O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CISSP Video Course Domain 9 – Application Security

Video Description

The fast, powerful way to prepare for your CISSP exam!

30+ hours of personal video training from leading security expert Shon Harris

Achieving the (ISC)2’s globally recognized CISSP can give your IT career a lift. In this DVD, the world’s #1 CISSP trainer brings her legendary five-day boot camp to your computer screen. Packed with over 30 hours of instruction adapted from Shon’s classes, this video course includes realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-word settings. Preparing for the CISSP has never been this easy or convenient.

Master the skills and concepts you need for all ten CISSP common body of knowledge domains:

  • Access Control

  • Application Security

  • Business Continuity and Disaster Recovery Planning

  • Cryptography

  • Information Security and Risk Management

  • Legal, Regulations, Compliance, and Investigations

  • Operations Security

  • Physical (Environmental) Security

  • Security Architecture and Design

  • Telecommunications and Network Security

  • System Requirements

    OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
    MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
    COMPUTER: 500MHz or higher CPU; 128MB RAM or more

    Table of Contents

    1. Course Introduction 00:07:24
    2. Domain 9 – Application Security 00:01:24
    3. How Did We Get Here? 00:00:50
    4. Why Are We Not Improving at a Higher Rate? 00:01:54
    5. Usual Trend of Dealing with Security 00:02:17
    6. Software Development Tools 00:02:48
    7. Security Issues 00:01:12
    8. Language Types 00:04:06
    9. Turn Into Machine Code 00:01:16
    10. New and Old 00:00:55
    11. Object-Oriented Programming 00:01:07
    12. Classes and Objects 00:02:29
    13. Functions and Messages 00:01:45
    14. Object-Oriented Programming Characteristic 00:01:12
    15. Polymorphism 00:02:29
    16. Module Characteristics 00:00:56
    17. Low Cohesion 00:01:06
    18. Coupling 00:00:48
    19. Agenda 2 00:01:21
    20. Distributed Computing 00:00:56
    21. Distributed Computing – ORBs 00:00:50
    22. Common Object Request Broker Architecture 00:00:41
    23. COM Architecture 00:01:38
    24. Enterprise Java Beans 00:00:51
    25. J2EE Platform Example 00:01:32
    26. Linking Through COM 00:02:03
    27. Mobile Code with Active Content 00:03:14
    28. Java and Applets 00:02:59
    29. Database Systems 00:01:37
    30. Database Model 00:03:23
    31. Object-Oriented Database 00:01:00
    32. Benefits of OO Database Model 00:01:41
    33. Database Models – Relational Components 00:04:46
    34. Database Integrity 00:01:24
    35. Different Modeling Approaches 00:01:16
    36. Database Access Methods 00:06:18
    37. Database Connectivity 00:01:57
    38. Database Security Mechanisms 00:02:12
    39. Rollback Control 00:01:11
    40. Checkpoint Control 00:00:46
    41. Checkpoint Protection 00:01:12
    42. Lock Controls 00:00:48
    43. Deadlock Example 00:01:34
    44. Two-Phase Commit 00:00:42
    45. Lock Controls Help to Provide ACID 00:03:03
    46. Inference Attack 00:01:09
    47. Database View Control 00:00:56
    48. Common Components 00:00:41
    49. Data Warehousing 00:03:08
    50. Using a Data Warehouse 00:01:21
    51. Metadata 00:00:11
    52. Database Component 00:01:30
    53. Data Mart 00:02:23
    54. Potential Malicious Traffic Tunneling Through Port 80 00:01:46
    55. OLTP 00:02:44
    56. Knowledge Management 00:00:43
    57. Knowledge Components 00:00:43
    58. HR Example 00:00:57
    59. Knowledge Discovery In Databases 00:01:30
    60. Expert Systems 00:04:15
    61. Software Development Models 00:03:49
    62. Project Development – Phases I through V 00:01:01
    63. Project Development – Phases VI and VII 00:01:06
    64. Testing Types 00:01:58
    65. Data Contamination Controls 00:01:02
    66. Best Practices for Testing 00:01:18
    67. Test for Specific Threats 00:01:31
    68. Verification versus Validation 00:01:01
    69. Evaluating the Resulting Product 00:01:09
    70. Controlling How Changes Take Place 00:02:58
    71. Administrative Controls 00:02:38
    72. Common Information Flow 00:02:42
    73. Tier Approach and Communication Components 00:01:00
    74. Tiered Network Architectures 00:00:58
    75. Sensitive Data Availability 00:05:09
    76. Cookies 00:04:24
    77. Find Out Where You Have Been 00:00:57
    78. Pulling Data 00:01:46
    79. Provide the Hackers with Tools 00:02:09
    80. Common Web Server Flaws 00:01:08
    81. Improper Data Validation 00:01:59
    82. Uniform Resource Locator (URL) 00:02:00
    83. Directory Traversal 00:01:04
    84. Buffer Overflow 00:00:57
    85. Cross-Site Scripting Attack 00:01:51
    86. Common SQL Injection Attack 00:01:30
    87. Attacking Mis-configurations 00:01:12
    88. CGI Information 00:03:19
    89. Authentication 00:00:52
    90. Protecting Traffic 00:06:40
    91. Rolling 'em Out 00:04:30
    92. Virus 00:04:46
    93. More Malware 00:01:48
    94. Trojans 00:02:39
    95. A Back Orifice Attack! 00:00:59
    96. NetBus and Hoaxes 00:01:35
    97. Malware Protection Types 00:01:02
    98. Signature Scanning 00:00:58
    99. Monitoring Activities 00:00:56
    100. Monitoring for Changes 00:01:21
    101. More Bad Stuff 00:02:01
    102. Disclosing Data In an Unauthorized Manner 00:01:32
    103. Covert Timing Channel 00:01:03
    104. Circumventing Access Controls 00:01:17
    105. Attacks 00:01:29
    106. Attack Type – Race Condition 00:05:43
    107. How a Buffer Overflow Works 00:01:39
    108. Watching Network Traffic 00:01:23
    109. Traffic Analysis 00:01:07
    110. Functionally Two Different Types of Rootkits 00:01:19
    111. Examples of Trojaned Files 00:00:48
    112. Domain 9 Review 00:03:56