Sale!

ISC2 – CISSP Certification Training Course & Guides

Original price was: $50.00.Current price is: $15.00.

Price: 15.00 USD | Size: 7.58 GB |  Duration : 54+  Hours  | 201 Video Lessons | Bonus :  CISSP PDF Guides 

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 5.0

Description

Price: 15.00 USD | Size: 7.58 GB |  Duration : 54+  Hours  | 201 Video Lessons | Bonus :  CISSP PDF Guides 

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 5.0

 

Why Do I Love Teaching the Certified Information Systems Security Professional (CISSP) ?

The CISSP is a security certification that completely changed the trajectory and success of my security career from support helpdesk, to junior security engineer, to senior security engineer, to team lead of SOC operations. 

I provide a high-quality, trusted, and beautiful CISSP course curriculum which spans a total of 7 years of content creation that includes videos, practice questions, flashcards, PDF notes, and access to a private CISSP Telegram group.  This website has currently helped pass over 3,000 CISSPs worldwide!

Domain 1 – Security and Risk Management
BCP DRP Core Concepts 1
BCPDRP Core Concepts 2
Choose the Best Answer Part 1
Choose the Best Answer Part 2
Data Classification Practice Question
Domain 1 – Introduction
Domain 1 – Security and Risk Management RPO, RTO, WRT, MTD
Fujifilm Ransomware BCP DRP Correlation Part 1
Fujifilm Ransomware BCP DRP Correlation Part 2
Fujifilm Ransomware BCP DRP Correlation Part 3
Practice Question Recovery Strategy
Practice Question Review Video – Code of Ethics
Practice Question Review Video Technical Preventative Control
Practice Question Video Cloud Vendor Violations Tokenization
Practice Question Video Privacy Impact Assessment
Reverse Practice Question Review Video – States of Data
Security and Risk Management Phase 1 of BCP DRP Scope and Initiation
Security and Risk Management Phase 3 of BCP DRP Recovery Strategies
Security and Risk Management Phase 2 of BCP DRP Business Impact Analysis
Security and Risk Management Phase 4 and Phase 5 Testing and Maintenance
Security and Risk Management The Importance of BCP DRP
The CIA Triad
The ISC2 CISSP Code of Ethics

Domain 2 – Asset Security
Administrative Controls 6-Subcategories of Controls
Asset Classification Labels
Baselines, Scoping, Tailoring, Standards
Classification Labels Defined
Cross-Domain Correlation Breach Attack Simulation Part 6
Cross-Domain Correlation Just-In-Time Access Part 5
Cross-Domain Correlation Kerberos Exploitation Part 2
Cross-Domain Correlation Kerberos Exploitation Part 3
Cross-Domain Correlation Li-Fi Part 4
Cross-Domain Correlation Security Orchestration, Automation, and Response Part 8
Cross-Domain Correlation Understand Requirements for Investigation Types Part 1
Cross-Domain Correlation User and Entity Behavior Analytics Part 7
Defense-in-Depth
Equifax Breach Security Controls
Introduction
Physical Controls 6-Subcategories of Controls
Practice Question Video Roles and Responsibilities
Protecting Privacy
Technical Controls 6-Subcategories of Controls
Transparency, Concealment, Privacy, Secrecy

Domain 3 – Security Engineering
Attacks on Cryptography Ciphertext-Only Attack
Attacks on Cryptography Known-Plaintext Attack
CISSP Practice Question Password Policy
Common Criteria
Community Hybrid Cloud
Cross-Domain Correlation DES and a Broken Algorithm
Diffie-Hellman Part 1
Diffie-Hellman Part 2
Digital Signatures
Dual-Control
Internet of Things Part 1-1 Introduction Types of Devices
Internet of Things Part 1-2 How It Works
Internet of Things Part 2-1 Top 10 IoT Security Vulnerabilities Countermeasures
Internet of Things Part 2-2 Example of IoT Attack Core IoT CISSP Concepts
Introduction Video
Practice Question Best Evaluation Method
Practice Question Clark-Wilson vs Biba Model
Practice Question Internet of Things
Practice Question MD2 Hashing Algorithm
Private Cloud
Public Cloud
Public Key Infrastructure Part 1
Public Key Infrastructure Part 2
Quantum Cryptography
Split-Knowledge
Symmetric Key Encryption
Vigenere Cipher
Water Suppression Systems
What is SCADA Part 1
What is SCADA Part 2
What is SCADA Part 3
What is SCADA Part 4
Why We Need Cryptography Part 1
Why We Need Cryptography Part 2

