plan Maintenance

7.11: Understanding and Supporting Investigations

7.12: Understanding Digital Forensics

7.13: Supporting Incident Management

7.14: Securing People and Places

End of Lesson Review

Lesson 8: Software Development Security

Learning Objectives

8.1: Managing the Software Development Cycle

8.2: Understanding Software Development Approaches, Models, and Tools

8.3: Understanding Source Code Security Issues

8.4: Managing Database Security

8.5 Assessing the Security Impact of Acquired Software

End of Lesson Review
Lesson 9: Preparing for the Exam

Learning Objectives

9.1: Security and Risk Management Domain: Review and Study Roadmap

9.2: Asset Security Domain: Review and Study Roadmap

9.3: Security Engineering Domain: Review and Study Roadmap

9.4: Communications and Network Domain: Review and Study Roadmap

9.5: Identity and Access Domain: Review and Study Roadmap

9.6: Security Assessment and Testing Domain: Review and Study Roadmap

9.7: Security Operations Domain: Review and Study Roadmap

9.8: Software Development Security Domain: Review and Study Roadmap

9.9: Taking the CISSP Examination
Файлы примеров: отсутствуют
Формат видео: MP4
Видео: AVC, 1280x720 (16:9), 25.000 fps, ~1 110 Kbps avg, 0.030 bit/pixel
Аудио: 44.1 KHz, AAC LC, 2 ch, CBR, ~116 Kbps


























Постеры

Соцсети

 

Статистика

Автор: Солнышко
Добавлен: 26 фев 2017, 13:38
Размер: 25.69 ГБ
Размер: 27 587 527 184 байт
Сидеров: 0
Личеров: 0
Скачали: 0
Здоровье: 0%
Скорость скачивания: 0 байт/сек
Скорость раздачи: 0 байт/сек
Последний сидер: Нет
Последний личер: 1 год 7 месяцев 22 дня 6 часов 23 минуты 31 секунду назад
Приватный: Нет (DHT включён)
Сеть и безопасность Скачать торрент
Скачать торрент
[ Размер 142.14 КБ / Просмотров 3 ]

Поделиться



  • Похожие торренты
    Ответы
    Просмотры
    Последнее сообщение

Вернуться в Сеть и безопасность