CISSP Training (The Course)
Course Info
This course includes 1 attempt.
The Certified Information Systems Security Professional (CISSP) is one of the most recognized security certifications. Its exam covers the full range of knowledge in the information security field, and for this reason it requires extensive experience and knowledge. With so much to know, it can be hard to know which topics are most important. This course gives you a path through the eight domains of the (ISC)2 Common Body of Knowledge, pointing out the most important topics that you need to understand to pass the CISSP certification exam.
Course Material
- Introduction
- Welcome!
- What is the CISSP?
- Why obtain the CISSP?
- The (ISC)² Common Body of Knowledge (CBK)
- How does the process of obtaining the CISSP work?
- Some tips for studying
- Some tips for the exam
- “Thinking CISSP”
- Let’s practice! CISSP certification basics
- Let’s get started!
- Domain 1: Security and Risk Management
- What we will cover
- Security and Risk - a delicate balance
- The core goals of security: CIA
- Security terminology
- More about Controls
- Security through obscurity
- Security Frameworks, Benchmarks and Guidelines
- Let’s practice! Domain 1: standards and controls
- Computer Crime and Regulations
- Privacy
- Intellectual property laws
- Data breaches
- Policies, standards, guidelines, and procedures
- Risk Management
- Business Continuity and Disaster Recovery
- Quiz: Domain 1
- Let’s continue!
- Domain 2: Asset Security
- What we will cover
- What is an Asset?
- Information Life Cycle
- Data Classification
- Privacy protection
- Asset Protection
- Quiz: Domain 2
- Let’s continue!
- Domain 3: Security Architecture and Engineering
- What we will cover
- Building systems
- Memory-based vulnerabilities
- Operating systems
- System Security Architecture
- Security Models
- Systems Assurance Evaluation frameworks
- Quiz: Domain 3, part 1
- Types of systems
- Some common threats
- Cryptography
- Trusted Platform Module (TPM)
- Attacks on Cryptography
- Quiz: Domain 3, part 2
- Let’s continue!
- Domain 4: Communication and Network Security
- What we will cover
- The importance of a secure network
- OSI and TCP/IP models
- TCP/IP model
- Wireless networks
- Network protocols and services
- Quiz: Domain 4, part 1
- Network components
- Virtualized Networks
- IP Telephony (VoIP)
- Remote access technologies
- Layers of network encryption
- Network attacks
- Monitoring and control
- Quiz: Domain 4, part 2
- Let’s continue!
- Domain 5: Identity and Access Management
- What we will cover
- What are access controls?
- The access control process
- Identity as a Service
- Access control models
- Access control techniques
- IAM provisioning life cycle
- Controlling physical and logical access
- Some additional threats to access control
- Quiz: Domain 5
- Let’s continue!
- Domain 6: Security Assessment and Testing
- What we will cover
- Evaluating security: Testing, Assessment and Auditing
- Auditing Technical Controls
- Auditing Administrative Controls
- Reporting audit results
- Quiz: Domain 6
- Let’s continue!
- Domain 7: Security Operations
- What we will cover
- What is security operations?
- Administrative Management
- Physical security
- Secure resource provisioning
- Availability
- Prevention and detection techniques
- Incident Management
- Investigation
- Disaster recovery
- Quiz: Domain 7
- Let’s continue!
- Domain 8: Software Development Security
- How to build good code?
- Software development lifecycle
- Software development methodologies
- Change management
- Development environment security
- Secure coding
- Programming languages and concepts
- Mobile code security
- Web app security
- Database management
- Malicious software
- Quiz: Domain 8
- Let’s continue!
- Becoming a CISSP
- Exam structure
- Test-taking strategies
- Preparing for test day
- What to expect at the test center
- Obtaining and maintaining your certification
- Go forth and CISSP!
- References
Instructors
I am a computer scientist, security expert, consultant, programmer, sysadmin, author and overall geek, with a passion for computer security and automation. I am from Mexico and live in Switzerland.
The Leanpub 60 Day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.
You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!
So, there's no reason not to click the Add to Cart button, is there?
See full terms...
Earn $8 on a $10 Purchase, and $16 on a $20 Purchase
We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.
(Yes, some authors have already earned much more than that on Leanpub.)
In fact, authors have earnedover $14 millionwriting, publishing and selling on Leanpub.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them