Domain 4 – Network Security
Basic Network Security
Circuit vs Application Proxies Part 1
Circuit vs Application Proxies Part 2
Cross-Domain Correlation IPSec
Cross-Domain Correlation Network Attacks Part 1
Cross-Domain Correlation Network Attacks Part 2
Cross-Domain Correlation Network Attacks Part 3
Cross-Domain Correlation Network Attacks Part 4
DDOS Countermeasures
Difference Between DOS and DDOS
Firewall Deployment Architectures Part 1
Firewall Deployment Architectures Part 2
Introduction
Network Cabling
Old OSI Model Video
OSI Model Part 1
OSI Model Part 2
Packet vs Stateful Filter Firewalls
Practice Question IPSec VPN
Practice Question Network Collisions
Practice Question STP, OSPF, ICMP, BGP, GDPR 1
Practice Question STP, OSPF, ICMP, BGP, GDPR 10
Practice Question STP, OSPF, ICMP, BGP, GDPR 2
Practice Question STP, OSPF, ICMP, BGP, GDPR 3
Practice Question STP, OSPF, ICMP, BGP, GDPR 4
Practice Question STP, OSPF, ICMP, BGP, GDPR 5
Practice Question STP, OSPF, ICMP, BGP, GDPR 6
Practice Question STP, OSPF, ICMP, BGP, GDPR 7
Practice Question STP, OSPF, ICMP, BGP, GDPR 8
Practice Question STP, OSPF, ICMP, BGP, GDPR 9
Practice Question TLS Usage
Practice Question VLANs
Real World Demo of Port Address Translation (PAT)
Routers and Firewalls Part 1
Routers and Firewalls Part 2
Routers and Firewalls Part 3
Routers and Firewalls Part 4
Software Defined Networking
Study Notes and Theory – A CISSP Study Guide (1)
Study Notes and Theory – A CISSP Study Guide
The Concept of Network Security
The TCP Handshake
Transport Layer Security Part 1
Transport Layer Security Part 2

Domain 5 – Identity and Access Management
Attribute-Based Access Control
Bell-LaPadula Model
Biba Model
Clark-Wilson Model
Hard Token Implementation
Introduction Video
Kerberos
Mandatory Access Control
Need-to-Know Least Privilege
OAuth
OpenID
Practice Question Federated Identity
Real World Demo of OAuth and OpenID
SAML Part 1
SAML Part 2
SAML
Separation of Duties
SPML
Study Notes and Theory – A CISSP Study Guide
What is Federated Identity
XACML and SPML

Domain 6 – Security Assessment and Testing
Cross-Domain Correlation Vulnerability Testing
Introduction
Practice Question Assurance
Practice Question Security Awareness
Practice Question Security Testing
Practice Question Video Interdependencies
Reverse Practice Question Test Environment
Service Organization Controls (SOC 1, SOC 2, SOC 3) Part 1
Service Organization Controls (SOC 1, SOC 2, SOC 3) Part 2
Service Organization Controls (SOC 1, SOC 2, SOC 3) Part 3
Service Organization Controls (SOC 1, SOC 2, SOC 3) Part 4
Testing the Security of Software

Domain 7 – Security Operations
5 Question Review
Cross-Domain Correlation Data Backup Verification
Cross-Domain Correlation Single Point of Failure
IaaS, PaaS, SaaS
Industrial Control Systems Information Security Continuous Monitoring Part 1
Industrial Control Systems Information Security Continuous Monitoring Part 2
Industrial Control Systems Information Security Continuous Monitoring Part 3
Industrial Control Systems Information Security Continuous Monitoring Part 4
Introduction
Job Rotation
Malware Incident Response Part 1 Preparation
Malware Incident Response Part 2
Malware Incident Response Part 3
Malware Incident Response Part 4
Mandatory Vacations
Practice Question Cloud Characteristics
Practice Question Due Care
Practice Question Incident Response
Real-World Example of IaaS, PaaS, SaaS

Domain 8 – Software Development Security
Attacks on Software Security
Covert Storage and Timing Channels
Cross-Domain Correlation CMMI
Introduction Video
Practice Question Most Risk
SDLC Why We Need It How To Secure It Part 2
SDLC Why We Need It How To Secure It Part 1
Security of APIs
Software or Systems Development Life Cycle Part 1
Software or Systems Development Life Cycle Part 2
SQL Injection Demo
Systems Development Life Cycle
Techniques to Secure Software Development
Testing the Security of Software
Why We Need Software Development Security

Exam Strategy Videos
1-2 Months Before Your Exam Part 1
1-2 Months Before Your Exam Part 2
2021 CISSP Exam FAQs Part 1
2021 CISSP Exam FAQs Part 2
2021 CISSP Exam FAQs Part 3
How To Think Like A Manager – Director s Cut – Part 1
How To Think Like A Manager – Director s Cut – Part 2
How To Think Like A Manager – Director s Cut – Part 3
How To Think Like A Manager – Director s Cut – Part 4
How To Think Like A Manager – Director s Cut – Part 5
Webinar – How To Think Like A Manager for Domain 1 – Part 1
Webinar – How To Think Like A Manager for Domain 1 – Part 2
Webinar – How To Think Like A Manager for Domain 1 – Part 3

Pdf notes
Almost Time
BCP DRP Core Concepts
CISSP Absolute Notes
CISSP CHEAT SHEET SERIES
dc6afa d63cdc1d3b524514a9bae5b6d6306162
HIGH-LEVEL STEPS OF IPSEC
Intellectual Property
IPv6
Joshua s Notes
Memory Palace
Mindmaps by Haseeb
TOP 10 TIPS

Reviews

There are no reviews yet.

Be the first to review “ISC2 – CISSP Certification Training Course & Guides”

Your email address will not be published. Required fields are marked *

Add to cart