CISSP
About Course
CISSP stands for Certified Information Systems Security Professional. Our instructors have developed a unique teaching style to help an aspiring candidate to master the art of Cyber Security. CISSP Exam Prep Course is based around teaching the eight fundamental domains of Information Security, which provide Candidates with all the information they require to obtain a broad understanding of Information Security and pass the CISSP exam.
We Proudly deliver Outstanding Learning Services to our global learners, our award-winning courses are designed using highly interactive learning strategies which are supported by extensive research in designing and developing content, so that learner can benefit from unrivalled unique content which is exclusive to Knowledge Academy learners with four delivery method Classroom, Online Instructor-Led (Virtual), Onsite/Corporate, and Online self-paced E-Learning.
What Will You Learn?
- Security and Risk Management
- Asset Security
- Security Architecture and Engineering
- Communication and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
Course Content
Introduction
-
Introduction
00:00 -
How to Complete the course
00:00 -
Course Organization & Content
00:00 -
(ISC)2 Code of Ethics
00:00 -
Acknowledgement
00:00
Information Security space
-
Overview
02:45 -
Professional Ethics
04:25 -
Understand, Adhere to and promote professional Ethics
10:39 -
Understand and apply Security Concepts
13:09 -
Evaluate and Apply Security governance principles
13:51 -
Legal environment part 1
25:59 -
Legal environment part 2
22:29 -
Basic Secure Design principles
19:22 -
Assignment: Applied Case: EDITH | Part 1
02:55 -
Replace with quiz
00:00 -
Terms and conditions
00:00
Information Asset Security
-
Overview
02:56 -
Information Asset Security
19:01 -
Assignment 2: Applied Case: Olympic Grand Hotel International
02:01 -
Manage the data Security lifecycle Part 1
20:10 -
Assignment 3: Applied Case: WE Social Media
01:47 -
Manage the data Security lifecycle Part 2
41:53 -
Determine Data Security controls and compliance requirements
19:52 -
Assignment 4: Applied Case: UAV | Part 1
02:30 -
Replace with quiz
00:00 -
Terms and conditions
00:00
Identity and Access management
-
Overview
02:44 -
Managing the Identity and Access provisioning lifecycle
38:27 -
Implement and Manage Access control models and mechanism
27:54 -
Managing People and Operations
17:07 -
Control physical and logical Access to Aseets
17:36 -
Assignment 5 : Appied Case: US Department of Homeland Security (DHS)
04:50 -
Control physical and logical Access to Assets part 2
05:57 -
Manage ID and Authentication of People, Devices and Services Part 1
20:36 -
Assignment 6: Applied Case: Red Lion Bank (RLB)
02:15 -
Manage ID and Authentication of People, Devices and Services Part 2
26:09 -
Assignment 7: Case Study: The Identity Store
00:00 -
Implement Authentication and Authorization Systems
40:29 -
Assignment 8: Applied Case: UAV | Part 2
03:10 -
Replace with quiz
00:00 -
Terms and conditions
00:00
Security Architechture and Engineering
-
Overview
00:00 -
Assess & mitigate Vulnerabilities of Security Architectures Part 1
00:00 -
Assignment 9: Applied Case: SHIELD Consulting Part 1
00:00 -
Assess & mitigate Vulnerabilities of Security Architectures Part 2
00:00 -
Cryptographic Systems
00:00 -
Hybrid Systems and the Public key infrastructure
00:00 -
Cryptographic systems Hygeine: operations and Maintenance
00:00 -
Cryptanalysis – Methods of Cryptanalytic Attacks
00:00 -
Assignment 10: Applied Case: UAV | Part 3
00:00 -
Replace with Quiz
00:00 -
Terms and conditions
00:00
Communication and Network Security
-
Overview
00:00 -
OSI & TCP/IP Models
00:00 -
OSI layer 1: Physical Layer
00:00 -
OSI layer 2: Datalink Layer
00:00 -
OSI layer 3: Network Layer
00:00 -
OSI layer 4: Transport Layer
00:00 -
OSI layer 5: Session Layer
00:00 -
OSI layer 6: Presentation Layer
00:00 -
OSI layer 7: Application Layer
00:00 -
Secure Design principles in Network Architectures
00:00 -
Secure Network Components
