O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Learning Path: CISSP

Video Description

Overview

This Learning Path includes CISSP and CISSP Exam Prep.

Prerequisites

  • Five years of experience in IT networking, network storage, or data center administration

Description

CISSP Complete Video Course contains 24 hours of training with content divided into 9 lessons with 94 video sub-lessons. The videos consist of live trainer discussions, screencasts, animations, and live demos. The video lessons in this course review each exam objective so you can use this course as a complete study tool for taking the CISSP exam. Instruction throughout offers detailed explanations, demos, tips, and more.

CISSP Exam Prep LiveLessons provides 7 hours of deep-dive training on common CISSP exam traps, pitfalls, and difficulties. The goal of theCISSP Exam Prep LiveLessonsis to give you the edge you need to pass the rigorous CISSP exam and successfully gain certification. This course is designed to familiarize you with test-taking strategies, review “must know” and “challenging” concepts, practice answering exam questions, and most importantly, give you the confidence to pass your exam with flying colors. This course is NOT designed to be a comprehensive study guide. Instead we will be focusing on components of the ISC2 CBK (common body of knowledge) that fall into one of four categories.

Sari Greene, best-selling author of theCISSP Complete Video Course, will also walk you through practice questions throughout, highlighting how to answer difficult questions and reduce errors. She will end with a discussion on winning exam day strategies, so you can make the most of your time as you prepare. This is targeted exam prep training, so you can make the most of your knowledge when taking the test.

About the Instructor

Sari Greeneis an information security practitioner, author, educator, and entrepreneur. In 2003, Sari founded one of the first dedicated cybersecurity consultancies. She is a recognized leader in the field of cybersecurity and has amassed thousands of hours in the field working with a spectrum of technical, operational, compliance and management personnel as well as board of directors, regulators, service providers, and law enforcement agencies.

Sari’s first text was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel followed soon after by the first edition ofSecurity Policies and Procedures: Principles and Practices. The 2nd edition,Security Program and Policies: Principles and Practicesis currently being used in undergraduate and graduate programs nationwide. She is also the author and presenter of the best-sellingCISSP Complete Video Course. Sari has published a number of articles related to cybersecurity, has been quoted in theNew York Times,Wall Street Journal, CNN and on CNBC, speaks regularly at cybersecurity, legal, financial and healthcare conferences and workshops around the country, and is a frequent guest lecturer.

Sari serves on the Bangor Savings Bank Board of Directors and is chair of the Risk Management Committee. She provided expert witness testimony in the groundbreakingPATCO versus Ocean National Bankcase, represents industry on the Massachusetts Bankers Association Cybersecurity Task Force, and is a member of the American Bankers Association cybersecurity faculty.

Sari earned her MBA from the University of New Hampshire system. She holds multiple industry accreditations including CISSP-ISSMP, CRISC, CISM, MCSE, and NSA/IAM. She is also certified in Offshore Emergency Medicine.

You can contact Sari atsari@sarigreene.com, follow her on Twitter at @sari_greene or visit her website http://www.sarigreene.com

About LiveLessons Video Training

Pearson’s LiveLessons video training series publishes the industry’s leading video tutorials for IT pros, developers, sys admins, devops, network engineers, and certification candidates. LiveLessons feature the highest-quality professional skills training led by recognized author instructors published by Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include: IT certification, programming, development, networking, software skills for the home, office, and business, and more. Your purchase provides you with lifetime online access to the content.

