Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Information Systems Security Professional (CISSP)
Welcome to CISSP
Introduction to CISSP (28:47)
Text Book for the Course-Official CISSP Textbook from ISC2
Domain One Lesson Notes
Domain One: Security and Risk Management
Introduction to Domain One (2:14)
1.1: Understand, Adhere to, and Promote Professional Ethics (15:54)
1.2: Understand and Apply Security Concepts (112:49)
1.3: Evaluate and Apply Security Governance Principles (122:07)
1.4: Determine Compliance and Other Requirements (29:21)
1.5: Understand Legal and Regulatory Issues That Pertain to Information Security in a Holistic Context (92:14)
1.6: Understand Requirements For Investigation Types (i.e., administrative, criminal, civil, regulatory, industry standards) (16:41)
1.7: Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines (28:11)
1.8: Identify, Analyze, and Prioritize Business Continuity (BC) Requirements (58:37)
1.9: Contribute to and Enforce Personnel Security Policies and Procedures (46:57)
1.10: Understand and Apply Risk Management Concepts (71:28)
1.11: Understand and Apply Threat Modeling Concepts and Methodologies (22:19)
1.12: Apply Supply Chain Risk Management (SCRM) Concepts (33:50)
1.13: Establish and Maintain a Security Awareness, Education, and Training Program (95:22)
Practice Test/Quiz
Domain Two: Asset Security
Domain Two Introduction (1:21)
2.1: Identify and Classify Information and Assets (39:09)
2.2: Establish Information and Asset Handling Requirements (21:45)
2.3: Provision Resources Securely (19:23)
2.4: Manage Data Lifecycle (57:47)
2.5: Ensure Appropriate Asset Retention (e.g., End-of-Life (EOL), End-of-Support (EOS)) (16:21)
2.6: Determine Data Security Controls and Compliance Requirements (40:58)
Practice Test/Quiz
Domain Three: Security Architecture and Engineering
Domain 3 Introduction (1:42)
3.1: Research, Implement and Manage Engineering Processes Using Secure Design Principles (80:10)
3.2 Understand The Fundamental Concepts of Security Models (e.g., Biba, Star Model, Bell-LaPadula) (82:39)
3.3: Select Controls Based Upon Systems Security Requirements (36:21)
Lesson 4: Understanding Security Capabilities of Information Systems (IS) (29:44)
3.5: Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements (71:10)
3.6: Select and Determine Cryptographic Solutions
3.7: Understand Methods of Cryptanalytic Attacks
3.8: Apply Security Principles to Site and Facility Design
3.9: Design Site and Facility Security Controls
Practice Test/Quiz
Domain Four: Communication and Network Security
4.1: Assess and Implement Secure Design Principles in Network Architectures (41:01)
4.2: Secure Network Components (241:56)
4.3: Implement Secure Communication Channels According to Design (78:10)
Practice Test/Quiz
Domain Five: Identity and Access Management (IAM)
5.1: Control Physical and Logical Access to Assets (30:03)
5.2: Manage Identification and Authentication of People, Devices, and Services (30:51)
5.3: Federated Identity With a Third-party Service
5.4: Implement and Manage Authorization Mechanisms (19:45)
5.5: Manage the Identity and Access Provisioning Lifecycle (42:16)
5.6: Implement Authentication Systems (31:28)
Practice Test/Quiz
Domain Six: Security Assessment and Testing
6.1: Design and Validate Assessment, Test, and Audit Strategies (28:53)
6.2: Conduct Security Control Testing (44:36)
6.3: Collect Security Process Data (e.g., Technical and Administrative) (32:31)
6.4: Analyze Test Output and Generate Report (104:27)
6.5: Conduct or Facilitate Security Audits (34:20)
Practice Test/Quiz
Domain Seven: Security Operations
7.1: Understand and Comply With Investigations (64:58)
7.2: Conduct Logging and Monitoring Activities (14:07)
7.3: Perform Configuration Management (CM) (e.g., Provisioning, Baselining, Automation) (42:16)
7.4 Apply Foundational Security Operations Concepts (23:38)
7.5: Apply Resource Protection (27:42)
7.6: Conduct Incident Management (22:50)
7.7: Operate and Maintain Detective and Preventative Measures (40:57)
7.8: Implement and Support Patch and Vulnerability Management (17:40)
7.9: Understand and Participate In Change Management Processes
7.10: Implement Recovery Strategies
7.11: Implement Disaster Recovery (DR) Processes
7.12: Test Disaster Recovery Plans (DRP)
7.13: Participate In Business Continuity (BC) Planning and Exercises
7.14 Implement and Manage Physical Security
7.15 Address Personnel Safety and Security Concerns
Practice Test/Quiz
Domain Eight: Software Development Security
8.1: Understand and Integrate Security In The Software Development Life Cycle (SDLC)
8.2: Identify and Apply Security Controls In Software Development Ecosystems
8.3: Assess The Effectiveness of Software Security
8.4: Assess Security Impact of Acquired Software
8.5: Define and Apply Secure Coding Guidelines and Standards
Quiz/Pratice Test
7.9: Understand and Participate In Change Management Processes
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock