O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CISSP Exam Prep

Video Description

More than 6 Hours of Video Instruction

More than 6 hours of concentrated training on the CISSP exam’s most challenging concepts along with exposure to the most common exam traps, pitfalls, and difficulties. The author additionally walks through sample questions for each domain in the exam, so you can see the types of exam questions you’ll experience and learn how to work through complications and snags you might find on the exam. This is the perfect course for anyone about to take the exam.

Description

CISSP Exam Prep LiveLessons provides 6+ hours of deep-dive training on common CISSP exam traps, pitfalls, and difficulties. The goal of theCISSP Exam Prep LiveLessons is to give you the edge you need to pass the rigorous exam and attain the CISSP Certification. This course is designed to familiarize you with test-taking strategies, review “must know”, and “challenging” concepts, practice answering exam questions, and most importantly give you the confidence to pass your exam with flying colors. This course is NOT designed to be a comprehensive study guide. Instead we will be focusing on components of the ISC2 CBK (common body of knowledge) that fall into one of four categories.

Sari Greene, best-selling author of the CISSP Complete Video Course, will also walk you through practice questions throughout, highlighting how to answer difficult questions and reduce errors. She will end with a discussion on winning exam day strategies, so you can make the most of your time as you prepare. This is targeted exam prep training, so you can make the most of your knowledge when taking the test.

Topics include:

  1. Areas that many candidates have found difficult, such as cryptography.
  2. Foundation concepts and models that are generally unfamiliar; for example, * and simple properties, the relationship between the OSI and TCP/IP models, and OECD privacy principles.
  3. Emerging topics such as Federated Identify Management, IP Convergence, or Information Security Continuous Monitoring (ISCM) processes.
  4. Specialized areas of knowledge such digital forensics, mitigating source code flaws such as XXS or SQL injection, or software development processes.

About the Instructor

Sari Greene is an information security practitioner, author, and entrepreneur. She founded Sage Data Security in 2002 and has amassed thousands of hours in the field, working with a spectrum of technical, operational, and management personnel, as well as boards of directors, regulators, and service providers. From 2006 through 2010, she served as the managing director for the MEAPC, a coalition of 24 financial institutions that embrace a mission of preventing information theft and fraud through public education and awareness. Since 2010, she has served as the chair of the annual Cybercrime Symposium held in Portsmouth, New Hampshire. Sari’s first text was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel, followed soon after by the first edition of Security Policies and Procedures: Principles and Practices. She has published a number of articles and whitepapers related to information security and has been quoted in The New York Times, Wall Street Journal, CNN, and on CNBC. She speaks regularly at security conferences and workshops around the country and is a frequent guest lecturer. Sari has an MBA from the University of New Hampshire system and has earned an array of government and industry certifications and accreditations, including ISACA Certification in Risk and Information Systems Control (CRISC), ISACA Certification in Security Management (CISM), (ISC)2 Certification in Information Systems Security (CISSP-ISSMP), and Microsoft Certified Network Engineer (MCSE), and is certified by the National Security Agency to conduct NSA-IAM assessments for federal government agencies and contractors. You can contact Sari at sari@sarigreene.com, follow her on Twitter at @sari_greene or visit her website http://www.sarigreene.com.

Skill Level

  • Beginning to Intermediate

What You Will Learn

  • Tips to prepare for the Exam
  • Targeted deep-dive lessons on the most challenging topics and concepts on the exam
  • Practice question walkthrough, so you can learn techniques for answering questions and also see what types of questions might appear on the exam
  • Winning exam day strategies

This course is designed to be used by anyone hoping to take the CISSP exam.

The ideal target student has already studied each domain on the CISSP exam.

About LiveLessons Video Training

Pearson’s LiveLessons video training series publishes the industry’s leading video tutorials for IT pros, developers, sys admins, devops, network engineers, and certification candidates. LiveLessons feature the highest-quality professional skills training led by recognized author instructors published by Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include: IT certification, programming, development, networking, software skills for the home, office, and business, and more. Your purchase provides you with lifetime online access to the content.