http://www.pearsonitcertification.com/livelessons

Table of Contents

  1. CISSP Complete Video Course by Sari Greene
  2. Introduction
    1. CISSP Complete Video Course: Introduction 00:04:26
  3. Lesson 1: Security and Risk Management
    1. Learning Objectives, Part 1 00:01:13
    2. 1.1 Examining Information Security Fundamentals 00:14:44
    3. 1.2 Applying Security Governance Concepts--Part 1 00:13:52
    4. 1.3 Applying Security Governance Concepts--Part 2 00:16:07
    5. 1.4 Designing and Implementing Governance Documents 00:20:33
    6. 1.5 Understanding Legal Systems and Related Laws--Part 1 00:07:47
    7. 1.6 Understanding Legal Systems and Related Laws--Part 2 00:14:33
    8. 1.7 Understanding Regulatory and Contractual Requirements--Part 1 00:10:21
    9. 1.8 Understanding Regulatory and Contractual Requirements--Part 2 00:15:54
    10. 1.9 Implementing Personnel Security 00:21:10
    11. 1.10 Implementing Third-Party Security 00:09:57
    12. Mid-Lesson Review 00:10:50
    13. Learning Objectives, Part 2 00:00:45
    14. 1.11 Understanding and Applying Threat Modeling 00:12:20
    15. 1.12 Understanding & Implementing Risk Management Concepts 00:19:31
    16. 1.13 Exploring Risk Assessment Methodologies 00:11:30
    17. 1.14 Conducting a Quantitative Risk Assessment 00:24:52
    18. 1.15 Conducting a Qualitative Risk Assessment 00:21:38
    19. 1.16 Selecting Controls and Countermeasures 00:16:59
    20. 1.17 Managing Supply Chain Risk 00:12:09
    21. 1.18 Implementing Business Continuity Risk Management 00:15:54
    22. End of Lesson Review 00:18:08
  4. Lesson 2: Asset Security
    1. Learning Objectives 00:00:59
    2. 2.1 Classifying Assets 00:18:45
    3. 2.2 Managing Assets 00:14:13
    4. 2.3 Protecting Data Privacy 00:14:56
    5. 2.4 Ensuring Appropriate Retention and Destruction 00:19:28
    6. 2.5 Determining Data Security Controls 00:16:05
    7. End of Lesson Review 00:09:38
  5. Lesson 3: Security Engineering
    1. Learning Objectives, Part 1 00:01:08
    2. 3.1 Implementing Secure Design Principles 00:19:19
    3. 3.2 Understanding Security Models 00:15:36
    4. 3.3 Selecting Controls Based on Systems Security Evaluation Models 00:12:48
    5. 3.4 Recognizing Information Systems Security Capabilities 00:15:14
    6. 3.5 Assessing and Mitigating Security Architecture Vulnerabilities 00:15:11
    7. 3.6 Assessing and Mitigating Cloud Vulnerabilities 00:11:53
    8. 3.7 Assessing and Mitigating Web Vulnerabilities 00:11:27
    9. 3.8 Assessing and Mitigating Mobile and Remote Computing Vulnerabilities 00:13:32
    10. Mid-Lesson Review 00:09:32
    11. Learning Objectives, Part 2 00:01:18
    12. 3.9 Introducing Cryptography 00:12:49
    13. 3.10 Applying Cryptography--Encryption Part 1 00:16:51
    14. 3.11 Applying Cryptography--Encryption Part 2 00:16:54
    15. 3.12 Applying Cryptography--Public Key Infrastructure 00:20:04
    16. 3.13 Applying Cryptography--Hashing and Digital Signature 00:24:32
    17. 3.14 Applying Cryptography--Cryptographic Protocols 00:08:07
    18. 3.15 Applying Cryptography--Crypto Attacks 00:09:56
    19. 3.16 Applying Secure Principles to Site and Facility Design 00:13:50
    20. 3.17 Securing Information Processing Facilities and Equipment 00:10:33
    21. End of Lesson Review 00:12:13
  6. Lesson 4: Communications and Network Security
    1. Learning Objectives 00:01:36
    2. 4.1 Reviewing OSI and TCP/IP Models 00:25:58
    3. 4.2 Understanding IP Convergence and Extensibility 00:08:48
    4. 4.3 Securing Wireless Networks 00:11:14
    5. 4.4 Using Cryptography to Maintain Communication Security 00:07:08
    6. 4.5 Securing Network Access 00:17:23
    7. 4.6 Securing Data Transmissions 00:15:21
    8. 4.7 Securing Multimedia Collaboration 00:12:42
    9. 4.8 Securing Virtual Private Networks 00:16:26
    10. 4.9 Securing Endpoints 00:26:16
