O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Certified Information Systems Security Professional (CISSP)

Video Description

The CISSP Certification is administered by the International Information Systems Security Certification Consortium or (ISC)². (ISC)² promotes the CISSP exam as an aid to evaluating personnel performing information security functions. Candidates for this exam are typically network security professionals and system administrators with at least four years of direct work experience in two or more of the ten test domains. As the first ANSI ISO accredited credential in the field of information security, the Certified Information Systems Security Professional (CISSP) certification provides information security professionals with not only an objective measure of competence, but a globally recognized standard of achievement.

Table of Contents

  1. Module 0
    1. Course Introduction 00:00:19
  2. Module 1
    1. The CISSP Exam 00:00:16
    2. CISSP Certification Goals 00:01:26
    3. Security Professional Certification Value 00:01:26
    4. Exam Common Body of Knowledge 00:00:50
    5. Becoming a CISSP 00:02:25
  3. Module 2
    1. Cryptography 00:00:19
    2. Cryptography Concepts Part1 00:06:19
    3. Cryptography Concepts Part2 00:02:53
    4. History of Cryptography 00:06:47
    5. Cryptosystem Features 00:02:13
    6. Encryption Systems Part1 00:06:24
    7. Encryption Systems Part2 00:03:04
    8. Substitution Ciphers 00:01:59
    9. Symmetric Algorithms Part1 00:07:20
    10. Symmetric Algorithms Part2 00:05:12
    11. Asymmetric Algorithms 00:05:07
    12. Message Integrity 00:07:52
    13. Digital Signatures 00:01:28
    14. Public Key Infrastructure Part1 00:06:19
    15. Public Key Infrastructure Part2 00:02:04
    16. Trusted Platform Module 00:02:41
    17. Encryption Communication Levels 00:01:56
    18. E-Mail Security 00:01:47
    19. Internet Security 00:05:35
    20. Cryptography Attacks 00:05:48
  4. Module 3
    1. Physical (Environmental) Security 00:00:19
    2. Threat Mitigation Techniques 00:01:05
    3. Geographical-Man Made and Political Threats 00:06:09
    4. Site and Facility Design 00:04:35
    5. Perimeter Security 00:05:27
    6. Building and Internal Security 00:04:18
    7. Secure Data Centers and Fire Detection Systems 00:03:54
    8. Types of Power Issues 00:03:36
    9. HVAC Guidelines 00:00:54
    10. Equipment Security and Personal Security 00:01:43
  5. Module 4
    1. Security Architecture and Design 00:00:23
    2. Security Model Concepts 00:00:57
    3. System Architecture 00:03:44
    4. Computing Platforms 00:01:57
    5. Virtual Computing and Security Services 00:02:28
    6. System Components 00:03:55
    7. Memory Concepts 00:04:08
    8. Enforcing Process Security and Multitasking 00:02:08
    9. System Security Architecture 00:05:05
    10. Security Models and Modes Part1 00:04:59
    11. Security Models and Modes Part2 00:04:28
    12. System Evaluation and Assurance Levels 00:03:36
    13. Certification and Accreditation 00:01:28
    14. Security Architecture Threats 00:02:47
    15. Database Security and Distributed Systems Security 00:03:41
  6. Module 5
    1. Access Control 00:00:20
    2. Access Control Concepts 00:02:41
    3. Identification and Authentication 00:02:31
    4. Password Types and Management 00:04:39
    5. Ownership-Character-Physiological-Behavioral Factors 00:04:10
    6. Biometric Considerations 00:03:09
    7. Authorization Concepts Part1 00:03:28
    8. Authorization Concepts Part2 00:04:00
    9. User Accountability 00:03:10
    10. Vulnerability Assessment 00:00:49
    11. Penetration Testing and Threat Modeling 00:03:36
    12. Access Control Categories-Types-Models and Administration 00:06:38