http://www.pearsonitcertification.com/livelessons

Table of Contents

  1. Introduction
    1. Course Intro 00:01:25
  2. Module 1: Preparing for the Exam
    1. Module Intro 00:00:06
  3. Lesson 1: The CISSP Exam
    1. Learning objectives 00:00:41
    2. 1.1 About this Course 00:02:49
    3. 1.2 Understanding the CISSP Exam Structure 00:02:47
    4. 1.3 Preparing for the Types of Questions You Will Encounter on the Exam 00:12:24
  4. Lesson 2: Test Taking Strategies
    1. Learning objectives 00:00:56
    2. 2.1 Test Taking Rules of Thumb 00:04:41
    3. 2.2 The Zen of Test Taking 00:01:04
  5. Module 2: Challenging Topics and Concepts
    1. Module Intro 00:00:06
  6. Lesson 3: Domain 1—Security and Risk Management
    1. Learning objectives 00:00:53
    2. 3.1 Understanding Quantitative Risk Assessments 00:14:08
    3. 3.2 Exploring Business Impact Analysis 00:07:46
    4. 3.3 Exam Practice Questions 00:14:39
  7. Lesson 4: Domain 2—Asset Security
    1. Learning objectives 00:00:43
    2. 4.1 Grasping Privacy Concepts 00:09:44
    3. 4.2 Understanding Information Lifecycle 00:08:27
    4. 4.3 Exam Practice Questions 00:11:00
  8. Lesson 5: Domain 3—Security Engineering
    1. Learning objectives 00:01:00
    2. 5.1 Applying the Star and Simple Properties 00:04:43
    3. 5.2 Deciphering Ciphers and Algorithms 00:12:09
    4. 5.3 Demystifying Symmetric and Asymmetric Encryption 00:05:57
    5. 5.4 Applying Asymmetric Encryption 00:06:08
    6. 5.5 Understanding Hashing 00:13:07
    7. 5.6 Examining Digital Signatures 00:04:27
    8. 5.7 Deconstructing the Digital Certificate Lifecycle 00:06:27
    9. 5.8 Understanding Cryptographic Protocols 00:09:09
    10. 5.9 Assessing Cryptographic Attacks 00:08:47
    11. 5.10 Understanding Database Security 00:09:06
    12. 5.11 Exam Practice Questions 00:19:48
  9. Lesson 6: Domain 4—Communication and Network Security
    1. Learning objectives 00:00:48
    2. 6.1 Analyzing OSI & TCP/IP Model Relevance 00:06:11
    3. 6.2 Understanding Decision Engines 00:04:26
    4. 6.3 Surveying Non-IP Network Protocols 00:04:39
    5. 6.4 Exploring VoIP 00:05:13
    6. 6.5 Securing 802.1x Wireless Networks 00:08:30
    7. 6.6 Assessing Network Attacks 00:07:04
    8. 6.7 Exam Practice Questions 00:13:04
  10. Lesson 7: Domain—5 Identity and Access Management
    1. Learning objectives 00:00:42
    2. 7.1 Understanding Mutual Authentication 00:10:53
    3. 7.2 Investigating Federated Identity 00:10:14
    4. 7.3 Surveying Access Control Models 00:05:06
    5. 7.4 Exam Practice Questions 00:09:22
  11. Lesson 8: Domain 6—Security Assessment and Testing
    1. Learning objectives 00:00:42
    2. 8.1 Defining the Penetration Testing Rules of Engagement 00:08:06
    3. 8.2 Interpreting SSAE16 SOC Reports 00:07:37
    4. 8.3 Understanding Information Security Continuous Monitoring (ISCM) 00:04:54
    5. 8.4 Exam Practice Questions 00:09:22
  12. Lesson 9: Domain 7—Security Operations
    1. Learning objectives 00:00:48
    2. 9.1 Evaluating Vulnerability, Change, and Configuration Management 00:06:40
    3. 9.2 Assessing Resiliency and Fault Tolerance 00:10:08
    4. 9.3 Deciphering Digital Forensics and Evidence Handling 00:12:28
    5. 9.4 Protecting People and Places 00:06:32
    6. 9.5 Exam Questions 00:08:36
  13. Lesson 10: Domain 8—Software Development Security
    1. Learning objectives 00:00:39
    2. 10.1 Evaluating Source Code Flaws 00:15:07
    3. 10.2 Understanding the Software Development Processes 00:09:04
    4. 10.3 Surveying Software Testing 00:05:20
    5. 10.4 Deconstructing the Product Development Lifecycle 00:05:56
    6. 10.5 Exam Practice Questions 00:07:20
  14. Module 3: CISSP Exam and Beyond
    1. Module Intro 00:00:06
  15. Lesson 11: Taking Your Exam
    1. Learning objectives 00:00:23
    2. 11.1 The Week Leading Up to the Exam 00:01:59
    3. 11.2 What to Do on Test Day 00:02:09
    4. 11.3 What to Expect at the Testing Center 00:04:13
    5. 11.4 Attaining and Maintaining Your CISSP Certification 00:01:24
  16. Summary
    1. Course Summary 00:00:46