    11. 4.10 Preventing and Mitigating Network Attacks 00:25:15
    12. End of Lesson Review 00:15:53
  7. Lesson 5: Identity and Access Management
    1. Learning Objectives 00:01:08
    2. 5.1 Understanding Access Control Fundamentals 00:11:50
    3. 5.2 Examining Identification Schemas 00:15:43
    4. 5.3 Understanding Authentication Options 00:22:42
    5. 5.4 Understanding Authentication Systems 00:08:54
    6. 5.5 Implementing Access and Authorization Criteria 00:11:58
    7. 5.6 Implementing Access Control Models 00:14:18
    8. 5.7 Implementing Access Control Techniques and Technologies 00:11:37
    9. 5.8 Identity and Access Provisioning 00:13:35
    10. End of Lesson Review 00:11:51
  8. Lesson 6: Security Assessment and Testing
    1. Learning Objectives 00:01:10
    2. 6.1 Testing and Examination T&E Overview 00:13:35
    3. 6.2 Security Assessment Planning 00:12:46
    4. 6.3 Conducting Security Examinations 00:12:05
    5. 6.4 Conducting Security Testing--Target Identificaton 00:12:50
    6. 6.5 Conducting Security Testing--Password Cracking 00:09:59
    7. 6.6 Conducting Security Testing--Penetration Testing 00:12:57
    8. 6.7 Understanding Log Analysis 00:14:24
    9. 6.8 Implementing Information Security Continuous Monitoring (ISCM) 00:12:48
    10. 6.9 Understanding Third-Party Audits and Examinations 00:12:53
    11. End of Lesson Review 00:10:24
  9. Lesson 7: Security Operations
    1. Learning Objectives, Part 1 00:01:21
    2. 7.1 Managing Privileged Accounts 00:12:55
    3. 7.2 Operating and Maintaining Firewalls and IDS/IPS 00:18:06
    4. 7.3 Conducting Logging and Monitoring Activities 00:12:16
    5. 7.4 Implementing and Supporting Vulnerability and Patch Management 00:21:39
    6. 7.5 Implementing and Supporting Malware Management 00:17:19
    7. 7.6 Implementing and Supporting Media Management 00:12:11
    8. 7.7 Participating in the Configuration Management Process 00:12:47
    9. Mid-Lesson Review 00:10:04
    10. Learning Objectives, Part 2 00:00:52
    11. 7.8 Managing System Resilience and Fault Tolerance 00:19:37
    12. 7.9 Implementing Disaster Recovery Processes 00:16:12
    13. 7.10 Managing DR Plan Maintenance 00:13:19
    14. 7.11 Understanding and Supporting Investigations 00:15:19
    15. 7.12 Understanding Digital Forensics 00:12:58
    16. 7.13 Supporting Incident Management 00:21:37
    17. 7.14 Securing People and Places 00:10:43
    18. End of Lesson Review 00:13:49
  10. Lesson 8: Software Development Security
    1. Learning Objectives 00:01:12
    2. 8.1 Managing the Software Development Lifecycle 00:15:01
    3. 8.2 Understanding Software Development Approaches, Models, and Tools 00:14:19
    4. 8.3 Understanding Source Code Security Issues 00:13:18
    5. 8.4 Managing Database Security 00:13:35
    6. 8.5 Assessing the Security Impact of Acquired Software 00:08:56
    7. End of Lesson Review 00:12:44
  11. Lesson 9: Preparing for the Exam
    1. Learning Objectives 00:00:36
    2. 9.1 Security and Risk Management Domain: Review and Study Roadmap 00:08:48
    3. 9.2 Asset Security Domain: Review and Study Roadmap 00:02:44
    4. 9.3 Security Engineering Domain: Review and Study Roadmap 00:06:39
    5. 9.4 Communications and Network Security Domain: Review and Study Roadmap 00:04:34
    6. 9.5 Identity and Access Domain: Review and Study Roadmap 00:03:15
    7. 9.6 Security Assessment and Testing Domain: Review and Study Roadmap 00:03:36
    8. 9.7 Security Operations Domain: Review and Study Roadmap 00:05:35
    9. 9.8 Software Development Security Domain: Review and Study Roadmap 00:03:09
    10. 9.9 Taking the CISSP Examination 00:04:36
  12. Summary
    1. CISSP Complete Video Course: Summary 00:00:36
  13. CISSP Exam Prep Livelessons by Sari Greene
  14. CISSP Exam Prep Livelessons: Introduction
    1. Course Intro 00:01:25
  15. Module 1: Preparing for the Exam
    1. Module Intro 00:00:06