    13. Provisioning Life Cycle and Access Control Monitoring 00:03:48
    14. Access Control Threats 00:05:12
  7. Module 6
    1. Software Development Security 00:00:22
    2. System Development Life Cycle 00:01:24
    3. Software Testing and Validation 00:01:48
    4. Software Development Security Best Practices 00:00:58
    5. Software Development Methods 00:06:54
    6. Programming Languages 00:05:03
    7. Database Architecture and Models 00:01:29
    8. Database Interface Languages 00:00:52
    9. Data Warehouse-Mining and Threats 00:01:05
    10. Database and Application Access Control 00:01:50
    11. Monitoring for Problems 00:01:28
    12. Software Threats and Security 00:06:45
  8. Module 7
    1. Information Security Governance and Risk Management 00:00:14
    2. Principles and Terms 00:03:48
    3. Security Frameworks and Methodologies Part1 00:05:37
    4. Security Frameworks and Methodologies Part2 00:05:16
    5. Risk Assessment 00:01:52
    6. Asset Values-Vulnerabilities and Threats 00:02:21
    7. Quantitative Risk Analysis 00:06:00
    8. Safeguard Selection 00:02:38
    9. Risk Management 00:04:39
    10. Security Governance Components 00:01:52
    11. Security Policies 00:04:22
    12. Classification Life Cycle 00:02:21
    13. Responsibilities and Roles 00:02:11
    14. Personnel Security 00:01:44
    15. Security Awareness Training 00:02:28
  9. Module 8
    1. Telecommunications and Network Security 00:00:16
    2. OSI and TCIP Models Part1 00:07:11
    3. OSI and TCIP Models Part2 00:01:52
    4. IP Addressing 00:02:54
    5. Transmission Methods 00:03:11
    6. Types of Cabling 00:02:55
    7. Network Topologies 00:06:20
    8. Network Protocols and Services 00:04:00
    9. Network Routing and Devices 00:07:22
    10. Network Connection Types Part1 00:04:02
    11. Network Connection Types Part2 00:04:40
    12. Network Authentication 00:02:47
    13. Wireless Technologies 00:02:30
    14. WLAN Security Methods 00:01:55
    15. Network Threats and Cabling Behaviors 00:06:02
  10. Module 9
    1. Operation Security 00:00:16
    2. Operation Security Concepts 00:01:49
    3. Protecting Tangible and Intangible Assets 00:01:28
    4. Asset and Media Management 00:02:56
    5. Storage Options 00:02:05
    6. Network and Resource Management 00:00:50
    7. Incident Response and Change Management 00:01:13
    8. Patch Management-Audit and Review 00:00:44
    9. Threats and Preventative Measures 00:00:53
    10. Trusted Paths-Trusted Recovery and System Hardening 00:01:03
    11. Monitoring and Reporting 00:01:00
  11. Module 10
    1. Business Continuity and Disaster Recovery 00:00:18
    2. Business Continuity and Disaster Recovery Concepts Part1 00:06:02
    3. Business Continuity and Disaster Recovery Concepts Part2 00:02:05
    4. BIA Development 00:06:32
    5. Business Continuity Planning 00:02:27
    6. Preventive Controls 00:02:54
    7. Recovery Strategies Part1 00:07:23
    8. Recovery Strategies Part2 00:06:14
    9. Data Backup Types 00:05:15
    10. Data Recovery Terms 00:03:38
    11. Critical Teams and Duties 00:02:12
    12. BCP Testing 00:02:48
  12. Module 11 00:02:31
  13. Digital Crime 00:02:31
  14. Computer Crime Concepts 00:02:45
  15. Major Legal Systems 00:03:16
  16. Intellectual Property Law 00:03:47
  17. Privacy Part1 00:04:40
  18. Privacy Part2 00:07:20
  19. Liability 00:03:17
  20. Incident Response 00:03:59
  21. Forensic and Digital Investigations Part1 00:05:53
  22. Forensic and Digital Investigations Part2 00:02:57
  23. Evidence Part1 00:06:07
  24. Legal, Regulations, Investigations, and Compliance 00:00:16
  25. Evidence Part2 00:01:26
  26. Security Professional Ethics 00:04:04
  27. Course Outro 00:00:07