00:00 -
Assignment 11: Applied Case: SHIELD Consulting Part 2
00:00 -
Implement Secure communication channels according to designs Part 1
00:00 -
Assignment: Applied Case: SHIELD Consulting Part 3
00:00 -
Implement Secure communication channels according to designs Part 2
00:00 -
Assignment 13: Applied Case: Stark Industries Inquiry
00:00 -
Replace with quiz
00:00 -
Terms and conditions
00:00
Software Development Security
-
Overview
06:29 -
Why so many software systems are unsecure
43:29 -
Security weaknesses at the source code level: Why so much software is
01:30:36 -
Why databases can be unsecure
01:18:26 -
Why websites can be unsecure
13:36 -
Assignment 14: Applied Case: Real-Life Situation | British Airways
04:34 -
Malware, Ransomware and ransom Attacks: The software perspective
01:02:15 -
“Baking in” Security: development management choices
01:25:19 -
Security controls in software development ecosystems
53:34 -
Risk analysis and mitigation for software apps and systems
53:34 -
Assignment: Applied Case: Pym Tech – Software Development and Security
02:40 -
Replace with Quiz
00:00 -
Terms and conditions
00:00
Security Assessment and testing
-
Overview
04:35 -
Design and validate assessment, test and audit strategies
57:07 -
Conduct security control assessment
00:00 -
Assignment16: Applied Case: Real-Life Situation | Coalfire vs. Iowa
00:00 -
Collect security process data
00:00 -
Analyze and report on organizational performance
00:00 -
Assignment 17: Applied Case: Assessment & Testing
03:50 -
Replace with Quiz
00:00 -
Terms and conditions
00:00
Security Operations
-
Overview
00:00 -
Conduct logging and monitoring activities Part 1
00:00 -
Assignment 18: Applied Case: Real-Life Situation | Bank of Bangladesh
07:01 -
Conduct logging and monitoring activities part 2
00:00 -
Perform change management
00:00 -
Basic incident response concepts
00:00 -
Conduct incident management
00:00 -
operate and maintain detective and preventative measures
00:00 -
Implement backup and recovery strategies
00:00 -
Apply security principles to site and facility designs part 1
00:00 -
Assignment 19: Applied Case: Real-Life Situation | Conwy Castle
01:53 -
Apply security principles to site and facility designs part 2
00:00 -
Site and facility security controls part 1
00:00 -
Assignment 20: Applied Case: Real-Life Situation | Northgate Information Solutions
03:04 -
Site and facility security controls part 2
00:00 -
Personnel safety and security concerns
00:00 -
Assignment 21: Applied Case: Stark Industries | UEBA Benefits
01:49 -
Assignment 22: Applied Case: Stark Industries | DCS and BCM
02:02 -
Replace with Quiz
00:00 -
Terms and conditions
00:00
Bringing it all together
-
Overview
00:00 -
Security governance: the ultimate administrative control set
00:00 -
Security frameworks in operational use
00:00 -
Forensic Investigations
00:00 -
Building organizational capacity to address BC and DR
00:00 -
Assignment 23: Applied Case: ACME Business Services, SA
00:00 -
Contribute to and enforce personnel security policies and procedures
00:00 -
Assignment: Applied Case 24: ACME Data Control Co | Vendor, Consultant, & Contractor Agreements
00:00 -
Operationalizing Risk Management
00:00 -
Assignment 25: Applied Case: ACME Health, LLC
00:00 -
Apply IT supply chain risk management concepts
00:00 -
Assignment 26: Applied Case: ACME Distribution Inc
00:00 -
Establish and maintain a security awareness, education and training
00:00 -
Assignment 27: Applied Case: UAV | Part 3
00:00 -
Replace with Quiz
00:00 -
Terms and conditions
00:00
Practice Exams
-
Overview
00:00 -
Practice Exam #1
00:00 -
Practice Exam #2
00:00
Certification Next steps
-
Overview
00:00 -
Cissp Experience Requirements
00:00 -
Before the Exam
00:00 -
Exam Outline
00:00 -
Scheduling and updates
00:00 -
Taking the exam
00:00 -
At the Test Centre
00:00 -
After the Exam
00:00
Reference Material
-
Retakes, endorsements and recertification
00:00 -
Tips and tricks
00:00 -
Links and general information
00:00 -
Glossary
00:00