  16. Lesson 1: The CISSP Exam
    1. Learning objectives 00:00:41
    2. 1.1 About this Course 00:02:49
    3. 1.2 Understanding the CISSP Exam Structure 00:02:47
    4. 1.3 Preparing for the Types of Questions You Will Encounter on the Exam 00:12:24
  17. Lesson 2: Test Taking Strategies
    1. Learning objectives 00:00:56
    2. 2.1 Test Taking Rules of Thumb 00:04:41
    3. 2.2 The Zen of Test Taking 00:01:04
  18. Module 2: Challenging Topics and Concepts
    1. Module Intro 00:00:06
  19. Lesson 3: Domain 1--Security and Risk Management
    1. Learning objectives 00:00:53
    2. 3.1 Understanding Quantitative Risk Assessments 00:14:08
    3. 3.2 Exploring Business Impact Analysis 00:07:46
    4. 3.3 Exam Practice Questions 00:14:39
  20. Lesson 4: Domain 2--Asset Security
    1. Learning objectives 00:00:43
    2. 4.1 Grasping Privacy Concepts 00:09:44
    3. 4.2 Understanding Information Lifecycle 00:08:27
    4. 4.3 Exam Practice Questions 00:11:00
  21. Lesson 5: Domain 3--Security Engineering
    1. Learning objectives 00:01:00
    2. 5.1 Applying the Star and Simple Properties 00:04:43
    3. 5.2 Deciphering Ciphers and Algorithms 00:12:09
    4. 5.3 Demystifying Symmetric and Asymmetric Encryption 00:05:57
    5. 5.4 Applying Asymmetric Encryption 00:06:08
    6. 5.5 Understanding Hashing 00:13:07
    7. 5.6 Examining Digital Signatures 00:04:27
    8. 5.7 Deconstructing the Digital Certificate Lifecycle 00:06:27
    9. 5.8 Understanding Cryptographic Protocols 00:09:09
    10. 5.9 Assessing Cryptographic Attacks 00:08:47
    11. 5.10 Understanding Database Security 00:09:06
    12. 5.11 Exam Practice Questions 00:19:48
  22. Lesson 6: Domain 4--Communication and Network Security
    1. Learning objectives 00:00:48
    2. 6.1 Analyzing OSI & TCP/IP Model Relevance 00:06:11
    3. 6.2 Understanding Decision Engines 00:04:26
    4. 6.3 Surveying Non-IP Network Protocols 00:04:39
    5. 6.4 Exploring VoIP 00:05:13
    6. 6.5 Securing 802.1x Wireless Networks 00:08:30
    7. 6.6 Assessing Network Attacks 00:07:04
    8. 6.7 Exam Practice Questions 00:13:04
  23. Lesson 7: Domain--5 Identity and Access Management
    1. Learning objectives 00:00:42
    2. 7.1 Understanding Mutual Authentication 00:10:53
    3. 7.2 Investigating Federated Identity 00:10:14
    4. 7.3 Surveying Access Control Models 00:05:06
    5. 7.4 Exam Practice Questions 00:09:22
  24. Lesson 8: Domain 6--Security Assessment and Testing
    1. Learning objectives 00:00:42
    2. 8.1 Defining the Penetration Testing Rules of Engagement 00:08:06
    3. 8.2 Interpreting SSAE16 SOC Reports 00:07:37
    4. 8.3 Understanding Information Security Continuous Monitoring (ISCM) 00:04:54
    5. 8.4 Exam Practice Questions 00:09:22
  25. Lesson 9: Domain 7--Security Operations
    1. Learning objectives 00:00:48
    2. 9.1 Evaluating Vulnerability, Change, and Configuration Management 00:06:40
    3. 9.2 Assessing Resiliency and Fault Tolerance 00:10:08
    4. 9.3 Deciphering Digital Forensics and Evidence Handling 00:12:28
    5. 9.4 Protecting People and Places 00:06:32
    6. 9.5 Exam Questions 00:08:36
  26. Lesson 10: Domain 8--Software Development Security
    1. Learning objectives 00:00:39
    2. 10.1 Evaluating Source Code Flaws 00:15:07
    3. 10.2 Understanding the Software Development Processes 00:09:04
    4. 10.3 Surveying Software Testing 00:05:20
    5. 10.4 Deconstructing the Product Development Lifecycle 00:05:56
    6. 10.5 Exam Practice Questions 00:07:20
  27. Module 3: CISSP Exam and Beyond
    1. Module Intro 00:00:06
  28. Lesson 11: Taking Your Exam
    1. Learning objectives 00:00:23
    2. 11.1 The Week Leading Up to the Exam 00:01:59
    3. 11.2 What to Do on Test Day 00:02:09
    4. 11.3 What to Expect at the Testing Center 00:04:13
    5. 11.4 Attaining and Maintaining Your CISSP Certification 00:01:24
  29. Summary
    1. Course Summary 00:00:46